A Comprehensive Study on Various Visual cryptography Schemes with an Application

This paper is study of the different kinds of Visual cryptography schemes and it focuses on all the techniques together as a literature survey. It intends an extensive experimental study of various available Visual Secret Sharing techniques. Also focuses on the encryption techniques that are used in each scheme. Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. Intent of this paper is study and performance analysis of the visual cryptography schemes on the basis of pixel expansion, number of secret images, image format and type of shares generated.

[1]  Azzam Sleit A Visual Cryptography Based Watermark Technology for Individual and Group Images , 2007 .

[2]  Mahmoud A. Hassan,et al.  Self Watermarking based on Visual Cryptography , 2007 .

[3]  Pei-Ling Chiu,et al.  A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..

[4]  Yen-Ping Chu,et al.  A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..

[5]  Tzung-Her Chen,et al.  Visual secret sharing by random grids revisited , 2009, Pattern Recognit..

[6]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[7]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[8]  Ren-Junn Hwang,et al.  A Digital Image Copyright Protection Scheme Based on Visual Cryptography , 2000 .

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Der-Chyuan Lou,et al.  A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares , 2011, Displays.

[11]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[12]  Gwoboa Horng,et al.  A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..

[13]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[14]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[15]  Young-Chang Hou,et al.  An asymmetric watermarking scheme based on visual cryptography , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.

[16]  Jen-Bang Feng,et al.  Visual secret sharing for multiple secrets , 2008, Pattern Recognit..

[17]  S-F Tua,et al.  Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images , 2007 .

[18]  Ja-Ling Wu,et al.  Unseen Visible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.

[19]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[20]  Kuang Tsan Lin Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.