scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Proceedings ArticleDOI
11 Apr 2009
TL;DR: A new secret visual cryptography scheme for color images based on halftone technique that provides a more efficient way to hide natural images in different shares and does not vary when the number of colors appearing in the secret image differs.
Abstract: This paper proposes a new secret visual cryptography scheme for color images based on halftone technique. Firstly, a chromatic image is decomposed into three monochromatic images in tones of cyan, magenta and yellow. Secondly, these three images are transformed into binary images by halftone technique. Finally, the traditional binary secret sharing scheme is used to get the sharing images. This scheme provides a more efficient way to hide natural images in different shares. Furthermore, the size of the shares does not vary when the number of colors appearing in the secret image differs.

17 citations

Journal ArticleDOI
TL;DR: An enhanced form of the proposed method based on the concept of visual cryptography for color images and without any pixel expansion which requires less space is produced by modifying the encryption technique used to generate the random and the key shares.
Abstract: Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed. In this paper we proposed a method that is based on the concept of visual cryptography for color images and without any pixel expansion which requires less space. The proposed method is used to encrypt halftone color images by generating two shares, random and key shares which are the same size as the secret color image. The two shares are generated based on a private key. At the receiving side, the secret color image is revealed by stacking the two shares and exploiting the human vision system. In this paper, we produce an enhanced form of the proposed method by modifying the encryption technique used to generate the random and the key shares. Experimental results have shown that the proposed and the enhanced methods suggest an efficient way to encrypt a secret color image with better level of security, less storage space, less time of computation and with a better value of PSNR.

17 citations

Proceedings ArticleDOI
01 Sep 2016
TL;DR: This paper focuses on the application areas of visual cryptography from four different research papers/journals which talk about the most important application areas in visual cryptography.
Abstract: Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. In this paper, we intend to study the different application areas of Visual Cryptography. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging, multimedia and other such fields. Visual Cryptography comes in the field of data hiding used in cybercrime, file formats etc. This paper focuses on the application areas of visual cryptography from four different research papers/journals which talk about the most important application areas of visual cryptography.

17 citations

Book ChapterDOI
22 Jun 2014
TL;DR: This paper focuses on the usability, in order to supply voters with less technical experience with a usable scheme, based on visual cryptography as the work horse and an e-voting authentication scheme combined with QR-codes and visual cryptography.
Abstract: In this paper we propose an e-voting authentication scheme combined with QR-codes and visual cryptography. We focus on the usability, in order to supply voters with less technical experience with a usable scheme. The only requirement is that the user needs to handle a device containing a QR-code reader, most probably a smartphone. This approach is based on visual cryptography as the work horse: The e-voting passwords for authentication are encoded as QR-codes and later encrypted into shadow transparencies. Thus, the transparency by itself conveys no information but when the layers are combined, the secret password is revealed.

17 citations

Journal ArticleDOI
TL;DR: The concept of random grid is extended to color pixel domain, and the XOR operation for color pixels is defined, and a scheme for RG-CBW-VCS which implements the GAS is introduced.
Abstract: To reduce the pixel expansion problem in color–black-and-white visual cryptography schemes (CBW-VCSs) and to provide flexible sharing strategy simultaneously, a random grid based CBW-VCS (RG-CBW-VCS) for general access structure (GAS) is proposed in this paper. First of all, the concept of random grid is extended to color pixel domain, and the XOR operation for color pixels is defined. By adopting this operation, a scheme for RG-CBW-VCS which implements the GAS is introduced. The proposed method is further extended to realize the generalized GAS (GGAS), where implementing complicated sharing strategy becomes available. Theoretical analysis on the proposed method are given to prove the security and contrast conditions, as well as the calculation of contrast. Experimental results are exhibited to show that optimal pixel expansion is achieved by the proposed method.

17 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132