An overview of visual cryptography techniques

被引:25
作者
Ibrahim, Dyala R. [1 ]
Teh, Je Sen [2 ]
Abdullah, Rosni [1 ]
机构
[1] Univ Sains Malaysia, Natl Adv IPv6 Ctr, George Town, Malaysia
[2] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
关键词
Confidentiality; Encryption; Information security; Pixel expansion; Secret sharing; Visual cryptography; SECRET SHARING SCHEME; IMAGE; SIZE;
D O I
10.1007/s11042-021-11229-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.
引用
收藏
页码:31927 / 31952
页数:26
相关论文
共 120 条
  • [1] Abraham AS, 2017, 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), P387, DOI 10.1109/NETACT.2017.8076801
  • [2] Al-Khalid R. I., 2017, Journal of Software Engineering and Applications, V10, P1, DOI [10.4236/JSEA.2017.101001, DOI 10.4236/JSEA.2017.101001]
  • [3] Anbarasi L.J., 2011, 2011 3 INT C EL COMP, V2, P393
  • [4] [Anonymous], 2011, 2011 INT C REC TREND
  • [5] On (k, n)*-visual cryptography scheme
    Arumugam, S.
    Lakshmanan, R.
    Nagar, Atulya K.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) : 153 - 162
  • [6] Novel visual cryptography schemes without pixel expansion for halftone images
    Askari, Nazanin
    Heys, Howard M.
    Moloney, Cecilia R.
    [J]. 1600, IEEE Canada (37): : 168 - 177
  • [7] Askari N, 2013, CAN CON EL COMP EN, P286
  • [8] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [9] Extended capabilities for visual cryptography
    Ateniese, G
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) : 143 - 161
  • [10] Bhatnagar Rajat, 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), P78, DOI 10.1109/ICECA.2018.8474649