scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This study proposes a novel secret sharing method, the privilege-based visual secret sharing model (PVSSM), which allows participants with different privileges, and it is assumed that participants having a higher privilege will have a higher ability to recover the secret image.

24 citations

Journal Article
TL;DR: This paper gives a construction, which can find out who is the cheater in the decrypting process, and if there is a cheater who gives a faked share in the decryption process, the secret image will fail to be decrypted.
Abstract: This paper gave the definition and constructing method of visual cryptography which can examine a cheater from the (k,n) threshold, and proved its security. It will result in failure when there exists a cheater who provides a pseudo share shadow, and the cheater will be found by the method. Just as the common visual cryptography share schemes, every participant keeps only a shared picture without extra information, when examining the cheater, the only operation is to splice the different k films of shared picture, which reflects the convenient principle of visual cryptography.

24 citations

01 Jan 2009
TL;DR: A watermarking scheme which offers better security than Hwang's method, so that, attackers will not be able to detect ownership information, and is robust to withstand several image processing attacks.
Abstract: With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the multimedia. This paper considers the problem of embedding a binary watermark in a gray-level image using the concept of Visual Cryptography (VC). This paper proposes a watermarking scheme which offers better security than Hwang's method, so that, attackers will not be able to detect ownership information. The proposed scheme embeds the secret image without modifying the host image. In addition, the hidden secret image can be extracted without using the original host image and allows multiple watermarks to be embedded in the same image. The experimental results show that the proposed scheme is robust to withstand several image processing attacks such as JPEG compression, noise adding, sharpening and blurring.

24 citations

Journal ArticleDOI
TL;DR: The light transmission of share images generated by the proposed scheme is redesigned to be higher than before such that the better visual quality of reconstructed secrets is obtained.

23 citations

Proceedings ArticleDOI
01 Jan 2016
TL;DR: The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks.
Abstract: Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead projector to reveals the secret image. This paper proposed a brand new of simple and robust (k, n) visual cryptography technique which is used to effectively sharing the secret image with utmost confidentiality. In share creation process, specified new condition for random matrices and then XOR operations are performed to generate the ‘n’ transparencies. It is possible to decode the secret image visually by superimposing a k subset of transparencies. Nevertheless no secret data can be acquired from the superposition of an illegal subset. Experiments, statistical and security assessments are carried out on the shares to validate the strength of the proposed scheme by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks. The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels.

23 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132