AN OVERVIEW OF VISUAL CRYPTOGRAPHY

Chandramathi S.1, Ramesh Kumar R2, Suresh R.3, Harish S.4
1
2
3
4

Received : -     Accepted : -     Published : 15-06-2010
Volume : 1     Issue : 1       Pages : 32 - 37
Int J Comput Intell Tech 1.1 (2010):32-37

Keywords : Contrast, Shares, Pixels, Secret sharing, stacking
Conflict of Interest : None declared

Cite - MLA : Chandramathi S., et al "AN OVERVIEW OF VISUAL CRYPTOGRAPHY." International Journal of Computational Intelligence Techniques 1.1 (2010):32-37.

Cite - APA : Chandramathi S., Ramesh Kumar R, Suresh R., Harish S. (2010). AN OVERVIEW OF VISUAL CRYPTOGRAPHY. International Journal of Computational Intelligence Techniques, 1 (1), 32-37.

Cite - Chicago : Chandramathi S., Ramesh Kumar R, Suresh R., and Harish S. "AN OVERVIEW OF VISUAL CRYPTOGRAPHY." International Journal of Computational Intelligence Techniques 1, no. 1 (2010):32-37.

Copyright : © 2010, Chandramathi S., et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Security has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area.

References

[1] Naor, M., and Shamir, A. (1995), Visual cryptography, in ‘‘Advances in Cryptogoly Eurocrypt ’94’’ (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1 12, Springer-Verlag, Berlin  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] G.Ateniese,C.Blundo,A.DeSantis,D.R.S tinson,Visualcryptographyforgeneral accessstructures, Proc.ICALP96,Springer,Berlin,1996, pp.416-428  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Chang-Chou Lin , Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques Pattern Recognition Letters, v.24 n.1-3  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Abhishek Parakh, Subhash Kak: A Recursive Threshold Visual Cryptography Scheme CoRR abs/0902.2487: (2009).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Nakajima, M. and Yamaguchi, Y., Extended visual cryptography for natural images. Journal of WSCG. v10 i2. 303-310  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Jin, D., Yan, W. and Kankanhalli, M.S., Progressive color visual cryptography. J. Electron. Imaging. v14 i3.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Wang, R.Z.[Ran-Zan], Region Incrementing Visual Cryptography, SPLetters(16), No. 8, August 2009, pp. 659-662  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Bernd Borchert, Klaus Reinhardt: Abh or- und manipulation ssichere Verschl usselung f ur Online Accounts. Patent application DE-10- 2007-018802.3, 2007  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] HU Chih-Ming, TZENG Wen-Guey, “Cheating prevention in visual cryptography”, IEEE transactions on image processing ISSN 1057-7149 ,2007, vol. 16, no1, pp. 36-45.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus