Open Access Open Access  Restricted Access Subscription Access

An Overview to Enhance Visual Cryptography Techniques

Mayank Agrawal, Yash Bohra, Lakshya Sharma, Dev Gopal Kaushik

Abstract


A unique type of cryptographic method called "visual cryptography" allows for decryption to be carried out using only the human eye. Generally speaking, for some crucial security, in modern society, processing and protecting information from attacks is becoming a very important aspect for people. Researchers are developing new ways to protect information from unwanted intrusion. Numerous encryption methods have been discovered, with many more yet to be discovered. Visual ciphers originated from certain encryption methods that used images to hide information. The visual cryptography technique is employed, for instance, to distinguish between a machine and a human; similar to how scanning and printing, captcha, and other applications use visual cryptography techniques. As a result, researchers created numerous strategies and methodologies for visual cryptography systems. The purpose of this research is to investigate different visual cryptography systems and to analyze their performance in terms of pixel expansion, the quantity of hidden images, image format, and the type of share generated. We will also provide a succinct explanation of the rules for additional research.


Keywords


Visual cryptography scheme (VCS), pixel expansion, contrast, visual secret sharing (VSS)

Full Text:

PDF

References


Naor M, Shamir A. Visual cryptography. In: Advances in Cryptology - EUROCRYPT’94. Berlin Heidelberg: Springer; 1995; 1–12. DOI 10.1007/bfb0053419

Weir J, Yan W. A Comprehensive Study of Visual Cryptography. Trans Data Hiding Multim Secur. 2010 Jun 27; 5: 70–105.

Saturwar JH, Chaudhari DN. Review of models, issues and applications of digital watermarking based on visual cryptography. In 2017 IEEE International Conference on Inventive Systems and Control (ICISC). 2017 Jan 19; 1–4.

Tuyls P, Kevenaar T, Schrijen GJ, Staring T, van Dijk M. Visual crypto displays enabling secure communications. In Security in Pervasive Computing: 1st International Conference, Boppard, Germany, 2003 Mar 12–14. Revised Papers. 2004; 271–284. Springer Berlin Heidelberg.

Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimed Tools Appl. 2008 Aug; 39(1): 1–46.

Pandey A, Som S. Applications and usage of visual cryptography: A review. In 2016 IEEE 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). 2016 Sep 7; 375–381.

Chavan PV, Atique M, Malik L. Signature based authentication using contrast enhanced hierarchical visual cryptography. In 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science. 2014 Mar 1; 1–5.

Roy S, Venkateswaran P. Online payment system using steganography and visual cryptography. In 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science. 2014 Mar 1; 1–5.

Thomas SA, Gharge S. Review on various visual cryptography schemes. In 2017 IEEE International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). 2017 Sep 8; 1164–1167.

Dey A, Nath B, Nath C. A New Technique to Hide Encrypted Data in QR Codes TM. In: Arabnia HR, Clincy VA, Deligiannidis L, Marsh A, Solo AMG. editors. Proceedings of the 2012 International Conference on Internet Computing [Affiliated with] Worldcomp'12 [the World Congress in Computer Science Computer Engineering and Applied Computing]. International Conference on Internet Computing ICOMP World Congress in Computer Science Computer Engineering and Applied Computing (WORLDCOMP). July 16–19 2012 Las Vegas Nevada USA. Erscheinungsort nicht ermittelbar: CSREA Press; 2012. [online] Available from: http://worldcomp-proceedings.com/proc/p2012/ICM4821.pdf.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Journal of Computer Technology & Applications