Review on Various Visual Cryptography Schemes

Visual cryptography is a powerful technique in which a secret image can be divided into two or more shares and the decryption can be done using human visual system. Visual cryptography has wide range of applications like in biometrics, print online banking, cloud computing, internet voting, etc.. The basic method of visual cryptography is a secret image is hidden into two or more shares which on superimposing will recover the hidden image. During the recovery it is not possible to get the original image due to various reasons like pixel expansion, contrast, storage, security, image types. Therefore various techniques have been developed to address these issues. A survey has been done on various visual cryptography schemes based on the number of secret, pixel expansion, type of share generated, image format, and number of secret image.

[1]  Wen-Pinn Fang,et al.  Non-expansion Visual Secret Sharing in Reversible Style , 2009 .

[2]  Tzung-Her Chen,et al.  Multi-image encryption by circular random grids , 2012, Inf. Sci..

[3]  Tan Xiao-qing,et al.  Two Kinds of Ideal Contrast Visual Cryptography Schemes , 2009, 2009 International Conference on Signal Processing Systems.

[4]  WeiQi Yan,et al.  Sharing multiple secrets using visual cryptography , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[5]  M. Jenila Vincent,et al.  Securing Multiple Color Secrets Using Visual Cryptography , 2012 .

[6]  Heung-Kyu Lee,et al.  Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.

[7]  Feng Liu,et al.  Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..

[8]  Chih-Fong Tsai,et al.  Block-based progressive visual secret sharing , 2013, Inf. Sci..

[9]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Jie Zhang,et al.  A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .

[11]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[13]  P. Babu Anto,et al.  Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.

[14]  Giovanni Di Crescenzo,et al.  Halftone visual cryptography via direct binary search , 2006, 2006 14th European Signal Processing Conference.

[15]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[16]  Pei-Ling Chiu,et al.  A novel visual secret sharing scheme for multiple secrets without pixel expansion , 2010, Expert Syst. Appl..

[17]  Zhengxin Fu,et al.  Research on Rotation Visual Cryptography Scheme , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[18]  Neena Susan Alex,et al.  Visual Cryptography Using Hybrid Halftoning , 2012 .