A Comprehensive Study of Secrets Sharing Schemes of Visual Cryptography and its Applications

  • DR Somwanshi Department of Computer Science, College of Computer Science and Information Technology (COCSIT) Latur, Maharashtra, India.
  • Vikas T Humbe School of Technology, Swami Ramanand Teerth Marathwada University Nanded, Sub-Center, Latur, Maharashtra, India.

Abstract

Visual Cryptography is a special cryptographic technique in which encryption of visual information such as pictures, drawing, graphs, written materials etc. is performed in such a way that the decryption can be performed by the human visual system. Visual cryptography is specially designed for data security or providing a more secure method for allowing access to more sensitive data. It is simply used for user authentication for providing access to data. Recently many methods and techniques have been developed for the visual cryptography schemes. This paper aims to explore the extensive review and to study the various visual cryptography schemes and also to analyze the performance of different visual cryptographic schemes. Different secret sharing schemes of visual cryptography such as Halftone Visual cryptography, Color Visual Cryptography, Visual Cryptography with Perfect Restoration, Multi-resolution Visual Cryptography and Progressive Multi-resolution Visual Cryptography etc. are elaborated and presented the merits and demerits of each type of cryptography schemes. With this number of secret share images, image format and type of share generated using each type of cryptography is discussed. Different problems of visual cryptography schemes such as pixel expansion, contrast mapping flipping issue, cheating prevention etc. are also discussed. Finally different applications of visual cryptography are illustrated and presented as the guidelines for future research.


How to cite this article:
Somwanshi DR, Humbe VT. A Comprehensive Study of Secrets Sharing Schemes of Visual Cryptography and its Applications. J Adv Res Instru Control Engg 2021; 8(3&4): 6-15.

References

1. Naor M, Shamir A. Visual Cryptography Eurocrypt, 1994.
2. Young-Chang H. Visual cryptography for color images Pattern Recognition. Journal of the Pattern Recognition Society 2002; 36: 1619-1629.
3. Weir J, Qi Y. Visual Cryptography and its Application. Ventus Publishing Aps, eBook. 2012; 1-144.
4. Moraru E. Visual Cryptography. Published in: Technology, Art & Photos on Slide share. 2008; 1-38.
5. Zhi Z, Arce GR, CrescenzoGD. Halftone Visual Cryptography. Image Processing 2006; 15(8): 2241-2453.
6. Wang Z. Student Member, IEEE, Gonzalo R Arce, Fellow, IEEE, and Giovanni Di Crescenzo. Halftone Visual Cryptography via Error Diffusion. IEEE Transactions on Information Forensics and Security 2009; 4(3): 383-396.
7. Purushothaman V, Sreedhar S. An improved secret sharing using XOR-based Visual Cryptography, Green Engineering and Technologies (IC-GET). Online International Conference, 2016.
8. Jin D, Yan WQ, Kankanhalli MS. Progressive color visual cryptography. Journal of Electron Imaging 2005; 14(3): 1-13.
9. Young-Chang H, Zen-Yu Q. Progressive Visual Cryptography with Unexpanded Shares. IEEE Transactions on Circuits and Systems for Video Technology 2011; 21(11): 1760-1764.
10. Chang-Chou L, Wen-Hsiang T. Visual cryptography for graylevel images by dithering techniques. Pattern Recognition Letters 2003; 24: 1-3.
11. Verheuland E, Tilborg HV. Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes. Designs, Codes and Cryptography 1997; 11(2): 179-196.
12. Liu F, Wu CK, Lin XJ. Colour Visual Cryptography Schemes. IET Information Security 2009; 2(4): 151-165.
13. Wu CC, Chen LH. A Study On Visual Cryptography. Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, ROC, 1998.
14. Shyu SJ, Huanga SY, Lee YK et al. Sharing multiple secrets in visual cryptography. Pattern Recognition 2007; 40(12): 3633-3651.
15. Tzung-Her CN, Chang-Sian W. Efficient multi-secret image sharing based on Boolean operations. Signal Processing 2011; 91(1): 90-97.
16. Nakajima M, Yamaguchi Y. Extended visual cryptography for natural images. Journal of WSCG 2002; 10: 303-310.
17. Wang RZ. Region Incrementing Visual Cryptography. SP Letters 2009; 16(8): 659-662.
18. Borchert B. Segment-based Visual Cryptography.
19. Feng L, Wei Q. Visual Cryptography for Image Processing and Security Theory, Methods and Applications Springer, eBooks, 2014; 1-154.
20. Zheng D, Zhao Y, Wang J. An efficient method of license plate location. Pattern Recognition Letter 2005; 26(15): 2431-2438.
21. Feng L, Tengguo, Kun Wu C et al. Improving the visual quality of size invariant visual cryptography scheme. Elsevier Journal of Visual communication Image 2012; 23: 331-342.
22. Ross A, Othman A. Visual Cryptography for Biometric Privacy. IEEE Transactions on Information Forensics and Security 2011; 6(1): 70-82.
23. Yuh-Rau W, Wei-Hung L, Ling Y. Lossless Watermarking Using Visual Cryptography Authentication. Proceedings of the International Conference on Machine Learning and Cyberetics, Tianjin, IEEE. 2013; 1109-1113.
24. Brassil J, Steven L, Nicholas M et al. Hiding Information in Document Images. Proceedings of the Conference on Information Sciences and Systems, Johns Hopkins University. 1995; 482-489.
25. Wei-Qi Y, Duo J, Kankanhalli MS. Visual Cryptography For Print And Scan Applications. ISCAS 2004; 572-575.
26. Srikanth B, Padmaja G, Khasim S et al. Secured Bank Authentication using Image Processing and Visual Cryptography. International Journal of Computer Science and Information Technologies 2014; 5(2): 2432-2437.
27. Rose A, Thampi SM. A Secure Verifiable Scheme for Secret Image Sharing. Procedia Computer Science 2015; 58: 140-150.
28. Hodeish ME, Humbe VT. An Optimal (k,n)Visual Secret Sharing Scheme for Information Security. Elsevier-Procedia Computer Science 2016; 93: 760-767.
29. Dahata AV, Chavan PV. Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space. Elsevier, Procedia Computer Science 2016; 78: 563-570.
30. Rajendra AB, Sheshadri HS. Visual Cryptography in Internet Voting System. IEEE 2013; 60-64.
31. Kim M, Park J, Zheng Y. Human-machine identification using visual cryptography. Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems. 1998; 178-182.
32. Wen-Pinn F. Offline QR Code Authorization Based on Visual Cryptography. IEEE Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Seventh International Conference. 2011; 89-92.
33. Shivendra S, Agarwal S. VPVC: verifiable progressive visual cryptography. Springer-Pattern Anal Application 2016; 1-28. https://doi.org/10.1007/s10044-016-0571-x
34. Shivendra S. VMVC: Verifiable multi-tone visual cryptography. Springer, Multimed Tools Application. https://doi.org/10.1007/s11042-017-4422-6
35. Hodeish ME, Humbe VT. An Optimized Halftone Visual Cryptography Scheme using Error Diffusion. Springer, Multimed Tools Application 2018; 1-17.
36. Hodeish ME, Humbe VT. State-of-the-Art Visual Cryptography Schemes. International Journal of Electronics Communication and Computer Engineering 2014; 5(2): 412-420.
Published
2022-04-01
How to Cite
SOMWANSHI, DR; T HUMBE, Vikas. A Comprehensive Study of Secrets Sharing Schemes of Visual Cryptography and its Applications. Journal of Advanced Research in Instrumentation and Control Engineering, [S.l.], v. 8, n. 3&4, p. 6-15, apr. 2022. ISSN 2456-1398. Available at: <http://thejournalshouse.com/index.php/instrumentation-control-engg-adr/article/view/552>. Date accessed: 22 dec. 2024.