An overview of visual cryptography techniques
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visua...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2021-09, Vol.80 (21-23), p.31927-31952 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 31952 |
---|---|
container_issue | 21-23 |
container_start_page | 31927 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Ibrahim, Dyala R. Teh, Je Sen Abdullah, Rosni |
description | Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions. |
doi_str_mv | 10.1007/s11042-021-11229-9 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2580187127</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2580187127</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-d781ad4708b851838bdf91a8bb1af6468ff70423d05e97a9a50aa79a766718db3</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwB5giMRvu7Dhnj1XFl4TEArPlJHabqiTBTov670kJEhvTvcP7cXoYu0a4RQC6S4iQCw4COaIQhpsTNkNFkhMJPB211MBJAZ6zi5Q2AFgokc8YX7RZt_dx3_ivrAvZvkk7t82qeOiHbhVdvz5kg6_WbfO58-mSnQW3Tf7q987Z-8P92_KJv7w-Pi8XL7ySaAZek0ZX5wS61Aq11GUdDDpdluhCkRc6BBrflTUob8gZp8A5Mo6KglDXpZyzm6m3j91xd7CbbhfbcdIKpQE1oaDRJSZXFbuUog-2j82HiweLYI9Y7ITFjljsDxZrxpCcQmk0tysf_6r_SX0DyE9kHg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2580187127</pqid></control><display><type>article</type><title>An overview of visual cryptography techniques</title><source>Springer Nature - Complete Springer Journals</source><creator>Ibrahim, Dyala R. ; Teh, Je Sen ; Abdullah, Rosni</creator><creatorcontrib>Ibrahim, Dyala R. ; Teh, Je Sen ; Abdullah, Rosni</creatorcontrib><description>Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11229-9</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Image quality ; Multimedia Information Systems ; Performance measurement ; Signal to noise ratio ; Special Purpose and Application-Based Systems ; Visual signals</subject><ispartof>Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.31927-31952</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-d781ad4708b851838bdf91a8bb1af6468ff70423d05e97a9a50aa79a766718db3</citedby><cites>FETCH-LOGICAL-c319t-d781ad4708b851838bdf91a8bb1af6468ff70423d05e97a9a50aa79a766718db3</cites><orcidid>0000-0001-5571-4148 ; 0000-0002-3061-5837</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-021-11229-9$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-021-11229-9$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Ibrahim, Dyala R.</creatorcontrib><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Abdullah, Rosni</creatorcontrib><title>An overview of visual cryptography techniques</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.</description><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Image quality</subject><subject>Multimedia Information Systems</subject><subject>Performance measurement</subject><subject>Signal to noise ratio</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Visual signals</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kD1PwzAQhi0EEqXwB5giMRvu7Dhnj1XFl4TEArPlJHabqiTBTov670kJEhvTvcP7cXoYu0a4RQC6S4iQCw4COaIQhpsTNkNFkhMJPB211MBJAZ6zi5Q2AFgokc8YX7RZt_dx3_ivrAvZvkk7t82qeOiHbhVdvz5kg6_WbfO58-mSnQW3Tf7q987Z-8P92_KJv7w-Pi8XL7ySaAZek0ZX5wS61Aq11GUdDDpdluhCkRc6BBrflTUob8gZp8A5Mo6KglDXpZyzm6m3j91xd7CbbhfbcdIKpQE1oaDRJSZXFbuUog-2j82HiweLYI9Y7ITFjljsDxZrxpCcQmk0tysf_6r_SX0DyE9kHg</recordid><startdate>20210901</startdate><enddate>20210901</enddate><creator>Ibrahim, Dyala R.</creator><creator>Teh, Je Sen</creator><creator>Abdullah, Rosni</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid><orcidid>https://orcid.org/0000-0002-3061-5837</orcidid></search><sort><creationdate>20210901</creationdate><title>An overview of visual cryptography techniques</title><author>Ibrahim, Dyala R. ; Teh, Je Sen ; Abdullah, Rosni</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-d781ad4708b851838bdf91a8bb1af6468ff70423d05e97a9a50aa79a766718db3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Image quality</topic><topic>Multimedia Information Systems</topic><topic>Performance measurement</topic><topic>Signal to noise ratio</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Visual signals</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ibrahim, Dyala R.</creatorcontrib><creatorcontrib>Teh, Je Sen</creatorcontrib><creatorcontrib>Abdullah, Rosni</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ibrahim, Dyala R.</au><au>Teh, Je Sen</au><au>Abdullah, Rosni</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An overview of visual cryptography techniques</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-09-01</date><risdate>2021</risdate><volume>80</volume><issue>21-23</issue><spage>31927</spage><epage>31952</epage><pages>31927-31952</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-11229-9</doi><tpages>26</tpages><orcidid>https://orcid.org/0000-0001-5571-4148</orcidid><orcidid>https://orcid.org/0000-0002-3061-5837</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-09, Vol.80 (21-23), p.31927-31952 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2580187127 |
source | Springer Nature - Complete Springer Journals |
subjects | Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Image quality Multimedia Information Systems Performance measurement Signal to noise ratio Special Purpose and Application-Based Systems Visual signals |
title | An overview of visual cryptography techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T06%3A06%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20overview%20of%20visual%20cryptography%20techniques&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Ibrahim,%20Dyala%20R.&rft.date=2021-09-01&rft.volume=80&rft.issue=21-23&rft.spage=31927&rft.epage=31952&rft.pages=31927-31952&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11229-9&rft_dat=%3Cproquest_cross%3E2580187127%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2580187127&rft_id=info:pmid/&rfr_iscdi=true |