Visual cryptography for general access structures
Information and Computation
Constructions and Properties of k out of nVisual Secret Sharing Schemes
Designs, Codes and Cryptography
Communications of the ACM
Digital watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Constructions and Bounds for Visual Cryptography
ICALP '96 Proceedings of the 23rd International Colloquium on Automata, Languages and Programming
Contrast-Optimal k out of n Secret Sharing Schemes in Visual Cryptography
COCOON '97 Proceedings of the Third Annual International Conference on Computing and Combinatorics
Visual Authentication and Identification
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Information hiding: steganography, attacks, and countermeasures
Information hiding: steganography, attacks, and countermeasures
Secret image sharing with steganography and authentication
Journal of Systems and Software
A cost-effective encryption scheme for color images
Real-Time Imaging - Special issue on multi-dimensional image processing
Efficient visual secret sharing scheme for color images
Pattern Recognition
The semipublic encryption for visual cryptography using Q'tron neural networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Image Communication
Sharing multiple secrets in visual cryptography
Pattern Recognition
A multiple-level visual secret-sharing scheme without image size expansion
Information Sciences: an International Journal
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
(2, 3)-threshold visual cryptography for color images
ISCGAV'06 Proceedings of the 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Colored visual cryptography scheme based on additive color mixing
Pattern Recognition
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Sharing Numerous Images Secretly with Reduced Possessing Load
Fundamenta Informaticae
Multiple Watermarking in Visual Cryptography
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
A novel secret image sharing scheme for true-color images with size constraint
Information Sciences: an International Journal
Halftone visual cryptography via error diffusion
IEEE Transactions on Information Forensics and Security
Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability
Image and Vision Computing
Impeding CAPTCHA breakers with visual decryption
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
A comprehensive study of visual cryptography
Transactions on data hiding and multimedia security V
Secure masks for visual cryptography
Transactions on data hiding and multimedia security V
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
Visual Multiple-Secret Sharing by Circle Random Grids
SIAM Journal on Imaging Sciences
New size-reduced visual secret sharing schemes with half reduction of shadow size
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
A cost-effective private-key cryptosystem for color image encryption
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part I
Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Journal of Visual Communication and Image Representation
Yet another multiple-image encryption by rotating random grids
Signal Processing
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
Journal of Systems and Software
Sharing Numerous Images Secretly with Reduced Possessing Load
Fundamenta Informaticae
Secret Image Hiding and Sharing Based on the (t,n)-Threshold
Fundamenta Informaticae
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares
Proceedings of the Fifth International Conference on Security of Information and Networks
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography
Journal of Visual Communication and Image Representation
Enhancing the perceived visual quality of a size invariant visual cryptography scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Improving the visual quality of random grid-based visual secret sharing
Signal Processing
Quality-adaptive visual secret sharing by random grids
Journal of Systems and Software
XOR-based meaningful visual secret sharing by generalized random grids
Proceedings of the first ACM workshop on Information hiding and multimedia security
Visual secret sharing with cheating prevention revisited
Digital Signal Processing
On the security of multi-secret visual cryptography scheme with ring shares
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Towards a design guideline of visual cryptography on stereoscopic displays
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Aspect ratio invariant visual cryptography by image filtering and resizing
Personal and Ubiquitous Computing
Hi-index | 0.10 |
A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k - 1 or fewer of them gain no information about it. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need complicated cryptographic mechanisms and computations. Instead, it can be decoded directly by the human visual system. Previous efforts in this topic are almost restricted in processing binary images, which are insufficient for many applications. In this paper, a new visual cryptography scheme suitable for gray-level images is proposed. Instead of using gray subpixels directly to construct shares, a dithering technique is used first to convert a gray-level image into an approximate binary image. Then existing visual cryptography schemes for binary images are applied to accomplish the work of creating shares. The overall effect of the proposed method is the achievement of visual encryption and decryption functions for gray-level images. Some comparisons with a previously proposed method are also made. Some experimental results are shown to prove the feasibility of the proposed method. Finally, an application is mentioned to show its practicability.