scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
01 Jul 2011-Displays
TL;DR: A novel visual secret sharing scheme is presented to hide a secret image into two meaningful cover images which are called share images with no pixel expansion, and embeds an extra confidential image in these two share images.

33 citations

Book ChapterDOI
20 Aug 1997
TL;DR: The (k, n)-visual secret sharing scheme was introduced by Naor and Shamir in this paper, where a sender wishing to transmit a secret message distributes n transparencies among n recipients.
Abstract: Visual cryptography and (k, n)-visual secret sharing schemes were introduced by Naor and Shamir in [NaSh1] A sender wishing to transmit a secret message distributes n transparencies among n recipients, where the transparencies contain seemingly random pictures A (k, n)-scheme achieves the following situation: If any k recipients stack their transparencies together, then a secret message is revealed visually On the other hand, if only k - 1 recipients stack their transparencies, or analyze them by any other means, they are not able to obtain any information about the secret message

33 citations

Book ChapterDOI
13 Oct 2003
TL;DR: Chaum as discussed by the authors proposed an electronic voting scheme that combines visual cryptography and digital processing, which was designed to meet not only mathematical security standards, but also to be accepted by voters that do not trust electronic devices.
Abstract: Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standards, but also to be accepted by voters that do not trust electronic devices.

33 citations

Journal ArticleDOI
TL;DR: This paper designs a misalignment tolerant VSS (MTVSS) scheme based on the trade-off between the usage of big and small blocks to address this misal alignment problem in VSS scheme.

33 citations

Proceedings ArticleDOI
01 Nov 2008
TL;DR: An alternative approach of using the fingerprints is presented, attempting to solve two major problems related to fingerprint based automatic access control systems, which are falsification and the costly maintenance of the large fingerprint database.
Abstract: The main idea of this paper is to efficiently apply the visual cryptography (VC) techniques onto the area of authentication using fingerprints. We present an alternative approach of using the fingerprints, attempting to solve two major problems related to fingerprint based automatic access control systems, which are falsification and the costly maintenance of the large fingerprint database. In the proposed application we divide an input fingerprint image into two shares with the help of the basic VC techniques, keeping one with the participant in the form of ID card and saving the other one in the database. This share kept in the database will be the same for all of the participants. While accessing, we will stack the corresponding shares together and compare the obtained image with the provided fresh fingerprint using any modern minutia extraction algorithm.

32 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132