scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
01 Jan 2013
TL;DR: The possibility of using visual cryptography for reporting the confidentiality to biometric templates and a methodology to preserve the privacy of a face database by decomposing an input private face image into two independent sheet images such that thePrivate face image can be reconstructed only when both sheets are simultaneously available.
Abstract: this paper discovers the possibility of using visual cryptography for reporting the confidentiality to biometric templates. In addition, the contribution of this paper includes a methodology to preserve the privacy of a face database by decomposing an input private face image into two independent sheet images such that the private face image can be reconstructed only when both sheets are simultaneously available. The XOR operator is used to join the two noisy images and fully recover the original template. The proposed algorithm selects the host images that are most likely to be companionable with the secret image based on geometry and appearance. Then random permutation algorithm (RAP) is used to encrypt the each share with individual host image. In previous research, the reconstructed image quality is pitiable and pixel size of the each share is high which increase the storage requirements of the sheets. To overcome this problem, we have to propose JPEG-LS lossless compression standard refining the image quality as well as diminish the pixel size. A analogous procedure is used to de-identify fingerprint images and iris codes prior to storing them in a central database.
01 Jan 2012
TL;DR: Study of color visual cryptography which involves visual information pixel (VIP) synchronization and error diffusion technique applicable forcolor visual cryptography results in visual quality improvement of images.
Abstract: This paper shows the study on the concept of color visual cryptography. This paper includes study of color visual cryptography which involves visual information pixel (VIP) synchronization and error diffusion technique applicable for color visual cryptography. VIP carries visual information of original image and VIP synchronization helps to keep the same position of pixels throughout the color channels. Error diffusion generates shares which are clear and visible to human eyes and it improves the visibility of shares. With the help of these two concepts it results in visual quality improvement of images. It also includes a brief description of color model used for the process color visual cryptography.
Journal Article
TL;DR: An attempt to propose a new method for the construction of (k, n) visual cryptographic threshold secret sharing scheme using combinatorial methods is made.
Abstract: Naor and Shamir (1994) and Blakely (1995) independently introduced a Visual Cryptography Scheme. Ateniese, Blundo, Santis and Stinson (1996, 1999) developed Visual Cryptography Scheme (VCS) for general access structure for black and white images and subsequently different schemes have been developed. Adhikari A, Bose M and Bimal Roy (2004, 2005) also made an attempt on the construction of visual cryptographic schemes.In this paper, we made an attempt to propose a new method for the construction of (k, n) visual cryptographic threshold secret sharing scheme using combinatorial methods.
01 Jan 2014
TL;DR: Visual cryptography may be a cryptographical technique that permits the visible data like pictures, words etc..
Abstract: Visual cryptography may be a cryptographical technique that permits the visible data like pictures, words etc.., to be hided in such the way that decipherment becomes a mechanical operation that doesn't need a laptop. Secret pictures area unit divided into share pictures that, on their own, reveal no data of the initial secret. Shares could also be distributed to numerous parties in order that solely by collaborating with Associate in nursing acceptable range of different parties, willthe ensuing combined shares reveal the key image. Recovery of the key is done by superimposing the share pictures and, hence, the decipherment method needs no special hardware orsoftware packageand might be merely done by the human eye. Visual cryptography is of specific interest for security applications supported life science

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132