scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper analyzes VC authentication methods using 2D barcodes and embed binary codes into VC shares for authentication purpose and proposes a scheme of embedding 2DBarcodes into given VC shares to prevent cheating.
Abstract: The basic idea of Visual Cryptography (VC) is to divide a secret image into several partitions which are called VC shares. With various categories of VC schemes having been developed to enhance the maturity of VC since its emergence, one of obsessions in current investigations of VC is that each VC share lacks authentication. In this paper, we analyze VC authentication methods using 2D barcodes and embed binary codes into VC shares for authentication purpose. The objective of this paper is to present a method of improving the authentication of traditional VC scheme. Our contribution of this paper is to propose a scheme of embedding 2D barcodes into given VC shares to prevent cheating, we search the best region of a given share where the 2D barcode could be embedded into so as to keep the visual quality of the revealed secret.

27 citations

Journal Article
TL;DR: A new secure watermarking scheme for color image that splits the watermark into two shares using (2, 2)threshold Visual Cryptography Scheme with Adaptive Order Dithering technique and embeds one share into high textured subband of Luminance channel of the color image.
Abstract: In this paper, a new secure watermarking scheme for color image is proposed. It splits the watermark into two shares using (2, 2)threshold Visual Cryptography Scheme (V CS) with Adaptive Order Dithering technique and embeds one share into high textured subband of Luminance channel of the color image. The other share is used as the key and is available only with the super-user or the author of the image. In this scheme only the super-user can reveal the original watermark. The proposed scheme is dynamic in the sense that to maintain the perceptual similarity between the original and the watermarked image the selected subband coefficients are modified by varying the watermark scaling factor. The experimental results demonstrate the effectiveness of the proposed scheme. Further, the proposed scheme is able to resist all common attacks even with strong amplitude. Keywords—VCS, Dithering, HVS, DWT.

27 citations

Journal ArticleDOI
TL;DR: The proposed scheme combines color-black-and-white visual cryptography scheme (CBW-VCS) and polynomial based secret image sharing (PSIS) together, to offer stacking-to-see decryption and lossless image reconstruction.

27 citations

Proceedings ArticleDOI
04 Sep 2006
TL;DR: Simulation results show that the proposed method can improve significantly the halftone image quality for the encoded shares compared with previous algorithms.
Abstract: This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels encoded into shares introduce noise to the halftone images. We extend our previous work on halftone visual cryptography [1] and propose a new method that can encode the secret pixels into the shares via the direct binary search (DBS) halftoning method. The perceptual errors between the halftone shares and the continuous-tone images are minimized with respect to a human visual system (HVS) model [2]. The secret image can be clearly decoded without showing any interference with the share images. The security of our method is guaranteed by the properties of VC. Simulation results show that our proposed method can improve significantly the halftone image quality for the encoded shares compared with previous algorithms.

27 citations

Journal ArticleDOI
TL;DR: Two extended visual cryptography techniques for sharing color images are proposed that are lossless in nature and are less complex and have been shown to be effective by comparing their results with the results of the existing techniques on the basis of various parameters.

27 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132