scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Posted Content
Pim Tuyls1, Tom A. M. Kevenaar1, Geert J. Schrijen1, Toine Staring1, Marten van Dijk1 
TL;DR: In this article, a low-tech and user friendly solution for secure two-way communication between two parties over a network of untrusted devices is presented, in which displays play a central role.
Abstract: In this paper we describe a low-tech and user friendly solution for secure two-way communication between two parties over a network of untrusted devices. We present a solution in which displays play a central role. Our approach guarantees privacy and allows to check the authenticity of information presented on displays. Furthermore, we provide the user with a secure return channel. To this end we propose to provide every user with a small decryption display which is, for example, integrated in a credit card and requires very limited computing power. The authentication and security are based on visual cryptography which was first introduced by Naor and Shamir in 1994. We solve some practical shortcomings of traditional visual cryptography and develop protocols for two-way authentication and privacy in untrusted environments.

30 citations

Dissertation
01 Jan 2002
TL;DR: This thesis extends several visual cryptography constructions to grey-level visual cryptography, and derive new results on the minimum possible pixel expansion for all possible access structures on at most four participants.
Abstract: Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the image without any computation. In 2000, Blundo, De Santis, and Naor introduced a model for grey-level visual cryptography which is a generalization of visual cryptography for general access structures. Grey-level visual cryptography extends this model to include grey-scale images. Decoding is done by the human visual system. In this thesis we survey known results of grey-level visual cryptography and visual cryptography for general access structures. We extend several visual cryptography constructions to grey-level visual cryptography, and derive new results on the minimum possible pixel expansion for all possible access structures on at most four participants.

30 citations

Journal ArticleDOI
TL;DR: This letter presents a method for implementing visual cryptography in which an additional tag is attached to each generated share, which provides users with supplementary information such as augmented message or distinguishable patterns to identify the shares.
Abstract: This letter presents a method for implementing visual cryptography (VC) in which an additional tag is attached to each generated share. The proposed (t, n), 2 ≤ t ≤ n tagged visual cryptography (TVC) scheme works like a traditional VC scheme does, where the original image is encoded in n shares in such a way that the secret can be revealed by superimposing any t or more shares, but knowledge of less than t shares gets no secret information. A notable characteristic of TVC is that an extra tag can be revealed by folding up each share, which provides users with supplementary information such as augmented message or distinguishable patterns to identify the shares. The tagging property can easily be applied to any reported VC scheme to endow the generated shares with more capabilities. Construction methods and simulation results of the proposed (t , n) TVC based on conventional matrix-based VC and probabilistic-VC are illustrated in the letter.

30 citations

Journal ArticleDOI
TL;DR: The use of colors is proposed to improve visual cryptography schemes for black-and-white secret images and an alternative measure of contrast is discussed that takes into account the ''distance'' between colors.

30 citations

Journal ArticleDOI
TL;DR: This work enhances the registration tolerance to obtain the third image and reduces the difficulty of superimposing the image while allowing a variety of gray levels, by extending dot-clustered subpixel arrangements and enabling continuous gray-scale subpixel values.
Abstract: Extended visual cryptography [Ateniese et al., Theor. Comput. Sci. 250, 143–161 (2001)] is a method that encodes a number of images so that when the images are superimposed, a hidden image appears while the original images disappear. The decryption is done directly by human eyes without cryptographic calculations. Our proposed system takes three natural images as input and generates two images that are modifications of two of the input pictures. The third picture is viewed by superimposing the two output images. A trade-off exists between the number of gray levels and the difficulty in stacking the two sheets. Our new approach enhances the registration tolerance to obtain the third image and reduces the difficulty of superimposing the image while allowing a variety of gray levels. It is done by extending dot-clustered subpixel arrangements and enabling continuous gray-scale subpixel values. The system has considerably enhanced tolerance to the registration error. We show this by superimposing the output by computer simulation and calculating the peak SNRs with the original images.

30 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132