visual cryptography scheme Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

A cheating immune (k, n) visual cryptography scheme by using the rotation of shares

A contrast improved or and xor based (k,n) visual cryptography scheme without pixel expansion, visual cryptography scheme for secret color images with color qr codes, a novel raster map exchange scheme based on visual cryptography.

Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. To solve these issues, we propose a novel extended visual cryptography scheme to securely store a raster map into other two meaningful halftone maps in the paper. The scheme avoids the random-looking shares of visual cryptography schemes which are vulnerable and hard to manage. We first apply the halftone and color decomposition methods to transform a color secret map into halftone images. After that, we encode the secret map block by block to avoid pixel expansion. At last, by optimizing the selection of encrypted blocks, we achieve a high-quality secret recovery from generated multiple equal-sized shares. The technique used is to employ a versatile and secure raster map exchange. Experimental results show that, compared with previous work, the proposed scheme significantly improves the performance of recovered raster maps.

Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images

Fisher-yates chaotic shuffling based visual cryptography scheme for multimodal biometric authentication, hp-vcs: a high-quality and printer-friendly visual cryptography scheme, colour visual cryptography (3,3) scheme.

Visual Cryptography is an encryption technique which performs only encryption in cryptography, and it is used to encrypt every visual data. And this cryptography is different and unique in all cryptographic techniques, because of not performing decryption process mechanically, and that is done mechanically. In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique.

Research on a novel construction of probabilistic visual cryptography scheme (k,n,0,1,1)−PVCS for threshold access structures

Improved extended progressive visual cryptography scheme using pixel harmonization.

Security of information is of much concern in the modern internet era. Secret sharing schemes provide mechanism of encrypting secret information to prevent illicit usage. Visual cryptography is a secret sharing technique that facilitates encryption of a secret image. Visual cryptography allows us to effectively and efficiently share secrets among a number of trusted parties by hiding secrets within images. These images are encoded into multiple shares as per the rules indicated in basis matrices and later decoded by stacking required number of shares. Progressive visual cryptography has a specialty of recovering secret image as soon as more than one shares received gradually. Existing progressive visual cryptography schemes have severe limitations like data disclose on shares and higher pixel expansion. Improved progressive visual cryptography scheme deals with these limitations. Improved extended progressive visual cryptography scheme solves the issue of management of noise like meaningless shares by creating meaningful shares without any pixel expansion efficiently.

Export Citation Format

Share document.

Book cover

International Conference on Communication, Networks and Computing

CNC 2022: Communication, Networks and Computing pp 110–120 Cite as

Visual Cryptography: An Emerging Technology

  • Gauri Kothekar 13 ,
  • Pallavi Khatri 13 &
  • Geetanjali Surange 13  
  • Conference paper
  • First Online: 27 September 2023

139 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1894))

In the present era, the data has become the most important asset for an individual, community and organization. Data handling and protection from attacks has become a key concern for people. To protect the information from uninvited invasions and attacks, researchers are developing new security techniques. Numerous cryptography methods have been discovered, and many more are still hidden. The visual cryptography is one of them. In this paper, visual cryptography, a new technique, has been highlighted. Visual cryptography is a method of data hiding in which the data is encrypted and concealed using visuals. A secret image is split up into numerous share images in visual cryptography. Although these share images are noisy or damaged, they are nonetheless relevant. Combining these share photos can make the original secret photo visible.

This is a preview of subscription content, log in via an institution .

Buying options

  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Naor, M., Shamir, A.: Visual cryptography. In: Eurocrypt., A., Santis., D., (eds.) In Advances in Cryptology, vol. 950 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, pp 1–12, (1995). https://doi.org/10.1007/BFb0053419

Ateniese, G., Blundo, C., Santis, A., Stinson, D.: Extended capabilities for visual cryptography. ACM Theory. Comput. Sci. 250 , 143–161 (2001)

Article   MathSciNet   MATH   Google Scholar  

Verheul, E., van Tilborg, H.: Construction & properties of k out of n visual secret sharing schemes, Designs, codes & cryptography. Int. J. Comput. Appl. 11 (2), 179–196 (1997). (0975 – 8887) volume 174 – no.5, September 43 2017. https://doi.org/10.1023/A:1008280705142

Wu, L., Chen, H.A.: Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C (1998)

Google Scholar  

Hsu, H., Chen, T., Lm, Y.: The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001, March (2004)

Wang, D., Feng, Y., Xiaobo, L.: On general construction for extended visual cryptography schemes. Pattern Recogn. 42 (2009), 3071–3082 (2009)

Article   MATH   Google Scholar  

Malik, S., Jaya, A.A.: Keyless approach to image encryption. In: 2012 International Conference on Communication systems and Network Technologies ©2012 IEEE

Kumar, H., Srivastava, A.: A secret sharing scheme for secure transmission of color images. In: International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (2014)

Vaya, D., Khandelwal, S.: A fast and hardware efficient visual cryptography scheme for images. In: Advances in Intelligent Systems and Computing, vol. 379, pp. 133–142. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2517-1_14

Chapter   Google Scholar  

Shyu, S., Huanga, S., Lee, Y., Wang, R., Chen, K.: Sharing multiple secrets in visual cryptography. Pattern Recognit. 40 (12), 3633–3651 (2007)

Warren, H., Akhawe, D., Jain, S., Shi, E., Song, D.: Shadowcrypt: Encrypted web applications for everyone. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1028- 1039. ACM (2014)

Reddy, L.S., Prasad, M.V.N.K.: Extended visual cryptography scheme for multi-secret sharing. In: Nagar, A., Mohapatra, D.P., Chaki, N. (eds.) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. SIST, vol. 44, pp. 249–257. Springer, New Delhi (2016). https://doi.org/10.1007/978-81-322-2529-4_26

Kim, M., Park, J., Zheng, Y.: Human-machine identification using visual cryptography. In: Proceedings of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems, pp. 178- 182 (1998)

Katoh, T., Imai, H.: An application of visual secret sharing scheme concealing plural secret images to human identification scheme. In Proc. SITA 96 , 661–664 (1996)

Chandrasekhara, V.: Jagadisha, Secure Banking Application Using Visual Cryptography against Fake Website Authenticity Theft, International Journal of Advanced Computer Engineering and Communication Technology (IJACECT), ISSN (Print): 2278–5140, vol. 2, issue – 2 (2013)

Visual cryptography. Wikipedia, The Free Encyclopedia.  https://en.wikipedia.org/w/index.php?title=Visual_cryptography&oldid=1112850520  . Accessed 28 Nov 2022

Shrivas, B., et al: (IJCSIT) International Journal of Computer Science and Information Technologies, 6 (2), 1076–1079 (2015)

Download references

Author information

Authors and affiliations.

ITM University, Gwalior, India

Gauri Kothekar, Pallavi Khatri & Geetanjali Surange

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Pallavi Khatri .

Editor information

Editors and affiliations.

Ranjeet Singh Tomar

IIIT-Allahabad, Allahabad, Uttar Pradesh, India

Shekhar Verma

IIIT Lucknow, Lucknow, India

Brijesh Kumar Chaurasia

IIIT-Allahabad, Allahabad, India

Vrijendra Singh

Deakin University, Burwood, VIC, Australia

Jemal H. Abawajy

ITM University, Gwalior, Madhya Pradesh, India

Shyam Akashe

National Chung Cheng University, Chiayi, Taiwan

Pao-Ann Hsiung

Aarhus University, Herning, Denmark

Ramjee Prasad

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Kothekar, G., Khatri, P., Surange, G. (2023). Visual Cryptography: An Emerging Technology. In: Tomar, R.S., et al. Communication, Networks and Computing. CNC 2022. Communications in Computer and Information Science, vol 1894. Springer, Cham. https://doi.org/10.1007/978-3-031-43145-6_10

Download citation

DOI : https://doi.org/10.1007/978-3-031-43145-6_10

Published : 27 September 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-43144-9

Online ISBN : 978-3-031-43145-6

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Help | Advanced Search

Computer Science > Computer Vision and Pattern Recognition

Title: visual prompting for generalized few-shot segmentation: a multi-scale approach.

Abstract: The emergence of attention-based transformer models has led to their extensive use in various tasks, due to their superior generalization and transfer properties. Recent research has demonstrated that such models, when prompted appropriately, are excellent for few-shot inference. However, such techniques are under-explored for dense prediction tasks like semantic segmentation. In this work, we examine the effectiveness of prompting a transformer-decoder with learned visual prompts for the generalized few-shot segmentation (GFSS) task. Our goal is to achieve strong performance not only on novel categories with limited examples, but also to retain performance on base categories. We propose an approach to learn visual prompts with limited examples. These learned visual prompts are used to prompt a multiscale transformer decoder to facilitate accurate dense predictions. Additionally, we introduce a unidirectional causal attention mechanism between the novel prompts, learned with limited examples, and the base prompts, learned with abundant data. This mechanism enriches the novel prompts without deteriorating the base class performance. Overall, this form of prompting helps us achieve state-of-the-art performance for GFSS on two different benchmark datasets: COCO-$20^i$ and Pascal-$5^i$, without the need for test-time optimization (or transduction). Furthermore, test-time optimization leveraging unlabelled test data can be used to improve the prompts, which we refer to as transductive prompt tuning.

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

VASA-1: Lifelike Audio-Driven Talking Faces Generated in Real Time

  • Follow on Twitter
  • Like on Facebook
  • Follow on LinkedIn
  • Subscribe on Youtube
  • Follow on Instagram
  • Subscribe to our RSS feed

Share this page:

  • Share on Twitter
  • Share on Facebook
  • Share on LinkedIn
  • Share on Reddit

V-CRYPT: A Secure Visual Cryptography System

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Jump to navigation

Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei

Please consider submitting papers to  Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei .

This workshop provides an excellent platform for scholars to share their latest findings and insights in the early modern history of science. The deadline for paper submissions has been extended to  April 25 . 

We welcome submissions on a wide range of topics related to Thomas Harriot and Galileo Galilei. Whether you're presenting current research, innovative methodologies, or theoretical frameworks, we want to hear from you.

The  workshop , “Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei,” explores the intersection of science, symbolism, and cryptography in the books and manuscripts of two early modern scholars, Thomas Harriot and Galileo Galilei. Recent work in the Harriot Papers at Notre Dame ( https://osf.io/r78gx/ ) has led to a first edition of the  De infinitis  ( On the Infinite ) while also fostering research on the history of mathematics in the early modern period. In addition to Harriot’s studies in algebra and combinatorial studies and Galileo’s contributions to astronomy and physics, both of these scholars had a hidden dimension to their work, one that involved the use of symbolism and cryptography to protect authorship and to claim the priority of their discoveries. This workshop aims to bring together new perspectives on symbolism and cryptography in the early modern period, in particular, to discuss the hidden, enigmatic elements present in the writings, notebooks, and correspondences of Galileo and Harriot. The workshop will be held in person at the University of Notre Dame’s Navari Family Center for Digital Scholarship, Reilly Center for Science, Technology and Values, and Rare Books and Special Collections, and online, via Zoom.

Please consider submitting an abstract on one of these topics:

  • The use of cryptographic elements in early modern correspondence
  • Galileo’s use of codes and ciphers to protect sensitive scientific discoveries and ideas
  • Harriot’s secretive communication methods in his private notes
  • The use of symbolism and natural language in mathematical texts.
  • Methods and circulation of scientific communication in the early modern period.
  • Revisiting traditional texts through comments in correspondence.

Submitting your paper is quick and easy. Please  s end a title, an abstract of 150-200 words, and a short bio  to  [email protected] . If you have any questions, please don't hesitate to reach out.

IMAGES

  1. (PDF) Visual Cryptography: A Review

    research papers on visual cryptography

  2. (PDF) A Comparative study on Visual Cryptography Method for Handwriting

    research papers on visual cryptography

  3. VISUAL CRYPTOGRAPHY

    research papers on visual cryptography

  4. (PDF) A Watermarking Technique based on Visual Cryptography

    research papers on visual cryptography

  5. (PDF) Visual Cryptography using KN Sharing Algorithm for Colour Images

    research papers on visual cryptography

  6. (PDF) Probabilistic Visual Cryptography Schemes

    research papers on visual cryptography

VIDEO

  1. Computing on Encryption Data: Functional Encryption and More

  2. Embedded Extended Visual Cryptography Schemes

  3. Non-Malleable Cryptography

  4. Anti Phising Based on Visual Cryptography

  5. The Cryptographers' Panel

  6. Visual Cryptography

COMMENTS

  1. (PDF) An overview of visual cryptography techniques

    We conclude the paper with a discussion of these open problems and future research directions. General process of (k, n) visual cryptography. sual cryptography techniques covered in this paper.

  2. An overview of visual cryptography techniques

    Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.

  3. Progressive meaningful visual cryptography for secure ...

    Intensive research on Visual Cryptography (VC) schemes has explored the use of various types of images, including binary, grayscale, and color, as secret images. While VC offers promising solutions for secure image sharing, researchers have identified several critical issues that have become focal points for further study and improvement [ 10 ].

  4. Enhanced Visual Cryptography: An Augmented Model for ...

    The paper mentions three approaches to realizecolor visual cryptography. Our paper focuses on the third approach, which is the most suitable method to implement color visual cryptography. With no pixel expansion involved, our approach stacks pixels of composing color channels to reveal the secret image. ... Some research has been done in the ...

  5. Visual Cryptography Techniques: Short Survey

    The research summarized by analyzing the concerning methods, which range from the above-mentioned period of time according to specific characteristics and the different techniques proposed and developed from that period. This paper also includes applications focused on the principle about visual cryptography (VC).

  6. Visual Cryptography: A Literature Survey

    Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed ...

  7. Securing Data Using Visual Cryptography

    Data security is paramount in this modern era. Many corporations have established selective or their own cryptography schemes for information gathering and communication. The need of securing sensitive information is ever-so-increasing due to the rise of cyber thefts and online scams. Visual cryptography is a popular cryptographic technique that consists of hiding visual information like audio ...

  8. PDF An overview of visual cryptography techniques

    Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the var-ious schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.

  9. Cryptography

    Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. ... Visual Cryptography (VC), one ...

  10. visual cryptography Latest Research Papers

    Visual cryptography (VC) is developed to be a promising approach to encoding secret information using pixel expansion rules. The useful information can be directly rendered based on human vision without the usage of decryption algorithms. However, many VC schemes cannot withstand occlusion attacks. In this paper, a new VC scheme is proposed ...

  11. visual cryptography scheme Latest Research Papers

    In normal visual cryptography only black and white images are encrypted. In this paper we propose a different type of visual cryptography scheme for colour imagesin CMY format. And it protects the secret of the original image and no other techniques does not decrypt it except our decryption technique. Download Full-text.

  12. (PDF) Visual Cryptography: A Review

    This paper reviews two methods for visual cryptography of color images based on Shamir encryption method variants of k-out-of-n i.e.2-out-of-2, 2-out-of-n, n-out-of-n, and k-out-of-n scheme ...

  13. PDF The Usefulness Of Visual Cryptography Techniques: A ...

    Visual Cryptography is an encryption technique used to store the secret in graphics so that the observer ... are discussing research papers related to visual cryptography usage on different platforms like visual cryptography in cloud computing, networks, online detection systems, and banking transaction systems. ...

  14. Visual Cryptography Secret Share Creation Techniques with Multiple

    She is an expert in the area of visual cryptography, network security, and image processing. ... He obtained his PhD in computer science in January 2011 and published several research papers in National and International journals and conferences. He has been honored with the Best Citizens of India Award 2012 by the International Publishing ...

  15. Visual Cryptography: An Emerging Technology

    1.3 Visual Cryptography for Colored Images. Authors in [] propose a novel visual cryptography-based cryptography system for safeguarding colored images, as seen in Fig. 3.Both the input data and the key used to encrypt and decrypt the colour picture that needs to be secured are binary images. A secret colour picture to be shared is split into three monochrome images using the YCbCr colour ...

  16. [PDF] Visual Cryptography

    This paper presents an improved algorithm based on Chang's and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images that achieves lossless recovery and reduces the noise in the cover images without adding any computational complexity. Expand. 55. PDF.

  17. Applications and usage of visual cryptography: A review

    Abstract: Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. In this paper, we intend to study the different application areas of Visual Cryptography. Visual Cryptography is a wide area of research used in data hiding, securing images, color imaging ...

  18. (PDF) Visual Cryptography : Literature Review*

    Most research papers have been published to. reduce the pixel expansion [5,6,7,8,9,10,11].Some of them. can even have no pix el expansion (m = 1) [5,7,10,11]. ... A visual cryptography scheme (VCS ...

  19. PDF An Overview of Different Visual Cryptography Techniques

    AN OVERVIEW OF DIFFERENT VISUAL CRYPTOGRAPHY TECHNIQUES 1Omkar Pattnaik, 2 Ranishree Patel, 3 ... To fill this gap, this paper offers a thorough overview of the subject to help new researchers in finding appropriate visual cryptography techniques ... cryptography from different research articles. The main focus is on the use of encryption ...

  20. Cybersecurity, Cryptography, and Machine Learning

    Feature papers represent the most advanced research with significant potential for high impact in the field. ... Cryptography is one of the most important tools that has been widely deployed by researchers and practitioners in academia and industry to build secure information technology infrastructures ensuring the confidentiality of data and ...

  21. Enhancing image quality in Visual Cryptography with colors

    The notion of Visual Cryptography was first introduced by Naor and Shamir in 1994 [NS94]. Here "visual" means that the decryption is done by human eyes instead of by any computing devices. To retrieve the ciphertext, simply stack the encrypted images together. In fact, it is more like an image secret sharing scheme than an encryption scheme. Both the secret and the shares are black-and ...

  22. Visual Prompting for Generalized Few-shot Segmentation: A Multi-scale

    The emergence of attention-based transformer models has led to their extensive use in various tasks, due to their superior generalization and transfer properties. Recent research has demonstrated that such models, when prompted appropriately, are excellent for few-shot inference. However, such techniques are under-explored for dense prediction tasks like semantic segmentation. In this work, we ...

  23. (PDF) A Review Paper on Cryptography

    Cryptography has the importa nt purpose of providing reliabl e, strong, and robust network and data security. In this paper, we. demonstrated a review of some of the research that has been ...

  24. VASA-1

    We introduce VASA, a framework for generating lifelike talking faces of virtual characters with appealing visual affective skills (VAS), given a single static image and a speech audio clip. Our premiere model, VASA-1, is capable of not only producing lip movements that are exquisitely synchronized with the audio, but also capturing a large ...

  25. V-CRYPT: A Secure Visual Cryptography System

    Nowadays, peoples are very concerned about their data privacy. Hence, all the current security methods should be improved to stay relevant in this fast-growing technology world. Visual Cryptography (VC) is a cryptographic technique that using the image processing method. The implementation of VC can be varying and flexible to be applied to the system that requires an extra security precaution ...

  26. cfp

    contact email: [email protected]. Please consider submitting papers to Visualizing Hidden Meanings: Symbolism and Cryptography in the Writings of Thomas Harriot and Galileo Galilei. This workshop provides an excellent platform for scholars to share their latest findings and insights in the early modern history of science.