CFP last date
22 April 2024
Reseach Article

Visual Cryptography Survey

by Rizwan Shaikh, Shreyas Siddh, Tushar Ravekar, Sanket Sugaonkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 2
Year of Publication: 2016
Authors: Rizwan Shaikh, Shreyas Siddh, Tushar Ravekar, Sanket Sugaonkar
10.5120/ijca2016907806

Rizwan Shaikh, Shreyas Siddh, Tushar Ravekar, Sanket Sugaonkar . Visual Cryptography Survey. International Journal of Computer Applications. 134, 2 ( January 2016), 10-12. DOI=10.5120/ijca2016907806

@article{ 10.5120/ijca2016907806,
author = { Rizwan Shaikh, Shreyas Siddh, Tushar Ravekar, Sanket Sugaonkar },
title = { Visual Cryptography Survey },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 2 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number2/23885-2016907806/ },
doi = { 10.5120/ijca2016907806 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:02.143035+05:30
%A Rizwan Shaikh
%A Shreyas Siddh
%A Tushar Ravekar
%A Sanket Sugaonkar
%T Visual Cryptography Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 2
%P 10-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is a process of transforming original information into a format such that it is only read by the desired recipient. It is used to protect information from other people for security purpose. Visual cryptography is a method which is used to encrypt information in any format like text, image, led display such that decryption is done by human eye. It does not require any key for decryption. Visual cryptography is mainly of two types segment based visual cryptography, pixel based visual cryptography. Initially this method was developed only for monochrome images then it was upgraded to grey level and then coloured images. As it does not require any key to decrypt that is why this method is unbreakable. This method is useful in vast applications which handle high value assets. It can replace the second factor that is token or key in multifactor authentication system. It can be used in online shopping sites, online banking sites, government sites. This paper gives detailed survey of visual cryptography methods and their applications.

References
  1. Ollmann G., “The Phishing Guide Understanding &Preventing Phishing Attacks”, NGS Software Insight Security Research, IBM Global Technology Services.
  2. M. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptology EUROCRYPT, 1994, Proceeding, LNCS vol. 950, Springer-Verlag, 1995, pp. 1–12.
  3. G. R. Blakley, “Safeguarding Cryptographic Keys”, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
  4. B. Borchert, “Segment Based Visual Cryptography”, WSI Press, Germany, 2007.
  5. W-Q Yan, D. Jin and M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, IEEE Transactions, ISCAS-2004, pp.572-575.
  6. T. Monoth and A. P. Babu, “Recursive Visual Cryptography Using Random Basis Column Pixel Expansion”, In Proceedings of IEEE International Conference on Information Technology, 2007, pp. 41-43.
  7. C. Blundo and A. De Santis, “On the contrast in Visual Cryptography Schemes”, In Journal on Cryptography, vol.12, 1999, pp. 261-289.
  8. C. M. Hu and W. G. Tzeng, “Cheating Prevention in Visual Cryptography”, IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007, pp.36-45.
  9. S. S. Hegde, Bhaskar Rao, “Cloud Security Using Visual Cryptography”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012,pp.9- 13.
  10. Sian-Jheng Lin and Wei-Ho Chung, “A Probabilistic Model of (t, n) Visual Cryptography Scheme With Dynamic Group”, IEEE Transactions on Information Forensics and Security, vol. 7, No. 1, February 2012, pp.197-207.
Index Terms

Computer Science
Information Sciences

Keywords

Visual cryptography segment security secret sharing.