scispace - formally typeset
Search or ask a question
Topic

Visual cryptography

About: Visual cryptography is a research topic. Over the lifetime, 1724 publications have been published within this topic receiving 25300 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time and the contrast ratio of shares is equal to that of Extended Visual Cryptography.
Abstract: This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless) shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

10 citations

Proceedings ArticleDOI
02 Apr 2015
TL;DR: This paper provides a novel anti-phishing approach based on visual cryptography that does not suffer from False Positive (FP) notification and outperforms all existing approaches.
Abstract: Mobile ad hoc networks (MANETs) provide a wide range of applications such as disaster relief, military application, wireless sensor network (WSN), education, entrainment, health, commercial and civilian environments. One of its important applications is in commercial and civilian environments that cover e-commerce, vehicular services and networks of visitors at airports. Nowadays, phishing attacks are increasing with burgeoning rate for e-commerce websites. This paper provides a novel anti-phishing approach based on visual cryptography. According to this approach a user generates two shares of an image using (2, 2) visual cryptography scheme. Client stores the first share of this image and second share is uploaded to the website at the time of user registration. After this, website asks for some other information like second share of the image, user name, and password. These credentials of a particular user can change once per login. During each login phase, a user verifies the legitimacy of a website by getting secret information with the help of stacking both shares. There are many existing approaches based on cryptographic technique but they all suffer from False Positive notification. However, proposed approach does not suffer from False Positive (FP) notification and outperforms all existing approaches.

10 citations

01 Jan 2010
TL;DR: A new public-key encryption scheme for image based on non-expansion visual cryptography and Boolean operation is proposed that uses only Boolean operations and therefore requires comparatively lower computations.
Abstract: Currently, most of the existing public-key encryption schemes are based on complex algorithms with heavy computations. In 1994, Naor and Shamir proposed a simple cryptography method for digital images called visual cryptography. Existing visual cryptography primitives can be considered as a special kind of secret-key cryptography that does not require heavy computations for encrypting and decrypting an image. In this paper, we propose a new public-key encryption scheme for image based on non-expansion visual cryptography and Boolean operation. The proposed scheme uses only Boolean operations and therefore requires comparatively lower computations.

10 citations

Journal ArticleDOI
TL;DR: A new visual cryptography scheme based on color matching that enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret is proposed.
Abstract: Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

10 citations

Book
08 Oct 2014
TL;DR: This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in document authentication and cryptography.
Abstract: This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS. This logically-structured and comprehensive work will serve as a helpful reference for all researchers and students interested in document authentication and cryptography.

10 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
81% related
Feature extraction
111.8K papers, 2.1M citations
79% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Fuzzy logic
151.2K papers, 2.3M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202334
202291
202158
202064
201982
2018132