Topic
Visual cryptography
About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A novel visual secret sharing scheme is presented to hide a secret image into two meaningful cover images which are called share images with no pixel expansion, and embeds an extra confidential image in these two share images.
33 citations
••
20 Aug 1997TL;DR: The (k, n)-visual secret sharing scheme was introduced by Naor and Shamir in this paper, where a sender wishing to transmit a secret message distributes n transparencies among n recipients.
Abstract: Visual cryptography and (k, n)-visual secret sharing schemes were introduced by Naor and Shamir in [NaSh1] A sender wishing to transmit a secret message distributes n transparencies among n recipients, where the transparencies contain seemingly random pictures A (k, n)-scheme achieves the following situation: If any k recipients stack their transparencies together, then a secret message is revealed visually On the other hand, if only k - 1 recipients stack their transparencies, or analyze them by any other means, they are not able to obtain any information about the secret message
33 citations
••
13 Oct 2003TL;DR: Chaum as discussed by the authors proposed an electronic voting scheme that combines visual cryptography and digital processing, which was designed to meet not only mathematical security standards, but also to be accepted by voters that do not trust electronic devices.
Abstract: Recently, David Chaum proposed an electronic voting scheme that combines visual cryptography and digital processing. It was designed to meet not only mathematical security standards, but also to be accepted by voters that do not trust electronic devices.
33 citations
••
TL;DR: This paper designs a misalignment tolerant VSS (MTVSS) scheme based on the trade-off between the usage of big and small blocks to address this misal alignment problem in VSS scheme.
33 citations
••
01 Nov 2008
TL;DR: An alternative approach of using the fingerprints is presented, attempting to solve two major problems related to fingerprint based automatic access control systems, which are falsification and the costly maintenance of the large fingerprint database.
Abstract: The main idea of this paper is to efficiently apply the visual cryptography (VC) techniques onto the area of authentication using fingerprints. We present an alternative approach of using the fingerprints, attempting to solve two major problems related to fingerprint based automatic access control systems, which are falsification and the costly maintenance of the large fingerprint database. In the proposed application we divide an input fingerprint image into two shares with the help of the basic VC techniques, keeping one with the participant in the form of ID card and saving the other one in the database. This share kept in the database will be the same for all of the participants. While accessing, we will stack the corresponding shares together and compare the obtained image with the provided fresh fingerprint using any modern minutia extraction algorithm.
32 citations