Visual Cryptography - Models, Issues, Applications and New Directions

Since its introduction, visual cryptography has received considerable attention within the cryptographic community. In this paper we give a quick look at the salient moments of its history, focusing on the main models, on open issues, on its applications and on some prospec-

[1]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[2]  Ching-Nung Yang,et al.  Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion , 2005, Pattern Recognit. Lett..

[3]  Alfredo De Santis,et al.  Visual Cryptography for General Access Structures , 1996, Inf. Comput..

[4]  Paolo D'Arco,et al.  Secure Two-Party Computation: A Visual Way , 2013, ICITS.

[5]  Stelvio Cimato,et al.  Ideal contrast visual cryptography schemes with reversing , 2005, Inf. Process. Lett..

[6]  Hans Ulrich Simon,et al.  Construction of visual secret sharing schemes with almost optimal contrast , 2000, SODA '00.

[7]  Xiaotian Wu,et al.  Random grid-based visual secret sharing for general access structures with cheat-preventing ability , 2012, J. Syst. Softw..

[8]  Alfredo De Santis,et al.  Color visual cryptography schemes for black and white secret images , 2013, Theor. Comput. Sci..

[9]  Alfredo De Santis,et al.  Measure-independent characterization of contrast optimal visual cryptography schemes , 2013, J. Syst. Softw..

[10]  Stelvio Cimato,et al.  Visual cryptography schemes with optimal pixel expansion , 2006, Theor. Comput. Sci..

[11]  D. Stinson Visual cryptography and threshold schemes , 1999 .

[12]  Somnath Sikdar,et al.  A New (2, n)-Visual Threshold Scheme for Color Images , 2003, INDOCRYPT.

[13]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[14]  Hans Ulrich Simon,et al.  Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography , 2000, Combinatorics, Probability and Computing.

[15]  Yvo Desmedt,et al.  Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography , 2016, ICITS.

[16]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[17]  Eli,et al.  Visual Cryptography with Polarization , 1998 .

[18]  Alfredo De Santis,et al.  Contrast Optimal Threshold Visual Cryptography Schemes , 2003, SIAM J. Discret. Math..

[19]  Ching-Nung Yang,et al.  Size-Adjustable Visual Secret Sharing Schemes , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[20]  Ran-Zan Wang,et al.  Sharing multiple secrets in visual cryptography , 2007, Pattern Recognit..

[21]  Alfredo De Santis,et al.  Extended Schemes for Visual Cryptography , 1995 .

[22]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[23]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[24]  Alfredo De Santis,et al.  On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.

[25]  Tzung-Her Chen,et al.  Yet Another Friendly Progressive Visual Secret Sharing Scheme , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[26]  Kaoru Kurosawa,et al.  Almost Ideal Contrast Visual Cryptography with Reversing , 2004, CT-RSA.

[27]  Alfredo De Santis,et al.  On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..

[28]  Alfredo De Santis,et al.  Cheating Immune Threshold Visual Secret Sharing , 2010, Comput. J..

[29]  Stelvio Cimato,et al.  Colored visual cryptography without color darkening , 2004, Theor. Comput. Sci..

[30]  Cheehang Park Park,et al.  Visual Cryptography Based on an Interferometric Encryption Technique , 2002 .

[31]  Jen-Bang Feng,et al.  Visual secret sharing for multiple secrets , 2008, Pattern Recognit..

[32]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[33]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[34]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..

[35]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[36]  Annalisa De Bonis,et al.  Randomness in secret sharing and visual cryptography schemes , 2004, Theor. Comput. Sci..

[37]  Stelvio Cimato,et al.  Optimal Colored Threshold Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[38]  Wen-Guey Tzeng,et al.  Compatible Ideal Contrast Visual Cryptography Schemes with Reversing , 2005, ISC.

[39]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.

[40]  Andreas Klein,et al.  Extended visual cryptography schemes , 2007, Inf. Comput..

[41]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[42]  Oscar C. Au,et al.  Visual Cryptography and Secret Image Sharing , 2011 .

[43]  Feng Liu,et al.  A new definition of the contrast of visual cryptography scheme , 2010, Inf. Process. Lett..

[44]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[45]  Pei-Ling Chiu,et al.  An Extended Visual Cryptography Algorithm for General Access Structures , 2012, IEEE Transactions on Information Forensics and Security.

[46]  Vladimir Kolesnikov Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation , 2005, ASIACRYPT.

[47]  Hirosuke Yamamoto,et al.  Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images , 1998 .

[48]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[49]  Moni Naor,et al.  Visual Authentication and Identification , 1997, CRYPTO.

[50]  Chin-Chen Chang,et al.  Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.

[51]  Hans Ulrich Simon,et al.  Contrast-optimal k out of n secret sharing schemes in visual cryptography , 1997, Theor. Comput. Sci..

[52]  Ching-Nung Yang,et al.  Visual Cryptography Schemes with Reversing , 2008, Comput. J..

[53]  Gwoboa Horng,et al.  Cheating in Visual Cryptography , 2006, Des. Codes Cryptogr..

[54]  Feng Liu,et al.  Optimal XOR Based (2, n)-Visual Cryptography Schemes , 2014, IWDW.

[55]  Rafail Ostrovsky,et al.  Visual cryptography on graphs , 2008, J. Comb. Optim..