scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Book ChapterDOI
14 Sep 2020
TL;DR: Using the battery of tests made it possible to detect a gap in the randomness (not in the security) of the random visual cryptography protocol, provided that the generator is reasonably good.
Abstract: Actual randomness of the shares in the binary random visual cryptography protocol was tested with the NIST statistical test suite. Lack of randomness was noticed for a large secret image (shares 10K by 10K) in that the OverlappingTemplate test failed. The symptom of failure was much weaker for a twice smaller image and absent for a four times smaller one. The failure rate nonmonotonically depended on the period of the pseudorandom number generator, but was the largest for the worst generator. Four generators were used with periods from \(2^{64}\) to \(2^{19937}\). Hence, the reason for the nonrandomness seemed not to be the excessively large image size versus generator period, provided that the generator is reasonably good. Using the battery of tests made it possible to detect a gap in the randomness (not in the security) of the random visual cryptography protocol.
01 Jan 2015
TL;DR: This paper proposes model, which highlights a novel approach of an Optimize Multiple Bits Replacement Scheme with Multi-Layer Multi-Shares Visual Cryptography for Data Hiding, which hides Image in a image carrier and achieve its encryption/decryption after going through visual cryptography.
Abstract: This paper emphasize on, how to improve capacity of image carrier by hiding image using combine approach of visual cryptography with data hiding technique. Here we propose model, which highlights a novel approach of an Optimize Multiple Bits Replacement Scheme with Multi-Layer Multi-Shares Visual Cryptography for Data Hiding. It hides Image in a image carrier and achieve its encryption/decryption after going through visual cryptography. The overall effort of the proposed scheme is the achievement of encrypting/extracting secret images at different scale levels. Our objective is to improve security, reliability and efficiency of secret image using data hiding technique and visual cryptography.
Book ChapterDOI
09 Dec 2011
TL;DR: Efficient use of Shares in Color Visual Cryptography is proposed, which encrypts three gray images, three cover images into three shares, and each share is used to reveal more than one color image.
Abstract: Visual cryptography is the concept of encrypting the secret image into n number of shares where each recipient gets one share. One share can’t reveal any information. Sharing a Secret Gray Image in Multiple images allows gray image to be encrypted into two shares. In this paper, we propose Efficient use of Shares in Color Visual Cryptography, which encrypts three gray images, three cover images into three shares. The secret image is recovered by combining any two of the shares by applying some simple computations. In this paper Efficient use of Shares in Color Visual Cryptography the size of the shares is fixed; each share is used to reveal more than one color image. The recovered secret image is same contrast as original image.
Journal ArticleDOI
TL;DR: In this paper , a binocular cheating attack (BCA) for a region to augment the effectiveness of original cheating for a block is presented, which can also be applied to halftone secret.

Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132