Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Visual Cryptography


Affiliations
1 Information Security from P.E.C. Engineering College, Chandigarh, India
2 Information Security, P.E.C. Engineering College, Chandigarh, India
     

   Subscribe/Renew Journal


Visual cryptography is a creative technique of sharing secrets. The key idea behind visual cryptography is to encrypt the original secret image into number of shares. The individual share does not reveal the original secret image until two or more shares overlapped. The image is composed of white and black pixels. Visual cryptography provides information security by encrypting the visual information in such a manner that decryption can be done by manual perception system. There is no need of any cryptographic algorithm for decryption in visual cryptography. Performance of visual cryptography mainly depends on the pixel expansion and contrast. This paper put lights on the following sections:

  • What is VCS model?

  • Visual cryptography schemes

  • Security issues

  • Prevention methods

  • Visual cryptography with steganography


Keywords

Visual Cryptography, Shares, Superimposition, Schemes, Steganography, Pixels, Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 240

PDF Views: 3




  • Visual Cryptography

Abstract Views: 240  |  PDF Views: 3

Authors

Priya Sethi
Information Security from P.E.C. Engineering College, Chandigarh, India
Shipra Kataria
Information Security, P.E.C. Engineering College, Chandigarh, India
Deepika Bansal
Information Security, P.E.C. Engineering College, Chandigarh, India

Abstract


Visual cryptography is a creative technique of sharing secrets. The key idea behind visual cryptography is to encrypt the original secret image into number of shares. The individual share does not reveal the original secret image until two or more shares overlapped. The image is composed of white and black pixels. Visual cryptography provides information security by encrypting the visual information in such a manner that decryption can be done by manual perception system. There is no need of any cryptographic algorithm for decryption in visual cryptography. Performance of visual cryptography mainly depends on the pixel expansion and contrast. This paper put lights on the following sections:

  • What is VCS model?

  • Visual cryptography schemes

  • Security issues

  • Prevention methods

  • Visual cryptography with steganography


Keywords


Visual Cryptography, Shares, Superimposition, Schemes, Steganography, Pixels, Security.