Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
01 Jan 2022TL;DR: In this paper , a watermarking algorithm is presented to achieve the owner's copy right security based on visual cryptography, and a common share, referred to as a smart key, can decrypt several images simultaneously.
Abstract: Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture. Human vision systems are connected to visual cryptography. The black and white image was originally used as a hidden image. In order to achieve the owner’s copy right security based on visual cryptography, a watermarking algorithm is presented. We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share. With a common share, which we refer to as a smart key, we can decrypt several images simultaneously. Depending on a given share, the smart key decrypts several hidden images. The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video. Using binary, grayscale, and color images, we test the proposed method.
•
TL;DR: This paper is suggesting one new method in which the symmetric secret key is used to encrypt the image and then cipher image is produced and uses Novel secret sharing algorithm of steganography to ensure the security of scheme.
Abstract: The data security is a very important issue nowadays. Confidential data, financial documents, military information, secret data etc. is transmitted on the Internet. Internet is the primary source to transmit such secure information. In such cases, many techniques are involved to transmit data securely such as Encryption with the key, visual cryptography, Steganography. These techniques devoted to protect such kind of information and they play an important role in providing confidential and secure transmission over network. In this paper, we are suggesting one new method in which the symmetric secret key is used to encrypt the image and then cipher image is produced. Divide this cipher image into different unique parts and apply Novel secret sharing algorithm of steganography. Each unique part will conceal by another innocent image i.e. steganography. Use of secret key will ensure the security of scheme. At the receiver side among n parts only k (threshold) parts or greater than k parts are needed to reconstruct the original secret image. Keywords—Visual cryptography, symmetric key, Secret sharing steganography ________________________________________________________________________________________________________
••
28 Apr 2018TL;DR: Experimental results show VCSSS can realize a (k,n) visual cryptography, and correct decoding rate (CDR) of revealed secret image can be guaranteed.
Abstract: This paper proposes a (k,n) visual cryptography based on Shamir's secret sharing (VCSSS). Using Shamir's secret sharing, a binary secret image can be shared into n meaningless shares, in order to make the generated shares more like noise images, adding the randomness within the process of sharing. Picking any k shares from n meaningless shares, the secret image can be revealed by using Lagrange interpolation. The main contribution of this paper is that applying Shamir's secret sharing to realize a (k,n) visual cryptography, and this method neither requires code book nor suffers from pixel expansion. Experimental results show VCSSS can realize a (k,n) visual cryptography, and correct decoding rate (CDR) of revealed secret image can be guaranteed.
••
TL;DR: The concept of cryptography and steganography both are used to provide two layers of security followed by visual cryptography scheme to divide the image into shares for it to be transmitted over a network channel.
Abstract: The advent of modern technology has provided us with a platform to exchange information on a massive scale. There is always a threat of intercepting this confidential information which ultimately calls for some sort of security measure to allow uninterrupted flow of information from the sender to the receiver. Already devised methods like cryptography and steganography have been referred to as the flag bearers in this field. Cryptography is a process where a person changes the meaning of the original data by converting it into a cipher text. And steganography, on the other hand helps in hiding the cipher text or plain text in a medium thereby obscuring its existence. Both these methods are tested methods of providing security. In today's information age, information sharing and transfer has increased exponentially. The concern around making secret information completely threat free has been a daunting problem for the experts. Cryptography combined with steganography can certainly be used to overcome this threat. The two methods of cryptography and steganography when combined help in achieving significant levels of data security thereby proving to be a better method than these processes being used as standalone ones for transmitting data over an insecure channel which is susceptible to intrusion. One of the most secure forms of steganography is Visual Steganography which is implemented commonly in image files. There might be some changes in the colour frequency of the image when the data text is embedded which would become very obvious to the person seeing it. In order to overcome the conspicuous behaviour of the image, we propose layers of data protection where the data text will first be converted to an unreadable cipher followed by embedding the cipher into an image file in an encrypted format which will then be divided into shares to achieve another layer of security. Hence, the concept of cryptography and steganography both are used to provide two layers of security followed by visual cryptography scheme to divide the image into shares for it to be transmitted over a network channel.
••
25 Jun 2015TL;DR: Basic matrices of the (k, k) scheme are used to constrict basic matrices in the ( k, k+1) scheme to secure the VCS of Droste's scheme.
Abstract: Naor and Shamir proposed an optimal (k, k)visual cryptography scheme (VCS). Droste extended the (k, k) scheme to (k, n) scheme. Based on properties of 0 and 1's permutations of basic matrices, we use basic matrices of the (k, k) scheme to constrict basic matrices of (k, k+1) scheme.