Academic literature on the topic 'Visual cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Visual cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Visual cryptography"

1

Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.

Full text
Abstract:
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption
APA, Harvard, Vancouver, ISO, and other styles
2

Priya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.

Full text
Abstract:
The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated i
APA, Harvard, Vancouver, ISO, and other styles
3

Lakshmi, Malyala Sravya, and Gadi Lava Raju. "A Comprehensive Study on Visual Cryptography." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 08 (2014): 1065–69. https://doi.org/10.5281/zenodo.14752169.

Full text
Abstract:
This article is a deal with the Review study of visual cryptography there is a need for study. The information helps the mathematician, computer engineers, Academicians’ and researchers for better understanding of data whenever it is required. So for this a study is made on the basis of secondary data. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography is a new technique
APA, Harvard, Vancouver, ISO, and other styles
4

Gopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s brows
APA, Harvard, Vancouver, ISO, and other styles
5

Venu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.

Full text
Abstract:
Phishing attacks are one of the most common attacks where the attacker tries to steal sensitive information of one individual like user names, passwords, credit card numbers, or other personal data, by manipulating the user by behaving as a legitimate request. These attacks are considered a threat as they involve losing valuable information. In this research analysis visual cryptography is utilized to enhance website authentication mechanisms so that when a user visits a website, the system automatically compares the visual cryptographic shares from the legitimate server and the client’s brows
APA, Harvard, Vancouver, ISO, and other styles
6

Pawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ran-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Visual cryptography"

1

Muecke, Innes. "Greyscale and colour visual cryptography." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0017/MQ48283.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weir, J. P. "Visual cryptography and its applications." Thesis, Queen's University Belfast, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.557852.

Full text
Abstract:
" In this thesis, a number of new schemes are presented which address current problems and shortcomings within the area of visual cryptography. Visual cryptography provides a very powerful means by which a secret, in the form of a digital image, can be distributed (encoded) into two or more pieces known as shares. When these shares are xeroxed onto transparencies and superimposed exactly together, the original secret can be recovered (decoded) without the necessity for computation. Traditionally, visual cryptography allows effective and efficient sharing of a single secret between a number of
APA, Harvard, Vancouver, ISO, and other styles
3

Islam, Naveed. "Cryptography based Visual Data Protection." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20178/document.

Full text
Abstract:
La transmission de données multimédia sur les réseaux sécurisés a une croissance exponentielle grâce aux progrès scientifique dans les technologies de l'information et de la communication. La sécurité des données dans certaines applications comme le stockage sécurisé, l'authentification, la protection des droits d'auteurs, la communication militaire ou la visioconférence confidentielles, nécessitent de nouvelles stratégies en matière de transmission sécurisée. Deux techniques sont couramment utilisées pour la transmission sécurisée de données visuelles, à savoir : la cryptographie et la stégan
APA, Harvard, Vancouver, ISO, and other styles
4

Ghiotto, Nicolo' <1994&gt. "Visual Cryptography Schemes with Multiple Secrets and Visual Key Derivation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13323.

Full text
Abstract:
Visual Cryptography was introduced in 1995 by Naor and Shamir to recover a secret image by overlapping two or more images. This scheme is secure and easy to implement and can be extended to a set of participants in order to recover the same secret image. In this thesis, we propose two new schemes that use a shared image to encode a different secret image for each participant. In the first scheme, we generate a visual cyphertext from a shared key for each participant. Since the shared key is computed a priori, we can add a new participant at any given time and generate her cyphertext, ensuring
APA, Harvard, Vancouver, ISO, and other styles
5

Moretto, Tommaso <1992&gt. "Secure 2D barcodes based on visual cryptography." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13391.

Full text
Abstract:
In this thesis we investigate the application of visual cryptography to enforce 2D barcode confidentiality. The approach of visual cryptography is appealing because 2D barcodes are indeed images, but it presents non-trivial challenges. First of all, visual cryptography aims at sharing a unique secret between two or more participants while here we would like to provide each participant with a visual decryption key that can be used to recover the participant's distinguished secret; moreover, visual cryptography assumes that images are pre-shared among participants which is not practical in many
APA, Harvard, Vancouver, ISO, and other styles
6

MacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures." Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.

Full text
Abstract:
Visual cryptography, first introduced by Naor and Shamir, allows a secret (black and white) image to be encoded and distributed to a set of participants such that certain predefined sets of participants may reconstruct the image without any computation. In 2000, Blundo, De Santis, and Naor introduced a model for grey-level visual cryptography which is a generalization of visual cryptography for general access structures. Grey-level visual cryptography extends this model to include grey-scale images. Decoding is done by the human visual system. In this thesis we survey known results
APA, Harvard, Vancouver, ISO, and other styles
7

Koshta, Prashant Kumar, and Shailendra Singh Thakur. "A Novel Authenticity of an Image Using Visual Cryptography." IJCSN, 2012. http://hdl.handle.net/10150/219514.

Full text
Abstract:
Information security in the present era is becoming very important in communication and data storage. Data transferred from one party to another over an insecure channel (e.g., Internet) can be protected by cryptography. The encrypting technologies of traditional and modern cryptography are usually used to avoid the message from being disclosed. Public-key cryptography usually uses complex mathematical computations to scramble the message.<br>A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentic
APA, Harvard, Vancouver, ISO, and other styles
8

Maheshwari, Varun. "Data confidentiality and keyword search in the cloud using visual cryptography." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106553.

Full text
Abstract:
Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. Current cloud framework does not allow encrypted data to be stored due to the absence of efficient searchable encryption schemes that allow query execution on a cloud database. Storing unencrypted data exposes the data not only to an external attacker but also to the cloud provider itself. Thus, trusting a provider with confidential data is highly risky. To enable querying on a cloud database without compromising data confidentiality, we propose to use data obfuscation through visual cryp
APA, Harvard, Vancouver, ISO, and other styles
9

Leung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.

Full text
Abstract:
Thesis (M.Phil.)--City University of Hong Kong, 2009.<br>"Submitted to Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Philosophy." Includes bibliographical references (leaves 103-108)
APA, Harvard, Vancouver, ISO, and other styles
10

Potay, Sunny. "Efficient algorithm to construct phi function in vector space secret sharing scheme and application of secret sharing scheme in Visual Cryptography." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1151.

Full text
Abstract:
Secret Sharing refers to a method through which a secret key K can be shared among a group of authorized participants, such that when they come together later, they can figure out the secret key K to decrypt the encrypted message. Any group which is not authorized cannot determine the secret key K. Some of the important secret schemes are Shamir Threshold Scheme, Monotone Circuit Scheme, and Brickell Vector Space Scheme. Brikell’s vector space secret sharing construction requires the existence of a function from a set of participant P in to vector space Zdp, where p is a prime number and d is
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Visual cryptography"

1

Yan, Bin, Yong Xiang, and Guang Hua. Improving Image Quality in Visual Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-8289-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

K, kokula Krishna Hari, ed. Multi-secret Semantic Visual Cryptographic Protocol for Securing Image Communications: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

KUMAR, Pratheek PRAVEEN. Steganography Using Visual Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhagat, Ruchir Ruchir, Shiksha Shiksha Suvarna, and Pratheek Praveen Pratheek Praveen Kumar. Steganography Using Visual Cryptography. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Pratheek Praveen. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Pratheek Praveen, Ruchir Bhagat, and Shiksha Suvarna. Steganography Using Visual Cryptography. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Pratheek Praveen, Shiksha SUVARNA, and Ruchir BHAGAT. Steganography Using Visual Cryptography. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Visual cryptography"

1

D’Arco, Paolo, and Roberto De Prisco. "Visual Cryptography." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47238-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Othman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics. Springer US, 2014. http://dx.doi.org/10.1007/978-3-642-27733-7_9077-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Naor, Moni, and Adi Shamir. "Visual cryptography." In Advances in Cryptology — EUROCRYPT'94. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/bfb0053419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mihailescu, Marius Iulian, and Stefania Loredana Nita. "Visual Cryptography." In Cryptography and Cryptanalysis in MATLAB. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7334-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Othman, Asem, and Arun Ross. "Visual Cryptography." In Encyclopedia of Biometrics. Springer US, 2015. http://dx.doi.org/10.1007/978-1-4899-7488-4_9077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Biehl, Ingrid, and Susanne Wetzel. "Traceable visual cryptography." In Information and Communications Security. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0028462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Freeman, Adam. "Cryptography and Security." In Introducing Visual C# 2010. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3172-1_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jones, Allen, and Adam Freeman. "Security and Cryptography." In Visual C# 2010 Recipes. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2526-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09644-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Feng, and Wei Qi Yan. "Various Visual Cryptography Schemes." In Visual Cryptography for Image Processing and Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23473-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Visual cryptography"

1

Liu, Mengyao, and Peijun Zhao. "Quantum color visual cryptography scheme." In 2025 5th International Conference on Applied Mathematics, Modelling and Intelligent Computing (CAMMIC 2025), edited by Peicheng Zhu and Guihua Lin. SPIE, 2025. https://doi.org/10.1117/12.3070563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

R, Rajesh, Aaditya Kannan, Adithya S. Nair, Adittya Narayan, Sarvesh M, and Varun Vetrivendan. "Secure Web Authentication Using Visual Cryptography." In 2024 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2024. https://doi.org/10.1109/icscan62807.2024.10894432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Raj, Manisha, Indu Bhardwaj, and Dinesh Singh. "Design and Implementation of Visual Cryptography scheme." In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT). IEEE, 2024. http://dx.doi.org/10.1109/iceect61758.2024.10739293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

AXENTI, Ilie, and Olga CERBU. "Criptografia vizuală." In Materialele Conferinţei Ştiinţifice Internaţionale "Abordări inter/transdisciplinare în predarea ştiinţelor reale, (concept STEAM)". Ion Creangă Pedagogical State University, 2024. https://doi.org/10.46727/c.steam-2024.p249-253.

Full text
Abstract:
Visual Cryptography (VC) is a cryptographic methodology that enables the encryption of visual information, such as text, images, etc., so that decryption can be performed by the human visual system without the assistance of computers. The purpose of this study is to provide readers with an overview of the first method of visual cryptography, along with various methods developed and proposed over time. This paper also offers a study of applications based on the concept of Visual Cryptography.
APA, Harvard, Vancouver, ISO, and other styles
5

Ashutosh and Sayan Dev Sen. "Visual Cryptography." In 2008 International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2008. http://dx.doi.org/10.1109/icacte.2008.184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hsu, Shuo-Fang, Yu-Jie Chang, Ran-Zan Wang, Yeuan-Kuen Lee, and Shih-Yu Huang. "Verifiable Visual Cryptography." In 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2012. http://dx.doi.org/10.1109/icgec.2012.150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Ankit, and Kshitiz Saxena. "Region incrementing visual cryptography." In 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom). IEEE, 2014. http://dx.doi.org/10.1109/medcom.2014.7006012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Guangyu, Feng Liu, and Wei Qi Yan. "Braille for Visual Cryptography." In 2014 IEEE International Symposium on Multimedia (ISM). IEEE, 2014. http://dx.doi.org/10.1109/ism.2014.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Du, Ruofei, Eric Lee, and Amitabh Varshney. "Tracking-Tolerant Visual Cryptography." In 2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR). IEEE, 2019. http://dx.doi.org/10.1109/vr.2019.8797924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arce, Gonzalo R., Zhi Zhou, and Giovanni Di Crescenzo. "Visual cryptography via halftoning." In Electronic Imaging 2004, edited by Reiner Eschbach and Gabriel G. Marcu. SPIE, 2003. http://dx.doi.org/10.1117/12.532655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!