Digital halftoning
Visual cryptography for general access structures
Information and Computation
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Protecting digital media content
Communications of the ACM
New Colored Visual Secret Sharing Schemes
Designs, Codes and Cryptography
Proceedings of the 7th ACM conference on Computer and communications security
Extended capabilities for visual cryptography
Theoretical Computer Science
Communications of the ACM
Contrast-optimal k out of n secret sharing schemes in visual cryptography
Theoretical Computer Science - computing and combinatorics
Proceedings of the 28th annual conference on Computer graphics and interactive techniques
Digital Color Halftoning
Modern Digital Halftoning
Digital Image Processing
Improved Schemes for Visual Cryptography
Designs, Codes and Cryptography
A New Approach for Visual Cryptography
Designs, Codes and Cryptography
Contrast Optimal Threshold Visual Cryptography Schemes
SIAM Journal on Discrete Mathematics
Visual cryptography for gray-level images by dithering techniques
Pattern Recognition Letters
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Visual Cryptography II: Improving the Contrast Via the Cover Base
Proceedings of the International Workshop on Security Protocols
Sharing one secret vs. sharing many secrets
Theoretical Computer Science - Mathematical foundations of computer science
New visual secret sharing schemes using probabilistic method
Pattern Recognition Letters
ACM SIGGRAPH 2004 Papers
XOR-based Visual Cryptography Schemes
Designs, Codes and Cryptography
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion
Pattern Recognition Letters
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Optimal colored threshold visual cryptography schemes
Designs, Codes and Cryptography
Secret image sharing with smaller shadow images
Pattern Recognition Letters
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Size-Adjustable Visual Secret Sharing Schemes
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient visual secret sharing scheme for color images
Pattern Recognition
Colored visual cryptography without color darkening
Theoretical Computer Science
Two secret sharing schemes based on Boolean operations
Pattern Recognition
Sharing multiple secrets in visual cryptography
Pattern Recognition
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
Friendly progressive visual secret sharing
Pattern Recognition
Visual Secret Sharing Schemes for Color Images Using Halftoning
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 03
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
A visual cryptography based system for sharing multiple secret images
ISCGAV'07 Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Colored visual cryptography scheme based on additive color mixing
Pattern Recognition
Visual secret sharing for multiple secrets
Pattern Recognition
On the security of a visual cryptography scheme for color images
Pattern Recognition
Sharing visual multi-secrets using circle shares
Computer Standards & Interfaces
Ideal contrast visual cryptography schemes with reversing
Information Processing Letters
Fault-tolerant and progressive transmission of images
Pattern Recognition
ICIAR'06 Proceedings of the Third international conference on Image Analysis and Recognition - Volume Part I
New size-reduced visual secret sharing schemes with half reduction of shadow size
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Extended visual secret sharing schemes with high-quality shadow images using gray sub pixels
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Real perfect contrast visual secret sharing schemes with reversing
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
IEEE Transactions on Image Processing
Cheating Prevention in Visual Cryptography
IEEE Transactions on Image Processing
Winscale: an image-scaling algorithm using an area pixel model
IEEE Transactions on Circuits and Systems for Video Technology
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Plane transform visual cryptography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A secret enriched visual cryptography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides it into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed, the secret can be recovered. No computer participation is required, thus demonstrating one of the distinguishing features of VC. VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system (HVS). In this survey, we will summarize the latest developments of visual cryptography since its inception in 1994, introduce the main research topics in this area and outline the current problems and possible solutions. Directions and trends for future VC work shall also be examined along with possible VC applications.