Visual Cryptography and Its Applications by Jonathan Weir and WeiQi Yan

visual-cryptography-applicaAs technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. Many attempts have been made to solve this problem within the cryptographic community. In this book, the authors present one of these data security methods known as visual cryptography (VC). Specifically, visual cryptography allows us to effectively and efficiently share secrets between a number of trusted parties. As with many cryptographic schemes, trust is the most difficult part. Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares on transparencies are superimposed exactly together, the original secret can be discovered without computer participation. In this book, many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments. Traditional VC specifically deals with sharing a single binary secret between a number of participants. Extended VC attempts to take this a step further by introducing shares that have significant visual meaning. This detracts from the suspicious looking encrypted shares that are generated using traditional methods.


Dynamic, color, progressive and image hatching VC schemes are also discussed. In this book the readers will read Traditional Visual cryptography, Secret sharing, Visual cryptography, Size invariant visual cryptography, Recursive visual cryptography, Analysis of visual cryptography, Mathematical background, Analysis in the frequency domain, Extended visual cryptography, Extended visual cryptography, Halftone visual cryptography, Cheating immune VC schemes, Dot-size variant visual cryptography, Dynamic visual cryptography, Motivation, Basic multiple secret sharing, Embedding a share of visual cryptography in a Halftone image, Color visual cryptography, Color visual cryptography, Image sharing using random masks, Quality evaluation, Progressive visual cryptography, Motivation, Progressive visual cryptography, Image hatching for visual cryptography, Image hatching with VC, Security Analysis, Applications for visual cryptography, Moiré Patterns, Watermarking, Criteria for Evaluation purposes and much more.

To download this book, please click the link below:
Click here to download Visual Cryptography and Its Applications

Leave A Reply

Your email address will not be published.