visual cryptography scheme Recently Published Documents
Total documents.
- Latest Documents
- Most Cited Documents
- Contributed Authors
- Related Sources
- Related Keywords
A cheating immune (k, n) visual cryptography scheme by using the rotation of shares
A contrast improved or and xor based (k,n) visual cryptography scheme without pixel expansion, visual cryptography scheme for secret color images with color qr codes, a novel raster map exchange scheme based on visual cryptography.
Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. To solve these issues, we propose a novel extended visual cryptography scheme to securely store a raster map into other two meaningful halftone maps in the paper. The scheme avoids the random-looking shares of visual cryptography schemes which are vulnerable and hard to manage. We first apply the halftone and color decomposition methods to transform a color secret map into halftone images. After that, we encode the secret map block by block to avoid pixel expansion. At last, by optimizing the selection of encrypted blocks, we achieve a high-quality secret recovery from generated multiple equal-sized shares. The technique used is to employ a versatile and secure raster map exchange. Experimental results show that, compared with previous work, the proposed scheme significantly improves the performance of recovered raster maps.
Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images
Fisher-yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication, hp-vcs: a high-quality and printer-friendly visual cryptography scheme, colour visual cryptography (3,3) scheme.
Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique.
Research on a novel construction of probabilistic visual cryptography scheme (k,n,0,1,1)−PVCS for threshold access structures
Improved extended progressive visual cryptography scheme using pixel harmonization.
Security of information is of much concern in the modern internet era. Secret sharing schemes provide mechanism of encrypting secret information to prevent illicit usage. Visual cryptography is a secret sharing technique that facilitates encryption of a secret image. Visual cryptography allows us to effectively and efficiently share secrets among a number of trusted parties by hiding secrets within images. These images are encoded into multiple shares as per the rules indicated in basis matrices and later decoded by stacking required number of shares. Progressive visual cryptography has a specialty of recovering secret image as soon as more than one shares received gradually. Existing progressive visual cryptography schemes have severe limitations like data disclose on shares and higher pixel expansion. Improved progressive visual cryptography scheme deals with these limitations. Improved extended progressive visual cryptography scheme solves the issue of management of noise like meaningless shares by creating meaningful shares without any pixel expansion efficiently.
Export Citation Format
Share document.
International Conference on Communication, Networks and Computing
CNC 2022: Communication, Networks and Computing pp 110–120 Cite as
Visual Cryptography: An Emerging Technology
- Gauri Kothekar 13 ,
- Pallavi Khatri 13 &
- Geetanjali Surange 13
- Conference paper
- First Online: 27 September 2023
139 Accesses
Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1894))
In the present era, the data has become the most important asset for an individual, community and organization. Data handling and protection from attacks has become a key concern for people. To protect the information from uninvited invasions and attacks, researchers are developing new security techniques. Numerous cryptography methods have been discovered, and many more are still hidden. The visual cryptography is one of them. In this paper, visual cryptography, a new technique, has been highlighted. Visual cryptography is a method of data hiding in which the data is encrypted and concealed using visuals. A secret image is split up into numerous share images in visual cryptography. Although these share images are noisy or damaged, they are nonetheless relevant. Combining these share photos can make the original secret photo visible.
This is a preview of subscription content, log in via an institution .
Buying options
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Naor, M., Shamir, A.: Visual cryptography. In: Eurocrypt., A., Santis., D., (eds.) In Advances in Cryptology, vol. 950 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, pp 1–12, (1995). https://doi.org/10.1007/BFb0053419
Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. ACM Theory. Comput. Sci. 250 , 143–161 (2001)
Article MathSciNet MATH Google Scholar
Verheul, E., van Tilborg, H.: Construction & properties of k out of n visual secret sharing schemes, Designs, codes & cryptography. Int. J. Comput. Appl. 11 (2), 179–196 (1997). (0975 – 8887) volume 174 – no.5, September 43 2017. https://doi.org/10.1023/A:1008280705142
Wu, L., Chen, H.A.: Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C (1998)
Google Scholar
Hsu, H., Chen, T., Lm, Y.: The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001, March (2004)
Wang, D., Feng, Y., Xiaobo, L.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42 (2009), 3071–3082 (2009)
Article MATH Google Scholar
Malik, S., Jaya, A.A.: Keyless approach to image encryption. In: 2012 International Conference on Communication systems and Network Technologies ©2012 IEEE
Kumar, H., Srivastava, A.: A secret sharing scheme for secure transmission of color images. In: International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (2014)
Vaya, D., Khandelwal, S.: A fast and hardware efficient visual cryptography scheme for images. In: Advances in Intelligent Systems and Computing, vol. 379, pp. 133–142. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2517-1_14
Chapter Google Scholar
Shyu, S., Huanga, S., Lee, Y., Wang, R., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognit. 40 (12), 3633–3651 (2007)
Warren, H., Akhawe, D., Jain, S., Shi, E., Song, D.: Shadowcrypt: Encrypted web applications for everyone. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028- 1039. ACM (2014)
Reddy, L.S., Prasad, M.V.N.K.: Extended visual cryptography scheme for multi-secret sharing. In: Nagar, A., Mohapatra, D.P., Chaki, N. (eds.) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. SIST, vol. 44, pp. 249–257. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2529-4_26
Kim, M., Park, J., Zheng, Y.: Human-machine identification using visual cryptography. In: Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp. 178- 182 (1998)
Katoh, T., Imai, H.: An application of visual secret sharing scheme concealing plural secret images to human identification scheme. In Proc. SITA 96 , 661–664 (1996)
Chandrasekhara, V.: Jagadisha, Secure Banking Application Using Visual Cryptography against Fake Website Authenticity Theft, International Journal of Advanced Computer Engineering and Communication Technology (IJACECT), ISSN (Print): 2278–5140, vol. 2, issue – 2 (2013)
Visual cryptography. Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=Visual_cryptography&oldid=1112850520 . Accessed 28 Nov 2022
Shrivas, B., et al: (IJCSIT) International Journal of Computer Science and Information Technologies, 6 (2), 1076–1079 (2015)
Download references
Author information
Authors and affiliations.
ITM University, Gwalior, India
Gauri Kothekar, Pallavi Khatri & Geetanjali Surange
You can also search for this author in PubMed Google Scholar
Corresponding author
Correspondence to Pallavi Khatri .
Editor information
Editors and affiliations.
Ranjeet Singh Tomar
IIIT-Allahabad, Allahabad, Uttar Pradesh, India
Shekhar Verma
IIIT Lucknow, Lucknow, India
Brijesh Kumar Chaurasia
IIIT-Allahabad, Allahabad, India
Vrijendra Singh
Deakin University, Burwood, VIC, Australia
Jemal H. Abawajy
ITM University, Gwalior, Madhya Pradesh, India
Shyam Akashe
National Chung Cheng University, Chiayi, Taiwan
Pao-Ann Hsiung
Aarhus University, Herning, Denmark
Ramjee Prasad
Rights and permissions
Reprints and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper.
Kothekar, G., Khatri, P., Surange, G. (2023). Visual Cryptography: An Emerging Technology. In: Tomar, R.S., et al. Communication, Networks and Computing. CNC 2022. Communications in Computer and Information Science, vol 1894. Springer, Cham. https://doi.org/10.1007/978-3-031-43145-6_10
Download citation
DOI : https://doi.org/10.1007/978-3-031-43145-6_10
Published : 27 September 2023
Publisher Name : Springer, Cham
Print ISBN : 978-3-031-43144-9
Online ISBN : 978-3-031-43145-6
eBook Packages : Computer Science Computer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
Help | Advanced Search
Computer Science > Computer Vision and Pattern Recognition
Title: visual prompting for generalized few-shot segmentation: a multi-scale approach.
Abstract: The emergence of attention-based transformer models has led to their extensive use in various tasks, due to their superior generalization and transfer properties. Recent research has demonstrated that such models, when prompted appropriately, are excellent for few-shot inference. However, such techniques are under-explored for dense prediction tasks like semantic segmentation. In this work, we examine the effectiveness of prompting a transformer-decoder with learned visual prompts for the generalized few-shot segmentation (GFSS) task. Our goal is to achieve strong performance not only on novel categories with limited examples, but also to retain performance on base categories. We propose an approach to learn visual prompts with limited examples. These learned visual prompts are used to prompt a multiscale transformer decoder to facilitate accurate dense predictions. Additionally, we introduce a unidirectional causal attention mechanism between the novel prompts, learned with limited examples, and the base prompts, learned with abundant data. This mechanism enriches the novel prompts without deteriorating the base class performance. Overall, this form of prompting helps us achieve state-of-the-art performance for GFSS on two different benchmark datasets: COCO-$20^i$ and Pascal-$5^i$, without the need for test-time optimization (or transduction). Furthermore, test-time optimization leveraging unlabelled test data can be used to improve the prompts, which we refer to as transductive prompt tuning.
Submission history
Access paper:.
- HTML (experimental)
- Other Formats
References & Citations
- Google Scholar
- Semantic Scholar
BibTeX formatted citation
Bibliographic and Citation Tools
Code, data and media associated with this article, recommenders and search tools.
- Institution
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
VASA-1: Lifelike Audio-Driven Talking Faces Generated in Real Time
- Follow on Twitter
- Like on Facebook
- Follow on LinkedIn
- Subscribe on Youtube
- Follow on Instagram
- Subscribe to our RSS feed
Share this page:
- Share on Twitter
- Share on Facebook
- Share on LinkedIn
- Share on Reddit
V-CRYPT: A Secure Visual Cryptography System
Ieee account.
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Jump to navigation
Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei
Please consider submitting papers to Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei .
This workshop provides an excellent platform for scholars to share their latest findings and insights in the early modern history of science. The deadline for paper submissions has been extended to April 25 .
We welcome submissions on a wide range of topics related to Thomas Harriot and Galileo Galilei. Whether you're presenting current research, innovative methodologies, or theoretical frameworks, we want to hear from you.
The workshop , “Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei,” explores the intersection of science, symbolism, and cryptography in the books and manuscripts of two early modern scholars, Thomas Harriot and Galileo Galilei. Recent work in the Harriot Papers at Notre Dame ( https://osf.io/r78gx/ ) has led to a first edition of the De infinitis ( On the Infinite ) while also fostering research on the history of mathematics in the early modern period. In addition to Harriot’s studies in algebra and combinatorial studies and Galileo’s contributions to astronomy and physics, both of these scholars had a hidden dimension to their work, one that involved the use of symbolism and cryptography to protect authorship and to claim the priority of their discoveries. This workshop aims to bring together new perspectives on symbolism and cryptography in the early modern period, in particular, to discuss the hidden, enigmatic elements present in the writings, notebooks, and correspondences of Galileo and Harriot. The workshop will be held in person at the University of Notre Dame’s Navari Family Center for Digital Scholarship, Reilly Center for Science, Technology and Values, and Rare Books and Special Collections, and online, via Zoom.
Please consider submitting an abstract on one of these topics:
- The use of cryptographic elements in early modern correspondence
- Galileo’s use of codes and ciphers to protect sensitive scientific discoveries and ideas
- Harriot’s secretive communication methods in his private notes
- The use of symbolism and natural language in mathematical texts.
- Methods and circulation of scientific communication in the early modern period.
- Revisiting traditional texts through comments in correspondence.
Submitting your paper is quick and easy. Please s end a title, an abstract of 150-200 words, and a short bio to [email protected] . If you have any questions, please don't hesitate to reach out.
IMAGES
VIDEO
COMMENTS
We conclude the paper with a discussion of these open problems and future research directions. General process of (k, n) visual cryptography. sual cryptography techniques covered in this paper.
Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.
Intensive research on Visual Cryptography (VC) schemes has explored the use of various types of images, including binary, grayscale, and color, as secret images. While VC offers promising solutions for secure image sharing, researchers have identified several critical issues that have become focal points for further study and improvement [ 10 ].
The paper mentions three approaches to realizecolor visual cryptography. Our paper focuses on the third approach, which is the most suitable method to implement color visual cryptography. With no pixel expansion involved, our approach stacks pixels of composing color channels to reveal the secret image. ... Some research has been done in the ...
The research summarized by analyzing the concerning methods, which range from the above-mentioned period of time according to specific characteristics and the different techniques proposed and developed from that period. This paper also includes applications focused on the principle about visual cryptography (VC).
Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed ...
Data security is paramount in this modern era. Many corporations have established selective or their own cryptography schemes for information gathering and communication. The need of securing sensitive information is ever-so-increasing due to the rise of cyber thefts and online scams. Visual cryptography is a popular cryptographic technique that consists of hiding visual information like audio ...
Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the var-ious schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Visual Cryptography (VC), one ...
Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed ...
In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique. Download Full-text.
This paper reviews two methods for visual cryptography of color images based on Shamir encryption method variants of k-out-of-n i.e.2-out-of-2, 2-out-of-n, n-out-of-n, and k-out-of-n scheme ...
Visual Cryptography is an encryption technique used to store the secret in graphics so that the observer ... are discussing research papers related to visual cryptography usage on different platforms like visual cryptography in cloud computing, networks, online detection systems, and banking transaction systems. ...
She is an expert in the area of visual cryptography, network security, and image processing. ... He obtained his PhD in computer science in January 2011 and published several research papers in National and International journals and conferences. He has been honored with the Best Citizens of India Award 2012 by the International Publishing ...
1.3 Visual Cryptography for Colored Images. Authors in [] propose a novel visual cryptography-based cryptography system for safeguarding colored images, as seen in Fig. 3.Both the input data and the key used to encrypt and decrypt the colour picture that needs to be secured are binary images. A secret colour picture to be shared is split into three monochrome images using the YCbCr colour ...
This paper presents an improved algorithm based on Chang's and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images that achieves lossless recovery and reduces the noise in the cover images without adding any computational complexity. Expand. 55. PDF.
Abstract: Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. In this paper, we intend to study the different application areas of Visual Cryptography. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging ...
Most research papers have been published to. reduce the pixel expansion [5,6,7,8,9,10,11].Some of them. can even have no pix el expansion (m = 1) [5,7,10,11]. ... A visual cryptography scheme (VCS ...
AN OVERVIEW OF DIFFERENT VISUAL CRYPTOGRAPHY TECHNIQUES 1Omkar Pattnaik, 2 Ranishree Patel, 3 ... To fill this gap, this paper offers a thorough overview of the subject to help new researchers in finding appropriate visual cryptography techniques ... cryptography from different research articles. The main focus is on the use of encryption ...
Feature papers represent the most advanced research with significant potential for high impact in the field. ... Cryptography is one of the most important tools that has been widely deployed by researchers and practitioners in academia and industry to build secure information technology infrastructures ensuring the confidentiality of data and ...
The notion of Visual Cryptography was first introduced by Naor and Shamir in 1994 [NS94]. Here "visual" means that the decryption is done by human eyes instead of by any computing devices. To retrieve the ciphertext, simply stack the encrypted images together. In fact, it is more like an image secret sharing scheme than an encryption scheme. Both the secret and the shares are black-and ...
The emergence of attention-based transformer models has led to their extensive use in various tasks, due to their superior generalization and transfer properties. Recent research has demonstrated that such models, when prompted appropriately, are excellent for few-shot inference. However, such techniques are under-explored for dense prediction tasks like semantic segmentation. In this work, we ...
Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...
We introduce VASA, a framework for generating lifelike talking faces of virtual characters with appealing visual affective skills (VAS), given a single static image and a speech audio clip. Our premiere model, VASA-1, is capable of not only producing lip movements that are exquisitely synchronized with the audio, but also capturing a large ...
Nowadays, peoples are very concerned about their data privacy. Hence, all the current security methods should be improved to stay relevant in this fast-growing technology world. Visual Cryptography (VC) is a cryptographic technique that using the image processing method. The implementation of VC can be varying and flexible to be applied to the system that requires an extra security precaution ...
contact email: [email protected]. Please consider submitting papers to Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei. This workshop provides an excellent platform for scholars to share their latest findings and insights in the early modern history of science.