CFP last date
20 December 2024
Reseach Article

Visual Cryptography: A Review

by Dipesh Vaya, Sarika Khandelwal, Teena Hadpawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 5
Year of Publication: 2017
Authors: Dipesh Vaya, Sarika Khandelwal, Teena Hadpawat
10.5120/ijca2017915406

Dipesh Vaya, Sarika Khandelwal, Teena Hadpawat . Visual Cryptography: A Review. International Journal of Computer Applications. 174, 5 ( Sep 2017), 40-43. DOI=10.5120/ijca2017915406

@article{ 10.5120/ijca2017915406,
author = { Dipesh Vaya, Sarika Khandelwal, Teena Hadpawat },
title = { Visual Cryptography: A Review },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 5 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number5/28407-2017915406/ },
doi = { 10.5120/ijca2017915406 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:23.673617+05:30
%A Dipesh Vaya
%A Sarika Khandelwal
%A Teena Hadpawat
%T Visual Cryptography: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 5
%P 40-43
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world handling and security of information from attacks becomes very important aspect for the individuals. Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed. Here in this paper we are going to review an advanced method of information hiding i.e. Visual Cryptography. Visual Cryptography emerged as a special encryption technique for information hiding using images. In way that encrypted image can be decrypted by the human vision if the correct image key is used. By this cryptographic technique we can encrypt visual information (pictures, text, etc.) in a way that human visual system can perform decryption of encrypted information & no aid of computers needed. In visual cryptography a secret image is transformed into several share images. These share images are meaningful but noisy or distorted images. Combination of these share images can reveal the original secret image. This paper reviews two methods for visual cryptography of color images based on Shamir encryption method variants of k-out-of-n i.e.2-out-of-2, 2-out-of-n, n-out-of-n, and k-out-of-n scheme encryption method.

References
  1. Naor, M. and Shamir, A. 1995. Visual Cryptography, in Advances in Cryptology – Eurocrypt. A. De Santis, Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp 1-12, 1995.
  2. Ateniese, G., Blundo, C., Santis, A. and Stinson, D. Extended capabilities for visual cryptography‖, ACM Theory. Comput. Sci., Vol. 250, pp. 143-161, 2001.
  3. Verheul, E. and van Tilborg, H. Construction & properties of k out of n visual secret sharing schemes‖, Designs, codes & cryptography, vol.11, no. 2, pp.179-196, 1997.
  4. Wu, L. and Chen H. A Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  5. Hsu, H., Chen, T. and Lm, Y. The Ring Shadow Image Technology Of Visual Cryptography By Applying Diverse Rotating Angles To Hide The Secret Sharing, in Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001, March 2004.
  6. Wang, D. Feng, Y. and Xiaobo, L. On General Construction For Extended Visual Cryptography Schemes, Pattern Recognition 42 (2009), pp 3071 – 3082, 2009.
  7. Malik, S. Jaya, A. A Keyless Approach to Image Encryption,2012 international conference on Communication systems and Network Technologies ©2012 IEEE
  8. Kumar H., srivastava A., A Secret Sharing Scheme for Secure Transmission of Color Images, International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 2014.
  9. Vaya D., Khandelwal S. (2016) A Fast and Hardware-Efficient Visual Cryptography Scheme for Images. In: Advances in Intelligent Systems and Computing, vol 379, pp. 133-142, Springer, New Delhi
  10. Shyu, S. .Huanga,S. .Lee,Y, .Wang, R. and Chen, K. Sharing multiple secrets in visual cryptography, Pattern Recognition, Vol.40, Issue 12, pp.3633-3651,2007.
  11. Warren, H., Akhawe, D., Jain, S. Shi, E. and Song, D. Shadowcrypt: Encrypted web applications for everyone. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028-1039. ACM, 2014.
  12. Reddy, L., and Munaga P. Extended Visual Cryptography Scheme for Multi-secret Sharing. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, pp. 249-257. Springer India, 2016.
  13. Kim, M., Park, J. and Zheng, Y. Human-machine identification using visual cryptography. In Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp. 178-182. 1998.
  14. Katoh, T., and H. Imai. An Application of Visual Secret Sharing Scheme Concealing Plural Secret Images to Human Identification Scheme. In Proc. of SITA, vol. 96, pp. 661-664. 1996.
  15. Chandrasekhara and Jagadisha, Secure Banking Application Using Visual Cryptography against Fake Website Authenticity Theft, International Journal of Advanced Computer Engineering and Communication Technology (IJACECT), ISSN (Print): 2278-5140, Volume-2, Issue – 2, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

CAPTCHA Color Decomposition Color Visual Cryptography MD5 SHA Meaningful Shares..