Survey of Visual Cryptography Schemes

@inproceedings{Revenkar2010SurveyOV,
  title={Survey of Visual Cryptography Schemes},
  author={P. S. Revenkar and Anisa Anjum and W. Z. Gandhare},
  year={2010}
}
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion, contrast, security, accuracy, computational complexity, share generated is meaningful or meaningless, type of secret… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

A Fast and Efficient Data Hiding Scheme in Binary Images

2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing • 2012
View 6 Excerpts
Highly Influenced

Probabilistic secret sharing scheme for binary images

2015 Communication, Control and Intelligent Systems (CCIS) • 2015
View 1 Excerpt

Authentication in Insecure Environments

Springer Fachmedien Wiesbaden • 2014

Character-based search with data confidentiality in the clouds

4th IEEE International Conference on Cloud Computing Technology and Science Proceedings • 2012
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 27 references

Bit-level based secret sharing for image encryption

Pattern Recognition • 2005
View 4 Excerpts
Highly Influenced

A Study On Visual Cryptography

C. C. Wu, L. H. Chen
Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C. • 1998
View 4 Excerpts
Highly Influenced

Visual Cryptography”, advances in cryptology– Eurocrypt, pp 1-12,1995

Moni Naor, Adi Shamir
1995
View 7 Excerpts
Highly Influenced

Two Kinds of Ideal Contrast Visual Cryptography Schemes

2009 International Conference on Signal Processing Systems • 2009
View 3 Excerpts
Highly Influenced

Visual Cryptography in reversible style

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) • 2007
View 7 Excerpts
Highly Influenced

The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing

IEEE International Conference on Networking, Sensing and Control, 2004 • 2004
View 3 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…