Chandramathi S.1, Ramesh Kumar R2, Suresh R.3, Harish S.4
1
2
3
4
Received : - Accepted : - Published : 15-06-2010
Volume : 1 Issue : 1 Pages : 32 - 37
Int J Comput Intell Tech 1.1 (2010):32-37
Keywords : Contrast, Shares, Pixels, Secret sharing, stacking
Conflict of Interest : None declared
Security has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area.
[1] Naor, M., and Shamir, A. (1995), Visual
cryptography, in ‘‘Advances in
Cryptogoly Eurocrypt ’94’’ (A. De
Santis, Ed.), Lecture Notes in
Computer Science, Vol. 950, pp. 1
12, Springer-Verlag, Berlin
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] G.Ateniese,C.Blundo,A.DeSantis,D.R.S
tinson,Visualcryptographyforgeneral
accessstructures,
Proc.ICALP96,Springer,Berlin,1996,
pp.416-428
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] Chang-Chou Lin , Wen-Hsiang Tsai,
Visual cryptography for gray-level
images by dithering techniques Pattern Recognition Letters, v.24
n.1-3
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] Abhishek Parakh, Subhash Kak: A
Recursive Threshold Visual
Cryptography Scheme CoRR
abs/0902.2487: (2009).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] Nakajima, M. and Yamaguchi, Y.,
Extended visual cryptography for
natural images. Journal of WSCG.
v10 i2. 303-310
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] Jin, D., Yan, W. and Kankanhalli, M.S.,
Progressive color visual
cryptography. J. Electron. Imaging.
v14 i3.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[7] Wang, R.Z.[Ran-Zan], Region
Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009,
pp. 659-662
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[8] Bernd Borchert, Klaus Reinhardt: Abh
or- und manipulation ssichere
Verschl usselung f ur Online
Accounts. Patent application DE-10-
2007-018802.3, 2007
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[9] HU Chih-Ming, TZENG Wen-Guey,
“Cheating prevention in visual
cryptography”, IEEE transactions on
image processing ISSN 1057-7149
,2007, vol. 16, no1, pp. 36-45.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus