scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
01 Jan 2014
TL;DR: A novel encryption method is used for gray scale halftone images using random numbers that leads to no degradation in image quality as desired in certain image processing applications.
Abstract: Cryptography is derived from the Greek words kryptos, "hidden", and graphein, "to write" or "hidden writing''. It is a means of transforming data in a way that renders it unreadable by anyone except the intended recipient. Visual cryptography (invented by Naor & Shamir in 1994) is a method for securely encrypting messages in such a way that the recipient won't need a computer to decrypt them. It is the technique that divide the secret image into n multiple shares. Each share constitutes some information and when k shares out of n stack together the secret will reveal. However less than k shares do not work. In this paper a novel encryption method is used for gray scale halftone images using random numbers. The size of the retrieved image is same as the size of input secret image. Extra security is added by introducing keys, which are same at both encryption and decryption. This leads to no degradation in image quality as desired in certain image processing applications.
Proceedings ArticleDOI
01 May 2018
TL;DR: In visual cryptography, a binary secret image is encoded to produce shares to increase the security of secret image and is encoded along with the cover images to obtain shares by random grids method.
Abstract: In visual cryptography, a binary secret image is encoded to produce shares. To increase the security of secret image, it is encoded along with the cover images to obtain shares by random grids method. In this method there is no extra pixel expansion and codebook is not required. The probability parameter βis used to produce the basis matrix and βis varied to check the visual quality of the recovered image. PSNR is calculated for the recovered /decrypted image for different values of β. This scheme improves the quality of recovered image and provides more security.
Posted Content
TL;DR: In this paper, both steganography and visual cryptography have been selected to provide more secure data transmission over the public media with less hazard of computation, and experimental results are given to establish the security criteria.
Abstract: Steganography is a process that hides secrete message or secrete hologram or secrete video or secrete image whose mere presence within the source data should be undetectable and use for transmitting secret information over public media. Visual cryptography is a cryptographic technique in which no cryptographic computation is needed at the decryption end and the decryption is performed by the human visual system (HVS). In this paper, both Steganography and visual cryptography have been selected to provide more secure data transmission over the public media with less hazard of computation. This technique generates shares with less space overhead as well as without increasing the computational complexity compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography. Finally, experimental results are given to establish the security criteria.
Journal Article
TL;DR: In this article, it is proposed that a copyright assurance scheme for computerized color images utilizing key based Visual Cryptography Watermarking to accomplish the requirements of robustness and security is proposed.
Abstract: With rapidly growing network, Internet has turned into an essential wellspring of transmitting confidential or secret data, for example, military data, money related records, and so forth. In such cases, strategies committed to ensure such kind of information are needed and they play an imperative role in providing confidential and secure transmission over network. Visual cryptography scheme is a cryptographic strategy which allows visual information to be encoded in such a way that the decoding can be performed by the human visual system, without the guide of PCs. In this article, it is proposed that a copyright assurance scheme for computerized color images utilizing key based Visual Cryptography Watermarking to accomplish the requirements of robustness and security. The master share is encoded with a copyright image to form another share called proprietorship share. The master share is kept with a central authority and possession share is kept by the copyright proprietor. In case of any dispute, the master shares and proprietorship shares can be stacked together to give the copyright image confirming the possession about the host picture. The imperative feature of this technique is that it will not disturb the host image either during copyright generation nor during copyright check. At long last, trial comes about demonstrate that the proposed plan can oppose a few basic assaults.
Journal ArticleDOI
TL;DR: Experimental results show that the proposed scheme is robust and effectively resists several different signal processing attacks, without any distortion of the cover image.
Abstract: In this paper, a novel visual cryptography VC copyright protection scheme based on artificial bee colony algorithm ABCA is proposed. First, we apply wavelet decomposition discrete wavelet transform, DWT to decompose the cover image, and ABCA is used to adaptively select feature sub-blocks. Then singular value decomposition SVD is implemented to extract the image feature, which is classified into two clusters for generating the master share. Finally, ownership share is generated with the help of the secret image and the master share. In the process of ownership identification, the secret image can be acquired by stacking the master share and the ownership share. Experimental results show that the proposed scheme is robust and effectively resists several different signal processing attacks, without any distortion of the cover image.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132