scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A construction method for (t, k, n)-XVCS with essential shadows is proposed and the secret image can be revealed perfectly, and the shadow size is small compared with VCS.

16 citations

Journal ArticleDOI
TL;DR: An important aspect of the designed methodology is that only a single image has to be transmitted and the actual image can be retrieved hence this approach eliminates the need of transmitting multiple shares.

16 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: The paper aims at creation of secure voting system using visual cryptography and secure multi-party computation, which prevents voters for voting which try to vote using fake voter identification card (VIC).
Abstract: The paper aims at creation of secure voting system using visual cryptography and secure multi-party computation. Visual Cryptography is the method of encrypting the visual data for authentication of the voter. Visual cryptography scheme which is used to create 2 shares of fingerprint image. This system prevents voters for voting which try to vote using fake voter identification card (VIC). This system is developed robustly to ensure that all eligible voters having a voter identification card (VIC) is allowed to cast their respective vote. One share is stored at administrator side and one share is stored in VIC, so no one can access the full fingerprint image. For security of votes the principle of secure multi-party computation is used. Secure multi-party computation allows multiple parties to participate in a computation. Security, accuracy reliability and transparency are the major concern in these systems. The voters, who cast multiple votes during the voting process is ensured to be prevented by biometric identification of the votes could be used for casting their vote and restricting them to cast again. The process of Electronic-voting system could be deployed with four phases - the voter's enrollment, voter's authentication, vote casting and recording, and vote counting and election result publication.

16 citations

Journal ArticleDOI
TL;DR: This paper attempts to propose a new (k,n) scheme to refute the pixel expansion based on codebook and transpose of matrices and will offer promising solutions for the security condition, computation complexity, storage requirement, fast network transmission, and reconstructing the secret image accurately without any distortion.

15 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132