A comprehensive investigation of visual cryptography and its role in secure communications

Computer Science, Islamic Azad University, Taft, Iran
Bio-Mechanic, Islamic Azad University, Yazd, Yazd, Iran
DOI
10.7287/peerj.preprints.2682v3
Subject Areas
Computer Vision, Cryptography, Graphics, Security and Privacy
Keywords
Visual cryptography, secret sharing, image encryption, Visual security, Network security, Secure sharing
Copyright
© 2017 Shahab et al.
Licence
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
Cite this article
Shahab E, Abdolrahimpour H. 2017. A comprehensive investigation of visual cryptography and its role in secure communications. PeerJ Preprints 5:e2682v3

Abstract

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.

Author Comment

Draft Version - Changing title only