Skip to main content

Various Applications of Visual Cryptography

  • Chapter
  • First Online:

Abstract

Based on the theoretic research we conducted, in this chapter, we introduce the various applications of visual cryptography. The typical applications of visual cryptography include watermarking, resolution variant visual cryptography, multiple resolution visual cryptography scheme, etc. We hope the simple and effective encryption and decryption techniques of visual cryptography could be applied to our ordinary life.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Extended schemes for visual cryptography. Theor Comput Sci 250:1–16

    Google Scholar 

  2. Blundo C, DArco P, Santis AD, Stinson DR (2003) Contrast optimal threshold visual cryptography schemes. SIAM J Discret Math 16(2):224–261

    Article  MATH  Google Scholar 

  3. Chang CC, Chuang JC (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognit Lett 23:931–941

    Article  MATH  MathSciNet  Google Scholar 

  4. Chang SL, Chen LS, Chung YC, Chen SW (2004) Automatic license plate recognition. IEEE Trans Intell Transp Syst 5(1):42–53

    Article  MathSciNet  Google Scholar 

  5. Chen TH, Tsai DS (2006) Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit 39:1530–1541

    Article  MATH  Google Scholar 

  6. Cordaro J, Wagner T (1967) Optimum (n, 2) codes for small values of channel error probability. IEEE Trans Inf Theory 13(2):349–350

    Article  MATH  Google Scholar 

  7. Gnanaguruparan M, Kak S (2002) Recursive hiding of secrets in visual cryptography. Cryptologia 26(1):68–76

    Article  Google Scholar 

  8. Hou YC, Chen PM (2000) An asymmetric watermarking scheme based on visual cryptography. In: IEEE intternational conference on signal processing, pp 992–995

    Google Scholar 

  9. Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003.1–077003.10

    Google Scholar 

  10. Hsieh SL, Hsu LY, Tsai IJ (2005) A copyright protection scheme for color images using secret sharing and wavelet transformation. In: World Academy of Science, Engineering and Technology

    Google Scholar 

  11. Hsu CT, Wu M (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8:58–68

    Article  Google Scholar 

  12. Jin D, Yan W, Kankanhalli MS (2005) Progressive color visual cryptography. SPIE J Electron Imaging 14(3):64

    Google Scholar 

  13. Lin CY, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM (2001) Rotation, scale and translation resilient watermarking for images. IEEE Trans Image Process 10:767–782

    Article  MATH  Google Scholar 

  14. Liu F, Wu CK, Lin XJ (2010) Some extensions on threshold visual cryptography schemes. Comput J 53(1):107–119

    Article  Google Scholar 

  15. Lou DC, Tso HK, Liu JL (2007) A copyright protection scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29:125–131

    Article  Google Scholar 

  16. Naor M, Shamir A (1995) Visual cryptography. In: EUROCRYPT ’94, LNCS, vol 950. Springer, pp 1–12

    Google Scholar 

  17. Tai GC, Chang LW (2004) Visual cryptography for digital watermarking in still images. Pacific rim conference on multimedia, LNCS, vol 3332, p 50–57

    Google Scholar 

  18. Thomos N, Boulgouris NV, Strintzis MG (2006) Optimized transmission of JPEG2000 streams over wireless channels. IEEE Trans Image Process 15(1):54–67

    Article  Google Scholar 

  19. Tuyls P, Hollmann HDL, van Lint JH, Tolhuizen L (2005) Optimized transmission of JPEG2000 streams over wireless channels. Des Codes Crypt 37:169–186

    Article  MATH  Google Scholar 

  20. Voyatzis G, Pitas I (1996) Applications of toral automorphisms in image watermarking. In: International conference on image processing, vol 2, p 237–240

    Google Scholar 

  21. Wang MS, Chen WC (2007) Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt Eng 46(6):1–8

    MATH  Google Scholar 

  22. Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stan Interfaces 31(4):757–762

    Article  Google Scholar 

  23. Wang FH, Yen KK, Jain LC, Pan JS (2007) Multiuser-based shadow watermark extraction system. Inf Sci 177:2522–2532

    Article  Google Scholar 

  24. Weir J, Yan W (2009) Image hatching for visual cryptography. In: International machine vision and image processing conference, p 59–64

    Google Scholar 

  25. Weir J, Yan W, Crookes D (2008) Secure mask for color image hiding. In: International conference on communications and networking in china, p 1304–1307

    Google Scholar 

  26. Weir J, Yan WQ (2009) Sharing multiple secrets using visual cryptography. In: IEEE international symposium on circuits and systems, p 509–512

    Google Scholar 

  27. Weir J, Yan WQ (2009) Dot-size variant visual cryptography. In: IWDW 09, p 136–148

    Google Scholar 

  28. Zheng D, Zhao Y, Wang J (2005) An efficient method of license plate location. Pattern Recogn Lett 26(15):2431–2438

    Article  Google Scholar 

  29. Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Liu .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Liu, F., Yan, W.Q. (2014). Various Applications of Visual Cryptography. In: Visual Cryptography for Image Processing and Security. Springer, Cham. https://doi.org/10.1007/978-3-319-09644-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09644-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09643-8

  • Online ISBN: 978-3-319-09644-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics