scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article , a robust steganography scheme for large-capacity lossless images based on visual cryptography and ptychography is proposed, which can realize the lossless extraction of information and performs well in robustness when subjected to compression, noise, and tailoring attacks.
Abstract: We propose a robust steganography scheme for large-capacity lossless images based on visual cryptography and ptychography. The introduction of the quick response code as a container for information hiding can realize the lossless extraction of information and performs well in robustness when subjected to compression, noise, and tailoring attacks. The security of the proposed system is provided by the Arnold scrambling algorithm, the visual cryptographic scheme, and the structural parameters of ptychography. The proposed method is verified with optical experiments. In the experiments, a spatial light modulator is used to complete specific experiments through nonmechanical moving ptychography, which greatly reduces the error of traditional ptychography experiments and improves the quality of reconstruction. The results demonstrate that the method can achieve satisfactory robustness performance with high repeatability and excellent information fidelity.
Proceedings ArticleDOI
01 Dec 2022
TL;DR: Wang et al. as mentioned in this paper proposed an effective screen content protection scheme, based on Visual Cryptography (VC) for image encryption, combined with Scale-Invariant Feature Transform (SIFT) to deal with screen stealing scenes.
Abstract: Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information exchange methods for people's lives, and at the same time make information leakage more likely to happen. Electronic screens are susceptible to stealing photographs when sharing information, which leads to information leakage and security issues. Under the unavoidable situation of such leaks, various protection schemes have been proposed before, but these schemes cannot effectively protect the screen content. Therefore, in this paper, we propose an effective a screen content protection scheme, based on Visual Cryptography(VC) for image encryption, combined with Scale-Invariant Feature Transform(SIFT) to deal with screen stealing scenes. In addition, our experiments show that our scheme is superior to existing schemes in terms of convenience and security.
DissertationDOI
23 Aug 2022
TL;DR: In this article , a technique to cipher medical images by adding the metadata inside a cover image, based on extended visual cryptography as well as the inclusion of a Hash-like function to verify the integrity of the image and the metadata once they are recovered.
Abstract: Medical image security is acquiring its importance to preserve the integrity and confidentiality of information (medical data) from malicious users given its importance in timely and successful diagnosis. In this context, several techniques have been developed to protect medical images, such as encryption, data hiding, image tagging, application of Hash algorithms, etc. This paper proposes a technique to cipher medical images by adding the metadata inside a cover image, based on extended visual cryptography as well as the inclusion of a Hash-like function to verify the integrity of the image and the metadata once they are recovered. The method proposed in this work is implemented using medical images with a grayscale resolution of [0,4095] that is a depth of 12 bits/pixel and color images with 24 bits/pixel depth. Experimental results prove the effectiveness of the proposed method in the task of secure exchange of medical images by allowing higher hiding capability, lower distortion in the visual quality of the image with the hidden medical data, as well as a means to verify the integrity of the sent data, compared to state-of-the-art.
Proceedings ArticleDOI
26 Dec 2022
TL;DR: In this paper , the authors elaborate on two proposed visual cryptographic techniques for image encryption: one uses Caesar Cipher and RSA with a modified (k, N) share generation algorithm, and the other uses chaotic logistic mapping and DNA encoding.
Abstract: Data security is paramount in this modern era. Many corporations have established selective or their own cryptography schemes for information gathering and communication. The need of securing sensitive information is ever-so-increasing due to the rise of cyber thefts and online scams. Visual cryptography is a popular cryptographic technique that consists of hiding visual information like audio, video, image, text etc., in such a manner that nobody but the authorized groups who have complete access to the encrypted data, can collectively or individually reveal the original information. In this paper, we elaborate on two proposed visual cryptographic techniques for image encryption: one uses Caesar Cipher and RSA with a modified (k, N) share generation algorithm, and the other uses chaotic logistic mapping and DNA encoding. To analyze the security and robustness of these proposed algorithms, we will be performing several security tests such as time complexity, histograms, number of pixel change ratio, peak signal-to-noise ratios, information entropy, mean square error, and many other tests.
Journal ArticleDOI
TL;DR: A new method based on alignment of shares at the time of superimposition is proposed for getting the source image and this is the only way to obtaining the source images.
Abstract: According to visual cryptography the decryption is performed by human visual system. It is well known that visual cryptography encryption process generates shares. Proposed method based on alignment of shares at the time of superimposition. Using these shares the source image can be recovered only if the shares are superimposed with proper predefined alignment. Proper alignment of these shares at the time of superimposition plays an important role in finding the source image. Here, we are proposing a new way of aligning the shares for getting the source image and this is the only way to obtaining the source image.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132