2021
DOI: 10.1007/s11042-021-11229-9
|View full text |Cite
|
Sign up to set email alerts
|

An overview of visual cryptography techniques

Abstract: Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(15 citation statements)
references
References 116 publications
0
10
0
Order By: Relevance
“…The system was tested on (2,2), (3,3), and (4,4) thresholds, where the images {b, e}, {a, c, e}, {a, b, c, d} are used for each threshold, respectively. In the case of (4,4)-threshold for 512 × 512 images, the used four secret images are shown in Fig.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The system was tested on (2,2), (3,3), and (4,4) thresholds, where the images {b, e}, {a, c, e}, {a, b, c, d} are used for each threshold, respectively. In the case of (4,4)-threshold for 512 × 512 images, the used four secret images are shown in Fig.…”
Section: Security Analysismentioning
confidence: 99%
“…A threshold defines how many shares out of the n shares are needed to recover the secret. (k, n)-SIS requires k or more shares to recover the secret, while (n, n)-SIS requires all the shares to recover the secret [3].…”
Section: Introductionmentioning
confidence: 99%
“… Visual cryptographic schemes still needs to address the problem of efficiently encrypting multiple secrets and pixel expansion [Ibrahim et al (2021)].  Visual cryptography based schemes needs further improvements in optimization of the designing schemes ,algorithms and further applying them in real-time applications [Goon et al (2022)].…”
Section: 1mentioning
confidence: 99%
“…Simulation models that illustrate the basic principles of OTP algorithms have been realised in CrypTool software [13], with an emphasis on the case of repeated use of a one-time key. We also include an example of processing an electronic financial transaction using OTP, where confidential information is shared using the visual cryptography technique [14] [15].…”
Section: Edtech Journalmentioning
confidence: 99%