Visual Cryptography: A Review

In today’s world handling and security of information from attacks becomes very important aspect for the individuals. Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed. Here in this paper we are going to review an advanced method of information hiding i.e. Visual Cryptography. Visual Cryptography emerged as a special encryption technique for information hiding using images. In way that encrypted image can be decrypted by the human vision if the correct image key is used. By this cryptographic technique we can encrypt visual information (pictures, text, etc.) in a way that human visual system can perform decryption of encrypted information & no aid of computers needed. In visual cryptography a secret image is transformed into several share images. These share images are meaningful but noisy or distorted images. Combination of these share images can reveal the original secret image. This paper reviews two methods for visual cryptography of color images based on Shamir encryption method variants of k-out-of-n i.e.2-out-of-2, 2-out-of-n, n-out-of-n, and k-out-ofn scheme encryption method.

[1]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[2]  Tung-Shou Chen,et al.  The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[3]  Roopalakshmi. R Chandrasekhara A Novel Approach Of Secure Banking Application Using Visual Cryptography Against Fake Website Authenticity Theft , 2013 .

[4]  HuangShih-Yu,et al.  Sharing multiple secrets in visual cryptography , 2007 .

[5]  Yuliang Zheng,et al.  Human-Machine Identification using Visual Cryptography , 1998 .

[6]  Xiaobo Li,et al.  On general construction for extended visual cryptography schemes , 2009, Pattern Recognit..

[7]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[8]  Elaine Shi,et al.  ShadowCrypt: Encrypted Web Applications for Everyone , 2014, CCS.

[9]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[10]  Sarika Khandelwal,et al.  A Fast and Hardware-Efficient Visual Cryptography Scheme for Images , 2016 .

[11]  Awadhesh Srivastava,et al.  A secret sharing scheme for secure transmission of color images , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[12]  Munaga V. N. K. Prasad,et al.  Extended Visual Cryptography Scheme for Multi-secret Sharing , 2016 .

[13]  Mudassira Karishma,et al.  A Keyless Approach to Image Encryption , 2014 .