Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,828 papers from all fields of science
Search
Sign In
Create Free Account
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
One-time pad
Outline of cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Visual Cryptography Schemes with Perfect Reconstruction of Black Pixels
S. Anu
2014
Corpus ID: 15764862
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for…
Expand
2013
2013
Data hiding in error diffused color halftone images
Yuanfang Guo
,
O. Au
,
+5 authors
Xingyu Zhang
International Symposium on Circuits and Systems
2013
Corpus ID: 20568485
Halftone image watermarking has been explored and developed rapidly over the past decade. However, there are still issues to be…
Expand
Review
2010
Review
2010
Survey of Visual Cryptography Schemes
P. S. Revenkar
,
A. Anjum
,
W. Gandhare
2010
Corpus ID: 17440309
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes…
Expand
2010
2010
New Visual Cryptography Algorithm For Colored Image
S. Abdulla
arXiv.org
2010
Corpus ID: 13987998
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple…
Expand
2009
2009
A Recursive Threshold Visual Cryptography Scheme
A. Parakh
,
S. Kak
IACR Cryptology ePrint Archive
2009
Corpus ID: 9688268
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes…
Expand
2009
2009
A Watermarking Technique based on Visual Cryptography
B. Surekha
,
G. Swamy
,
K. S. Rao
,
A. Kumar
2009
Corpus ID: 123993023
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the…
Expand
2008
2008
HSV Image Watermarking Scheme Based on Visual Cryptography
Rawan I. Zaghloul
,
Enas Faisal AlRawashdeh
2008
Corpus ID: 11898749
—In this paper a simple watermarking method for color images is proposed. The proposed method is based on watermark embedding for…
Expand
2006
2006
Visual Cryptography Based on Void-And-Cluster Halftoning Technique
E. Myodo
,
S. Sakazawa
,
Y. Takishima
International Conference on Information Photonics
2006
Corpus ID: 17819195
In this paper, visual cryptography for halftone images is proposed, which uses threshold arrays generated by a void-and-cluster…
Expand
Review
2005
Review
2005
A SHORT SURVEY ON VISUAL CRYPTOGRAPHY SCHEMES
Jim Cai
2005
Corpus ID: 5562092
Visual Cryptography Scheme (VCS) is an encryption method that uses combinatorial techniques to encode secret written materials…
Expand
2000
2000
An Application of Visual Cryptography To Financial Documents
L. Hawkes
,
A. Yasinsac
,
C. Cline
2000
Corpus ID: 17409883
VCRYPT, an application of visual cryptography, is described as a means of transmitting financial documents where moderate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE