scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings Article
09 Dec 2008
TL;DR: This paper presents a review of the literature on the use of artificial neutral networks in cryptography based on their applications to different components of cryptosystems such as secret key protocols, visual cryptography, design of random generators, digital watermarking, and steganalysis.
Abstract: This paper presents a review of the literature on the use of artificial neutral networks in cryptography. Different neural network based approaches have been categorized based on their applications to different components of cryptosystems such as secret key protocols, visual cryptography, design of random generators, digital watermarking, and steganalysis.

24 citations

Book ChapterDOI
23 Oct 2011
TL;DR: This paper proposes a scheme that attempts to alleviate suspicion by using 2D barcodes as a means of authentication which may have more practicality in terms of real world usage.
Abstract: One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an image that is encoded into multiple pieces known as shares. When these shares are physically superimposed, the secret can be instantly observed. A known problem is that of authentication. How is it possible to know that the secret being recovered is genuine? There has been some work devoted to this using so called cheating prevention schemes which attempt to provide a means of traceability or authentication via a set of additional shares that are used to check authenticity. This paper proposes a scheme that attempts to alleviate this suspicion by using 2D barcodes as a means of authentication which may have more practicality in terms of real world usage. Results are provided using an application that is available on mobile devices for portable barcode reading.

24 citations

Proceedings ArticleDOI
13 Dec 2008
TL;DR: This paper proposes a new efficient and secure copyright protection scheme for digital watermarking by using visual cryptography technique that eliminates two security problems on the previous Lou et al.psilas scheme.
Abstract: This paper proposes a new efficient and secure copyright protection scheme for digital watermarking by using visual cryptography technique. The proposed scheme has the following merits compare with previous related schemes: (1) The proposed scheme uses simple codebook to generate a watermarked image. (2) The proposed scheme does not need to expand the watermark image. (3) The proposed scheme eliminates two security problems on the previous Lou et al.psilas scheme which that the problem of stability of relationship between discrete wavelet transform (DWT) coefficients and the problem of ambiguity of watermark verification. As a result, the proposed scheme is more efficient and secure compare with previous related schemes.

24 citations

Journal ArticleDOI
TL;DR: Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.
Abstract: We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

24 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132