A comprehensive investigation of visual cryptography and its role in secure communications
- Published
- Accepted
- Subject Areas
- Computer Vision, Cryptography, Graphics, Security and Privacy
- Keywords
- Visual cryptography, secret sharing, image encryption, Visual security, Network security, Secure sharing
- Copyright
- © 2017 Shahab et al.
- Licence
- This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
- Cite this article
- 2017. A comprehensive investigation of visual cryptography and its role in secure communications. PeerJ Preprints 5:e2682v3 https://doi.org/10.7287/peerj.preprints.2682v3
Abstract
Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.
Author Comment
Draft Version - Changing title only