To see the other types of publications on this topic, follow the link: Visual cryptography.

Journal articles on the topic 'Visual cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Visual cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Et. al., Mandru Manisha,. "Colour Visual Cryptography (3,3) Scheme." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3189–98. http://dx.doi.org/10.17762/turcomat.v12i2.2374.

Full text
Abstract:
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique.
APA, Harvard, Vancouver, ISO, and other styles
2

Priya, R. Shanmuga, and A. Senthilkumar. "A Study on Visual Cryptography for Colour Images." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 260. http://dx.doi.org/10.23956/ijarcsse/v7i7/0172.

Full text
Abstract:
The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated it is meaningless or meaningful. Encryption performed by image processing techniques and the decryption carried out by human visual system with the stacking images. Visual cryptography need not require any complicated cryptographic proficiency. So, the intruders or hackers get hard to hack the details programmatically. However, this papers deals with visual cryptography for colour images.
APA, Harvard, Vancouver, ISO, and other styles
3

Pawar, Shital B., and Prof N. M. Shahane. "Visual Secret Sharing Using Cryptography." International Journal of Engineering Research 3, no. 1 (January 1, 2014): 31–33. http://dx.doi.org/10.17950/ijer/v3s1/108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shi, Yi-Shi, and Xiu-Bo Yang. "Invisible Visual Cryptography *." Chinese Physics Letters 34, no. 11 (November 2017): 114204. http://dx.doi.org/10.1088/0256-307x/34/11/114204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shaikh, Rizwan, Shreyas Siddh, Tushar Ravekar, and Sanket Sugaonkar. "Visual Cryptography Survey." International Journal of Computer Applications 134, no. 2 (January 15, 2016): 10–12. http://dx.doi.org/10.5120/ijca2016907806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhi Zhou, G. R. Arce, and G. Di Crescenzo. "Halftone visual cryptography." IEEE Transactions on Image Processing 15, no. 8 (August 2006): 2441–53. http://dx.doi.org/10.1109/tip.2006.875249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ran-Zan Wang and Shuo-Fang Hsu. "Tagged Visual Cryptography." IEEE Signal Processing Letters 18, no. 11 (November 2011): 627–30. http://dx.doi.org/10.1109/lsp.2011.2166543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Uno, Katsuhiro, and Hoang Hoa Tien Dung. "Visual Cryptography by Speckle Pattern Illumination." Journal of the Institute of Industrial Applications Engineers 4, no. 1 (January 25, 2016): 26–32. http://dx.doi.org/10.12792/jiiae.4.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aswad, Firas Mohammed, Ihsan Salman, and Salama A. Mostafa. "An optimization of color halftone visual cryptography scheme based on Bat algorithm." Journal of Intelligent Systems 30, no. 1 (January 1, 2021): 816–35. http://dx.doi.org/10.1515/jisys-2021-0042.

Full text
Abstract:
Abstract Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance the visual quality and avoid the problems of cross-interference and pixel expansion of the share images. It introduces a novel optimization of color halftone visual cryptography (OCHVC) scheme by using two proposed techniques: hash codebook and construction techniques. The new techniques distribute the information pixels of a secret image into a halftone cover image randomly based on a bat optimization algorithm. The results show that these techniques have enhanced security levels and make the proposed OCHVC scheme more robust against different attacks. The OCHVC scheme achieves mean squared error (MSE) of 95.0%, peak signal-to-noise ratio (PSNR) of 28.3%, normalized cross correlation (NCC) of 99.4%, and universal quality index (UQI) of 99.3% on average for the six shares. Subsequently, the experiment results based on image quality metrics show improvement in size, visual quality, and security for retrieved secret images and meaningful share images of the OCHVC scheme. Comparing the proposed OCHVC with some related works shows that the OCHVC scheme is more effective and secure.
APA, Harvard, Vancouver, ISO, and other styles
10

Vaya, Dipesh, Sarika Khandelwal, and Teena Hadpawat. "Visual Cryptography: A Review." International Journal of Computer Applications 174, no. 5 (September 15, 2017): 40–43. http://dx.doi.org/10.5120/ijca2017915406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hikmat, Yaseen, and Muna Mahmood. "Binary Image Visual Cryptography." International Journal of Computer Applications 177, no. 6 (November 15, 2017): 34–39. http://dx.doi.org/10.5120/ijca2017915785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Soman, Nidhin, and Smruthy Baby. "XOR-Based Visual Cryptography." International Journal on Cybernetics & Informatics 5, no. 2 (April 30, 2016): 253–64. http://dx.doi.org/10.5121/ijci.2016.5228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shah, Sanket. "VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY." International Journal of Advanced Research in Computer Science 9, no. 5 (October 20, 2018): 9–13. http://dx.doi.org/10.26483/ijarcs.v9i5.6286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jin, Duo. "Progressive color visual cryptography." Journal of Electronic Imaging 14, no. 3 (July 1, 2005): 033019. http://dx.doi.org/10.1117/1.1993625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, F., C. K. Wu, and X. J. Lin. "Colour visual cryptography schemes." IET Information Security 2, no. 4 (2008): 151. http://dx.doi.org/10.1049/iet-ifs:20080066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Jia, Xingxing, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. "Collaborative Visual Cryptography Schemes." IEEE Transactions on Circuits and Systems for Video Technology 28, no. 5 (May 2018): 1056–70. http://dx.doi.org/10.1109/tcsvt.2016.2631404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Horng, Gwoboa, Tzungher Chen, and Du-shiau Tsai. "Cheating in Visual Cryptography." Designs, Codes and Cryptography 38, no. 2 (February 2006): 219–36. http://dx.doi.org/10.1007/s10623-005-6342-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Klein, Andreas, and Markus Wessler. "Extended visual cryptography schemes." Information and Computation 205, no. 5 (May 2007): 716–32. http://dx.doi.org/10.1016/j.ic.2006.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Bin, Ralph R. Martin, Ji-Wu Huang, and Shi-Min Hu. "Structure Aware Visual Cryptography." Computer Graphics Forum 33, no. 7 (October 2014): 141–50. http://dx.doi.org/10.1111/cgf.12482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cimato, S., R. De Prisco, and A. De Santis. "Probabilistic Visual Cryptography Schemes." Computer Journal 49, no. 1 (December 1, 2005): 97–107. http://dx.doi.org/10.1093/comjnl/bxh152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ran-Zan Wang. "Region Incrementing Visual Cryptography." IEEE Signal Processing Letters 16, no. 8 (August 2009): 659–62. http://dx.doi.org/10.1109/lsp.2009.2021334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Yengisetty, Subba Rao V., and Bimal K. Roy. "Applications of visual cryptography." International Journal of Parallel, Emergent and Distributed Systems 26, no. 5 (October 2011): 429–42. http://dx.doi.org/10.1080/17445760.2011.574628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lu, Steve, Daniel Manchala, and Rafail Ostrovsky. "Visual cryptography on graphs." Journal of Combinatorial Optimization 21, no. 1 (June 18, 2009): 47–66. http://dx.doi.org/10.1007/s10878-009-9241-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Dhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.

Full text
Abstract:
Now a day‟s the uses of devices such as computer, mobile and many more other device for communication as well as for data storage and transmission has increases. As a result there is increase in no of user‟s also there is increase in no of unauthorized user‟s which are trying to access a data by unfair means. This arises the problem of data security. To solve this problem a data is stored or transmitted in the encrypted format. This encrypted data is unreadable to the unauthorized user. Cryptography is a science of information security which secures the data while the data is being transmitted and stored. There are two types of cryptographic mechanisms: symmetric key cryptography in which the same key is use for encryption and decryption. In case of asymmetric key cryptography two different keys are used for encryption and decryption. Symmetric key algorithm is much faster and easier to implement and required less processing power as compare to asymmetric key algorithm. The Advanced Encryption Standard (AES) was published by the National Institute of Standards and Technology (NIST) in 2001. This types of cryptography relies on two different keys for encryption and decryption. Finally, cryptographic hash function using no key instead key it is mixed the data.
APA, Harvard, Vancouver, ISO, and other styles
25

A, Soundarya B., Sowmeya D, and Yazhini G. V. "Visual Cryptography for Image Processing: A Survey." International Journal of Trend in Scientific Research and Development Volume-2, Issue-1 (December 31, 2017): 1417–21. http://dx.doi.org/10.31142/ijtsrd8206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Brindha, K., and N. Jeyanthi. "Secret Image Enhanced Sharing Using Visual Cryptography." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 128–39. http://dx.doi.org/10.1515/cait-2017-0034.

Full text
Abstract:
Abstract In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image becomes accessible to every individual member and there is an inherent risk of any one of the members in the group using the valuable information for illegal purposes as an intruder. To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group to retrieve either only a part or the complete secret image based purely on his access privilege rights only.
APA, Harvard, Vancouver, ISO, and other styles
27

Sona Josh, Sreelakshmi V, Hajira Hazeena, and Binny S. "E-Commerce Transaction Using Visual Cryptography." international journal of engineering technology and management sciences 7, no. 4 (2023): 634–38. http://dx.doi.org/10.46647/ijetms.2023.v07i04.088.

Full text
Abstract:
The abstract focuses on the concept of e-commerce transactions using visual cryptography. E-commerce has revolutionized the way businesses operate and has become an integral part of our daily lives. However, the security of online transactions remains a critical concern. Visual cryptography is a technique that allows the secure transmission of images or information through encryption and decryption processes. This abstract explores the potential of visual cryptography in enhancing the security of e-commerce transactions. It discusses the advantages and challenges of using visual cryptography and proposes a framework for implementing this technique in e-commerce platforms. The abstract concludes by highlighting the potential benefits of visual cryptography in ensuring secure and trustworthy e-commerce transactions.
APA, Harvard, Vancouver, ISO, and other styles
28

Goud, Sangeetha S., Swathi S. Patil, and S. Vishal. "Enhanced Security Scheme with Visual Cryptography and Steganography." Bonfring International Journal of Research in Communication Engineering 6, Special Issue (November 30, 2016): 120–23. http://dx.doi.org/10.9756/bijrce.8216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wang, Guangyu, Feng Liu, and Wei Qi Yan. "Basic Visual Cryptography Using Braille." International Journal of Digital Crime and Forensics 8, no. 3 (July 2016): 85–93. http://dx.doi.org/10.4018/ijdcf.2016070106.

Full text
Abstract:
As a significant part of information security, Visual Cryptography (VC) is a secret sharing approach which has the advantage of effectively obscuring hints of original secret. In VC, a secret image is separated into partitions which are also known as VC shares. The secret is only able to be revealed by superimposing certain shares. Since Basic VC is in a structure which is similar to that of Braille where white and black dots are arranged in certain orders, it is feasible to utilize the feature of Braille for the authentication of VC. In this paper, the authors will conduct an experiment embedding Braille into grayscale and halftone images as well as VC shares. The result indicates that the embedding of Braille has little impact on VC secret revealing and enhances the security of VC shares.
APA, Harvard, Vancouver, ISO, and other styles
30

Budhewar, Anmol S., and Shubhanand S. Hatkar. "Visual Cryptography Identity Specification Scheme." International Journal of Computer Sciences and Engineering 7, no. 4 (April 30, 2019): 1148–52. http://dx.doi.org/10.26438/ijcse/v7i4.11481152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sandeep, Jerripothula. "Embedded Extended Visual Cryptography Scheme." IOSR Journal of Computer Engineering 8, no. 1 (2012): 41–47. http://dx.doi.org/10.9790/0661/0814147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hammoudi, Karim, and Mahmoud Melkemi. "Personalized Shares in Visual Cryptography." Journal of Imaging 4, no. 11 (October 29, 2018): 126. http://dx.doi.org/10.3390/jimaging4110126.

Full text
Abstract:
This article deals with visual cryptography. It consists of hiding a message in two key images (also called shares). The decryption of the message is obtained through human vision by superposition of the shares. In existing methods, the surface of key images is not visually pleasant and is not exploited for communicating textual or pictorial information. Presently, we propose a pictogram-based visual cryptography technique, which generates shares textured with customizable and aesthetic rendering. Moreover, robustness characteristics of this technique to the automated decoding of the secret message are presented. Experimental results show concrete personalized shares and their applicative potentials for security and creative domains.
APA, Harvard, Vancouver, ISO, and other styles
33

Koptyra, Katarzyna, and Marek R. Ogiela. "Subliminal Channels in Visual Cryptography." Cryptography 6, no. 3 (September 16, 2022): 46. http://dx.doi.org/10.3390/cryptography6030046.

Full text
Abstract:
This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping algorithms are adequate for printed shares, but the encryption method is only suitable for digital shares. The capacity of these methods ranges from half of the image size to the whole image size. The presented algorithms work on black-and-white images but are expandable to color visual cryptography. They may find applications in steganography and other data-hiding techniques. The created subliminal channels do not interfere with regular images that may still be revealed by stacking the shares. In short, this article introduces subliminal channels in visual cryptography, presents three algorithms for both binary and colorful images, shows examples of use with the results obtained, and discusses features of each method.
APA, Harvard, Vancouver, ISO, and other styles
34

., Megha Goel. "AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY." International Journal of Research in Engineering and Technology 02, no. 11 (November 25, 2013): 271–74. http://dx.doi.org/10.15623/ijret.2013.0211041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ross, Arun, and Asem Othman. "Visual Cryptography for Biometric Privacy." IEEE Transactions on Information Forensics and Security 6, no. 1 (March 2011): 70–81. http://dx.doi.org/10.1109/tifs.2010.2097252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Feng, and Chuankun Wu. "Embedded Extended Visual Cryptography Schemes." IEEE Transactions on Information Forensics and Security 6, no. 2 (June 2011): 307–22. http://dx.doi.org/10.1109/tifs.2011.2116782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Stinson, D. "Visual cryptography and threshold schemes." IEEE Potentials 18, no. 1 (1999): 13–16. http://dx.doi.org/10.1109/45.747238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Weir, Jonathan, Weiqi Yan, and Mohan S. Kankanhalli. "Image hatching for visual cryptography." ACM Transactions on Multimedia Computing, Communications, and Applications 8, no. 2S (September 2012): 1–15. http://dx.doi.org/10.1145/2344436.2344438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Shi, Yishi, and Xiubo Yang. "Optical hiding with visual cryptography." Journal of Optics 19, no. 11 (October 4, 2017): 115703. http://dx.doi.org/10.1088/2040-8986/aa895e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bender, Andreas O. "Visual cryptography on postage stamps." ACM SIGCAS Computers and Society 45, no. 1 (February 19, 2015): 11–13. http://dx.doi.org/10.1145/2738210.2738212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, F., C. Wu, and X. Lin. "Cheating immune visual cryptography scheme." IET Information Security 5, no. 1 (2011): 51. http://dx.doi.org/10.1049/iet-ifs.2008.0064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zhou, Zhili, Ching-Nung Yang, Song-Ruei Cai, and Dao-Shun Wang. "Boolean Operation Based Visual Cryptography." IEEE Access 7 (2019): 165496–508. http://dx.doi.org/10.1109/access.2019.2951722.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Luo, Hao, Hua Chen, Yongheng Shang, Zhenfei Zhao, and Yanhua Zhang. "Color transfer in visual cryptography." Measurement 51 (May 2014): 81–90. http://dx.doi.org/10.1016/j.measurement.2014.01.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hou, Young-Chang. "Visual cryptography for color images." Pattern Recognition 36, no. 7 (July 2003): 1619–29. http://dx.doi.org/10.1016/s0031-3203(02)00258-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ateniese, Giuseppe, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson. "Extended capabilities for visual cryptography." Theoretical Computer Science 250, no. 1-2 (January 2001): 143–61. http://dx.doi.org/10.1016/s0304-3975(99)00127-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Tuyls, P., H. D. L. Hollmann, J. H. Van Lint, and L. Tolhuizen. "XOR-based Visual Cryptography Schemes." Designs, Codes and Cryptography 37, no. 1 (October 2005): 169–86. http://dx.doi.org/10.1007/s10623-004-3816-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Tharayil, Jose J., E. S. Karthik Kumar, and Neena Susan Alex. "Visual Cryptography Using Hybrid Halftoning." Procedia Engineering 38 (2012): 2117–23. http://dx.doi.org/10.1016/j.proeng.2012.06.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hajiabolhassan, Hossein, and Abbas Cheraghi. "Bounds for visual cryptography schemes." Discrete Applied Mathematics 158, no. 6 (March 2010): 659–65. http://dx.doi.org/10.1016/j.dam.2009.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ratnadewi, Christian Dio Alpha G, Darmawan Napitupulu, Heri Nurdiyanto, Nuning Kurniasih, Abdurrozaq Hasibuan, Achmad Daengs, et al. "LUC Algorithm in Visual Cryptography." Journal of Physics: Conference Series 1114 (November 2018): 012090. http://dx.doi.org/10.1088/1742-6596/1114/1/012090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hu, Chih-Ming, and Wen-Guey Tzeng. "Cheating Prevention in Visual Cryptography." IEEE Transactions on Image Processing 16, no. 1 (January 2007): 36–45. http://dx.doi.org/10.1109/tip.2006.884916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography