scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
06 Nov 2020
TL;DR: Wang et al. as mentioned in this paper proposed a color image encryption mechanism using visual cryptography, SHA-512 and one-time password, which works through split the plain image into several shares and encrypted for transmission for image decryption.
Abstract: With the rapid development of information sciences and communication networks, the security of digital images has been concerned seriously However, many of the current image encryption mechanisms trend to adopt complex algorithms and functions, resulting in high calculation power consumption, which is not suitable for mobile devices Aiming to this issue, a color image encryption mechanism using visual cryptography, SHA-512 and one-time password is proposed Based on visual cryptography, the encryption mechanism works through split the plain image into several shares and encrypted for transmission For image decryption, only XOR operations are required and the computation complexity is greatly reduced Besides, the SHA-512 and one-time password are utilized to protect the security of cipher keys and reduce the possibility of correct cipher images be intercepted The experimental results demonstrate that the proposed mechanism has high security with low computational time consumption
Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a symmetric cryptography protocol based on the Riemann-Lebesgue (R-L) -based key generator and a machine learning (ML)-based cryptography scheme for CXR image infosecurity.
Abstract: Imaging examinations, such as chest X-ray (CXR) images, can be used for early detection of diseases inside the human body, such as lung cancer, and cardiopulmonary-related diseases; however, they may contain patients’ private information, which raises concerns about the security levels of medical images in internet of medical things (IoMT) systems. The promising authorization protocol algorithm in 5th-generation networking technology can protect medical image confidentiality, recoverability, and availability. Hence, we propose a symmetric cryptography protocol based on the Riemann-Lebesgue (R-L) -based key generator and a machine learning (ML)-based cryptography scheme for CXR image infosecurity. The R-L-based key generator uses the composite function“, g(x)sin((1/2+N)x)”, to dynamically produce the oscillation function by controlling the terms of the nonlinear function“, g(x)”, and frequency“, N”, which are used to produce the randomnumber seed and to select non-ordered numbers and nonrepeated 256 secret keys in the key space. The ML-based scheme uses these random secret keys to train an image encryptor and decryptor, respectively. Based on the diffusion method, the ML-based cryptography scheme is used to change image pixel values. For evaluation experiments, CXR images are collected from the National Institutes of Health Chest X-ray database and used to evaluate image quality after encryption and decryption processes. For different cardiopulmonary-related disease images, the number of pixel change rates (NPCR) and unified averaged changed intensity (UACI) are used to evaluate the security level and decryption quality. The experimental results show an average NPCR of 99.6% and average UACI of 32.61% between plain and cipher images for evaluating the security level, enabling further online diagnosis applications in IoMT systems.
Journal ArticleDOI
24 Jun 2023-Symmetry
TL;DR: In this article , the authors proposed a novel technique based on (2, 2) secret sharing and the algorithm of Harris hawks optimization (HHO) for color photos for image encryption.
Abstract: Hundreds of millions of people worldwide use computing devices and services, including smartphones, laptops, and messaging apps. Visual cryptography (VC) is one of the most secure encryption methods for image encryption in many applications, such as voting security, online transaction security, and privacy protection. An essential step in VC is encrypting secret images into multiple digital shares to hide them with the intention of successfully reverting them to their original form. Hence, a single share cannot reveal information about the secret image. Issues including pixel enlargement, high processing costs, and low decryption quality influence the current state of VC. We address these issues by introducing a novel technique based on (2, 2) secret sharing and the algorithm of Harris hawks optimization (HHO) for color photos. For the encryption process, the appropriate color levels are determined using the HHO algorithm. Consequently, images are decrypted with improved quality and a small impact on the overall processing complexity. The suggested scheme is also non-expandable due to the equal size of the initial secret image and the shared images. This results in lower memory requirements and improved image quality. The approach is applied to a set of well-known benchmark images. Moreover, a set of standard metrics is used to assess the robustness of the proposed scheme, including its capability in defending against cryptanalytic attacks, a correlation, a histogram, and the quality of encryption. According to the findings, the proposed solution provides better reconstructed image quality, time-efficient encryption, and nearly optimal statistical properties compared to previous approaches.
Book ChapterDOI
01 Jan 2023
TL;DR: In this article , the biometric features captured are embedded using multimodal mask steganography, considering mask image and cover image, the resultant stego image shares are created using Random visual cryptography technique.
Abstract: DATA protection is becoming increasingly critical as the demand for online services grows, which biometrics authentication can help with. To communicate biometric data authenticating services over the Internet in a secure channel is essential. To ensure the security and the existence of the biometric information over the communication channel Random Visual Cryptography and Multimodal Mask Steganography is used. The biometric features captured are embedded using multimodal mask steganography, considering mask image and cover image. The resultant stego image shares are created using Random visual cryptography technique. The resultant shares are placed in blockchain using blockchain technology to improve security aspects of the cloud application and reliable transmission of data. Combining proposed Random Visual cryptography and multimodal mask steganography methods with blockchain technology ensures high reliable authentication system of server room access or banking application.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132