2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2014
DOI: 10.1109/iccicct.2014.6992960
|View full text |Cite
|
Sign up to set email alerts
|

An extensive review on visual cryptography schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…There are numerous types of VC schemes. For example, there is the k-out-of-n scheme, in which k refers to the number of shares that should be stacked to decrypt the secret image, and n refers to the shares that will be produced, 2-out-of-2 and n-out-of-n [10]. In this paper, the 2-out-of-2 scheme is selected due to its transparency in terms of describing the idea of VC and the security level that can be provided.…”
Section: A Vc Schemes In Use: An Overviewmentioning
confidence: 99%
“…There are numerous types of VC schemes. For example, there is the k-out-of-n scheme, in which k refers to the number of shares that should be stacked to decrypt the secret image, and n refers to the shares that will be produced, 2-out-of-2 and n-out-of-n [10]. In this paper, the 2-out-of-2 scheme is selected due to its transparency in terms of describing the idea of VC and the security level that can be provided.…”
Section: A Vc Schemes In Use: An Overviewmentioning
confidence: 99%
“…The recovered image has less contrast and experiences a loss of resolution as compared to secret image. This parameter also reflects upon the size of the recovered image, which ideally should be as close as possible to the original secret [83]. Pixel expansion can cause many problems such as image distortion, more storage space, and higher complexity in generating shares.…”
Section: Visual Cryptography Metricsmentioning
confidence: 99%