An overview of visual cryptography techniques

DR Ibrahim, JS Teh, R Abdullah - Multimedia Tools and Applications, 2021‏ - Springer
Visual cryptography is an encryption technique that decomposes secret images into multiple
shares. These shares are digitally or physically overlapped to recover the original image …

Privacy‐preserving remote sensing images recognition based on limited visual cryptography

D Zhang, M Shafiq, L Wang… - CAAI Transactions on …, 2023‏ - Wiley Online Library
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT),
this paper goes beyond the understanding of traditional remote sensing technologies. Deep …

Reversible image secret sharing

X Yan, Y Lu, L Liu, X Song - IEEE Transactions on Information …, 2020‏ - ieeexplore.ieee.org
In reversible image secret sharing (RISS), the cover image can be recovered to some
degree, and a share can be comprehensible rather than noise-like. Reversible cover images …

An enhanced threshold visual secret sharing based on random grids

X Yan, X Liu, CN Yang - Journal of real-time image processing, 2018‏ - Springer
Random grids (RG)-based visual secret sharing (VSS) scheme can easily avoid the pixel
expansion problem as well as requires no codebook design. However, previous scheme still …

A common method of share authentication in image secret sharing

X Yan, Y Lu, CN Yang, X Zhang… - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …

Exploiting the error correction mechanism in QR codes for secret sharing

YW Chow, W Susilo, G Yang, JG Phillips… - Information Security and …, 2016‏ - Springer
This paper investigates a novel approach to secret sharing using QR codes. The proposed
QR code secret sharing approach exploits the error correction mechanism inherent in the …

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality

X Yan, S Wang, X Niu, CN Yang - Digital Signal Processing, 2015‏ - Elsevier
In halftone visual cryptography scheme (HVCS), a secret image can be embedded into
halftone shares with meaningful information of the cover images. Meaningful shares are …

Extended capabilities for XOR-based visual cryptography

X Wu, W Sun - IEEE Transactions on Information Forensics and …, 2014‏ - ieeexplore.ieee.org
The XOR-based visual cryptography (VC) is a possible methodology to solve the poor visual
quality problem without darkening the background in VC. However, investigations on XOR …

A general progressive secret image sharing construction method

X Yan, Y Lu, L Liu - Signal Processing: Image Communication, 2019‏ - Elsevier
Classic secret image sharing (SIS) including polynomial-based SIS, visual secret sharing
(VSS), linear congruence (LC)-based SIS and so on, generally has the shortcoming of “all-or …

Visual Secret Sharing Scheme for (k, n) Threshold-Based on QR Code with Multiple Decryptions

S Wan, Y Lu, X Yan, Y Wang… - … and Information Security …, 2018‏ - taylorfrancis.com
In this paper, a novel visual secret sharing (VSS) scheme based on QR code (VSSQR) with
(k; n) threshold is investigated. Our VSSQR exploits the error correction mechanism in the …