Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,241,995 papers from all fields of science
Search
Sign In
Create Free Account
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
One-time pad
Outline of cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2010
Review
2010
Survey of Visual Cryptography Schemes
P. S. Revenkar
,
A. Anjum
,
W. Gandhare
2010
Corpus ID: 17440309
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes…
Expand
2010
2010
Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns
Thomas Monoth
,
B. P.
International Conference on Cyberworlds
2010
Corpus ID: 20250819
Visual cryptography is a kind of secret image sharing scheme that uses the human visual system to perform the decryption…
Expand
2010
2010
Pixel sieve method for secret sharing & visual cryptography
A. Incze
9th RoEduNet IEEE International Conference
2010
Corpus ID: 27430462
Secret sharing and visual cryptography although they are two different type of cryptographic methods most of the time they are…
Expand
2009
2009
A Recursive Threshold Visual Cryptography Scheme
A. Parakh
,
S. Kak
IACR Cryptology ePrint Archive
2009
Corpus ID: 9688268
This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes…
Expand
2009
2009
A Watermarking Technique based on Visual Cryptography
B. Surekha
,
G. Swamy
,
K. S. Rao
,
A. Kumar
2009
Corpus ID: 123993023
With the explosive growth of internet technology robust methods are being developed to protect the proprietary rights of the…
Expand
Highly Cited
2008
Highly Cited
2008
Color Visual Cryptography Scheme Using Meaningful Shares
Hsien-Chu Wu
,
Hao-Cheng Wang
,
Ruihua Yu
Eighth International Conference on Intelligent…
2008
Corpus ID: 5200590
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The secret image can be…
Expand
2008
2008
HSV Image Watermarking Scheme Based on Visual Cryptography
Rawan I. Zaghloul
,
Enas Faisal AlRawashdeh
2008
Corpus ID: 11898749
—In this paper a simple watermarking method for color images is proposed. The proposed method is based on watermark embedding for…
Expand
Highly Cited
2007
Highly Cited
2007
Recursive Visual Cryptography Using Random Basis Column Pixel Expansion
Thomas Monoth
,
Anto P. Babu
10th International Conference on Information…
2007
Corpus ID: 13898627
In this paper we present a new method for a visual cryptography scheme that uses random basis column pixel expansion technique…
Expand
2006
2006
Visual Cryptography Based on Void-And-Cluster Halftoning Technique
E. Myodo
,
S. Sakazawa
,
Y. Takishima
International Conference on Information Photonics
2006
Corpus ID: 17819195
In this paper, visual cryptography for halftone images is proposed, which uses threshold arrays generated by a void-and-cluster…
Expand
2006
2006
Halftone Visual Cryptography Through Error Diffusion
Zhongmin Wang
,
G. Arce
International Conference on Information Photonics
2006
Corpus ID: 5807095
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE