Abstract
Based on the theoretic research we conducted, in this chapter, we introduce the various applications of visual cryptography. The typical applications of visual cryptography include watermarking, resolution variant visual cryptography, multiple resolution visual cryptography scheme, etc. We hope the simple and effective encryption and decryption techniques of visual cryptography could be applied to our ordinary life.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Extended schemes for visual cryptography. Theor Comput Sci 250:1–16
Blundo C, DArco P, Santis AD, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16(2):224–261
Chang CC, Chuang JC (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognit Lett 23:931–941
Chang SL, Chen LS, Chung YC, Chen SW (2004) Automatic license plate recognition. IEEE Trans Intell Transp Syst 5(1):42–53
Chen TH, Tsai DS (2006) Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit 39:1530–1541
Cordaro J, Wagner T (1967) Optimum (n, 2) codes for small values of channel error probability. IEEE Trans Inf Theory 13(2):349–350
Gnanaguruparan M, Kak S (2002) Recursive hiding of secrets in visual cryptography. Cryptologia 26(1):68–76
Hou YC, Chen PM (2000) An asymmetric watermarking scheme based on visual cryptography. In: IEEE intternational conference on signal processing, pp 992–995
Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003.1–077003.10
Hsieh SL, Hsu LY, Tsai IJ (2005) A copyright protection scheme for color images using secret sharing and wavelet transformation. In: World Academy of Science, Engineering and Technology
Hsu CT, Wu M (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68
Jin D, Yan W, Kankanhalli MS (2005) Progressive color visual cryptography. SPIE J Electron Imaging 14(3):64
Lin CY, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM (2001) Rotation, scale and translation resilient watermarking for images. IEEE Trans Image Process 10:767–782
Liu F, Wu CK, Lin XJ (2010) Some extensions on threshold visual cryptography schemes. Comput J 53(1):107–119
Lou DC, Tso HK, Liu JL (2007) A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29:125–131
Naor M, Shamir A (1995) Visual cryptography. In: EUROCRYPT ’94, LNCS, vol 950. Springer, pp 1–12
Tai GC, Chang LW (2004) Visual cryptography for digital watermarking in still images. Pacific rim conference on multimedia, LNCS, vol 3332, p 50–57
Thomos N, Boulgouris NV, Strintzis MG (2006) Optimized transmission of JPEG2000 streams over wireless channels. IEEE Trans Image Process 15(1):54–67
Tuyls P, Hollmann HDL, van Lint JH, Tolhuizen L (2005) Optimized transmission of JPEG2000 streams over wireless channels. Des Codes Crypt 37:169–186
Voyatzis G, Pitas I (1996) Applications of toral automorphisms in image watermarking. In: International conference on image processing, vol 2, p 237–240
Wang MS, Chen WC (2007) Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt Eng 46(6):1–8
Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stan Interfaces 31(4):757–762
Wang FH, Yen KK, Jain LC, Pan JS (2007) Multiuser-based shadow watermark extraction system. Inf Sci 177:2522–2532
Weir J, Yan W (2009) Image hatching for visual cryptography. In: International machine vision and image processing conference, p 59–64
Weir J, Yan W, Crookes D (2008) Secure mask for color image hiding. In: International conference on communications and networking in china, p 1304–1307
Weir J, Yan WQ (2009) Sharing multiple secrets using visual cryptography. In: IEEE international symposium on circuits and systems, p 509–512
Weir J, Yan WQ (2009) Dot-size variant visual cryptography. In: IWDW 09, p 136–148
Zheng D, Zhao Y, Wang J (2005) An efficient method of license plate location. Pattern Recogn Lett 26(15):2431–2438
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Liu, F., Yan, W.Q. (2014). Various Applications of Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-09644-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09643-8
Online ISBN: 978-3-319-09644-5
eBook Packages: Computer ScienceComputer Science (R0)