Skip to main content
Log in

An overview of visual cryptography techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. as of mid-January 2021

References

  1. A JB, Raj C, Sukumaran R, G SM (2019) Enhanced semantic visual secret sharing scheme for the secure image communication. 79(23-24), 17057–17079. https://doi.org/10.1007/s11042-019-7535-2

  2. Abraham AS, Nair LR, Deepa MS (2017) A novel method for evaluation of visual security of images. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT). IEEE

  3. Al-Khalid RI, Al-Dallah RA, Al-Anani AM, Barham RM, Hajir SI (2017) A secure visual cryptography scheme using private key with invariant share sizes. J Softw Eng Appl 10(01):1–10. https://doi.org/10.4236/jsea.2017.101001

    Article  Google Scholar 

  4. Alex NS, Anbarasi LJ (2011) Enhanced image secret sharing via error diffusion in halftone visual cryptography. In: 2011 3rd International Conference on Electronics Computer Technology. IEEE

  5. Amitharaja R, Shaik A, Thanikaise V (2016) Data security through data hiding in images: A review. J Artif Intell 10(1):1–21. https://doi.org/10.3923/jai.2017.1.21

    Article  Google Scholar 

  6. Arumugam S, Lakshmanan R, Nagar AK (2012) On (k, n)∗-visual cryptography scheme. 71(1), 153–162. https://doi.org/10.1007/s10623-012-9722-2

  7. Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images. In: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE

  8. Askari N, Heys HM, Moloney CR (2014) Novel visual cryptography schemes without pixel expansion for halftone images. Can J Electr Comput Eng 37(3):168–177. https://doi.org/10.1109/cjece.2014.2333419

    Article  Google Scholar 

  9. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106. https://doi.org/10.1006/inco.1996.0076

    Article  MathSciNet  MATH  Google Scholar 

  10. Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):143–161. https://doi.org/10.1016/s0304-3975(99)00127-9

    Article  MathSciNet  MATH  Google Scholar 

  11. Bhatnagar R, Kumar M (2018) Visual Cryptography: A literature survey. In: 2018 Second INternational Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE

  12. Blesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. In: 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEE

  13. Bonis AD, Santis AD (2004) Randomness in secret sharing and visual cryptography schemes. Theor Comput Sci 314(3):351–374. https://doi.org/10.1016/j.tcs.2003.12.018

    Article  MathSciNet  MATH  Google Scholar 

  14. Borchert B (2007) Segment-based Visual Cryptography. Tech. Rep. WSI-2007-04, WSI Institute for computer science

  15. Chanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval 8(4):195–215. https://doi.org/10.1007/s13735-018-0161-3

    Article  Google Scholar 

  16. Chao HC, Fan TY (2017) Generating random grid-based visual secret sharing with multi-level encoding. Signal Process Image Commun 57:60–67. https://doi.org/10.1016/j.image.2017.05.005

    Article  Google Scholar 

  17. Chao H-C, Fan T-Y (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing 68:69–80. https://doi.org/10.1016/j.dsp.2017.05.009

    Article  Google Scholar 

  18. Chaturvedi A, Bhat IJ (2015) Analysis of schemes proposed for improving the segment based visual cryptography. International Journal of Computer Trends and Technology 30(1):26–30. https://doi.org/10.14445/22312803/ijctt-v30p105

    Article  Google Scholar 

  19. Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE). IEEE

  20. Chavan PV, Atique M (2015) Secured approach for authentication using threshold-based hierarchical visual cryptography. International Journal of Information Privacy, Security and Integrity 2(2):159. https://doi.org/10.1504/ijipsi.2015.075440

    Article  Google Scholar 

  21. Chavan PV, Atique M, Malik L (2014) Signature based authentication using contrast enhanced hierarchical visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE

  22. Chen J, Chen T-S, Hsu H-C, Lin Y-H (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. The Imaging Science Journal 57(2):101–108. https://doi.org/10.1179/174313108x384656

    Article  Google Scholar 

  23. Chen Q, Peng W-F, Zhang M, Chu Y-P (2010) An (n, n) threshold visual cryptography scheme for cheating prevention. In: 2010 3rd International Conference on Computer Science and Information Technology. IEEE

  24. Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. 8, 111330–111346. https://doi.org/10.1109/access.2020.3000308

  25. Dahat AV, Chavan PV (2016) Secret sharing based visual cryptography scheme us-ing cmy color space. Procedia Computer Science 78:550–555. https://doi.org/10.1016/j.procs.2016.02.101

    Article  Google Scholar 

  26. Das SS, Sharma KD, Chandra JK, Bera JN (2018) A hierarchical image cryptosystem based on visual cryptography and vector quantization. In: Advances in Intelligent Systems and Computing, pp 3–11. Springer Singapore

  27. Deepa AK, Bento B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 2014 12th International Conference on Signal Processing (ICSP). IEEE

  28. Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Computers & Electrical Engineering 70:647–658. https://doi.org/10.1016/j.compeleceng.2017.09.017

    Article  Google Scholar 

  29. Fang W-P (2008) Friendly progressive visual secret sharing. Pattern Recogn 41(4):1410–1414. https://doi.org/10.1016/j.patcog.2007.09.004

    Article  MATH  Google Scholar 

  30. Fathimal M, Jansirani (2019) New fool proof examination system through color visual cryptography and signature authentication. In: The International Arab Journal of In-formation Technology, pp 322–336. Springer Berlin Heidelberg

  31. Feng J-B, Wu H-C, Tsai C-S, Chang Y-F, Chu Y-P (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581. https://doi.org/10.1016/j.patcog.2008.05.031

    Article  MATH  Google Scholar 

  32. Fu Z, Yu B (2009) Research on rotation visual cryptography scheme. In: 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE

  33. Geetha P, Jayanthi VS, Jayanthi AN (2019) Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. 78(13), 18503–18530. https://doi.org/10.1007/s11042-019-7163-x

  34. Guo Y, Jia X, Chu Q, Wang D (2020) A novel XOR-based threshold visual cryptography with adjustable pixel expansion. 10(4), 1321. https://doi.org/10.3390/app10041321

  35. Haouzia A, Noumeir R (2007) Methods for image authentication: a survey. Multimedia Tools and Applications 39(1):1–46. https://doi.org/10.1007/s11042-007-0154-3

    Article  Google Scholar 

  36. Hodeish ME, Humbe VT (2018) An optimized halftone visual cryptography scheme using error diffusion. Multimedia Tools and Applications 77 (19):24937–24953. https://doi.org/10.1007/s11042-018-5724-z

    Article  Google Scholar 

  37. Hou YC, Lin CF, Chang CY (2001) Visual cryptography for color images without pixel expansion. J Technol 2(4):151. https://doi.org/10.1049/iet-ifs:20080066

    Google Scholar 

  38. Hou Y-C (2003) Visual cryptography for color images. Pattern Recogn 36(7):1619–1629. https://doi.org/10.1016/s0031-3203(02)00258-3

    Article  Google Scholar 

  39. Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Transactions on Circuits and Systems for Video Technology 21(11):1760–1764. https://doi.org/10.1109/tcsvt.2011.2106291

    Article  Google Scholar 

  40. Hou Y-C, Quan Z-Y, Tsai C-F, Tseng A-Y (2013) Block-based progressive visual secret sharing. 233, 290–304.https://doi.org/10.1016/j.ins.2013.01.006

  41. Hsu H-C, Chen J, Chen T-S, Lin Y-H (2007) Special type of circular visual cryptography for multiple secret hiding. The Imaging Science Journal 55 (3):175–179. https://doi.org/10.1179/174313107x176289

    Article  Google Scholar 

  42. Hsu S-F, Chang Y-J, Wang R-Z, Lee Y-K, Huang S-Y (2012) Verifiable visual cryptography. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing. IEEE

  43. Ito KH, Tanaka H (1999) image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290

    Google Scholar 

  44. Jana B, Chowdhuri P, auMadhumita Mallick, auShyamal Kumar Mondal (2014) Cheating prevention in visual cryptography using steganographic scheme. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE

  45. Jena D, Jena SK (2009) A novel visual cryptography scheme. In: 2009 International Conference on Advanced Computer Control. IEEE

  46. Jin D (2005) Progressive color visual cryptography. Journal of Electronic Imaging 14(3):033019. https://doi.org/10.1117/1.1993625

    Article  Google Scholar 

  47. Joshi AM, Jadhav DM, Kazi NA, Suryawanshi AN, Katti J (2016) Authentication of grayscale forensic image using visual secret sharing. In: 2016 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE

  48. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377. https://doi.org/10.1364/ol.12.000377

    Article  Google Scholar 

  49. Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended visual cryptography for color images using coding tables. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE

  50. Kanakkath P, Madathil S, Krishnan R (2018) Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multimedia Tools and Applications 78(2):1315–1344. https://doi.org/10.1007/s11042-018-6158-3

    Article  Google Scholar 

  51. Kang I, Arce GR, Lee H-K (2011) Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing 20(1):132–145. https://doi.org/10.1109/tip.2010.2056376

    Article  MathSciNet  MATH  Google Scholar 

  52. Kukreja S, Kasana G, Kasana SS (2020) Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors. https://doi.org/10.1007/s00371-020-01883-9

  53. Kumar H, Srivastava A (2014) A secret sharing scheme for secure transmission of color images. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE

  54. Kumar M, Verma HK, Sikka G (2018) A secure lightweight signature based authentication for cloud-IoT crowdsensing environments. Transactions on Emerging Telecommunications Technologies 30(4):e3292. https://doi.org/10.1002/ett.3292

    Article  Google Scholar 

  55. Kumar S, Sharma RK (2013) Recursive information hiding of secrets by random grids. Cryptologia 37(2):154–161. https://doi.org/10.1080/01611194.2012.739585

    Article  Google Scholar 

  56. Lee K-H, Chiu P-L (2012) An extended visual cryptography algorithm for general access structures. IEEE Transactions on Information Forensics and Security 7(1):219–229. https://doi.org/10.1109/tifs.2011.2167611

    Article  Google Scholar 

  57. Lee K-H, Chiu P-L (2013) Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE Transactions on Image Processing 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290

    Article  MathSciNet  MATH  Google Scholar 

  58. Li P, Ma J, Ma Q (2020) (t, k, n) XOR-based visual cryptography scheme with essential shadows. 72, 102911. https://doi.org/10.1016/j.jvcir.2020.102911

  59. Li P, Ma J, Yin L, Ma Q (2020) A construction method of (2, 3) visual cryptography scheme. 8, 32840–32849. https://doi.org/10.1109/access.2020.2973659

  60. Lin H-C, Yang C-N, Laih C-S, Lin H-T (2013) Natural language letter based visual cryptography scheme. J Vis Commun Image Represent 24 (3):318–331. https://doi.org/10.1016/j.jvcir.2013.01.003

    Article  Google Scholar 

  61. Lin S-J, Chen S-K, Lin J-C (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21(8):900–916. https://doi.org/10.1016/j.jvcir.2010.08.006

    Article  Google Scholar 

  62. Liu GY, Li ZW, Barkaoui K, Al-Ahmari AM (2013) Robustness of deadlock control for a class of petri nets with unreliable resources. Inf Sci 235:259–279. https://doi.org/10.1016/j.ins.2013.01.003

    Article  MathSciNet  MATH  Google Scholar 

  63. Lu J, Yang Z, Li L, Yuan W, Li L, Chang C-C (2017) Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob Inf Syst 2017:1–12. https://doi.org/10.1155/2017/4356038

    Google Scholar 

  64. Malar S, Kumar J (2011) Error filtering schemes for color images in visual cryptography. Int J Adv Comput Sci Appl, 2(11). https://doi.org/10.14569/ijacsa.2011.021112

  65. Mary GG, Rani MMS (2018) Application of ant colony optimization for enhancement of visual cryptography images. In: Intelligent Systems Reference Library, pp 147–163. Springer International Publishing

  66. Melgar MEV, Farias MCQ (2019) A (2,2) XOR-based visual cryptography scheme without pixel expansion. 63, 102592. https://doi.org/10.1016/j.jvcir.2019.102592

  67. Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729. https://doi.org/10.1007/s10278-014-9700-5

    Article  Google Scholar 

  68. Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: Multimedia and Expo, 2007 IEEE International Conference on. IEEE

  69. Naor M, Shamir A (1995) Visual cryptography. In: Advances in Cryptology - EUROCRYPT’94, pp 1–12. Springer Berlin Heidelberg

  70. Naor M, Shamir A (1997) Visual cryptography II: Improving the contrast via the cover base. In: Security Protocols, pp 197–202. Springer Berlin Heidelberg

  71. Palevicius P, Ragulskis M (2015) Image communication scheme based on dynamic visual cryptography and computer generated holography. Opt Commun 335:161–167. https://doi.org/10.1016/j.optcom.2014.09.041

    Article  Google Scholar 

  72. Pandey A, Som S (2016) Applications and usage of visual cryptography: A review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE

  73. Pang L, Miao D, Lian C (2015) User-friendly random-grid-based visual secret sharing for general access structures. Security and Communication Networks 9(10):966–976. https://doi.org/10.1002/sec.1392

    Article  Google Scholar 

  74. Parakh A, Kak S (2009) A recursive threshold visual cryptography scheme. Cryptologia 26(1):68–76. https://doi.org/10.1080/0161-110291890768

    MATH  Google Scholar 

  75. Petrauskiene V, Survila A, Fedaravicius A, Ragulskis M (2014) Dynamic visual cryptography for optical assessment of chaotic oscillations. Optics & Laser Technology 57:129–135. https://doi.org/10.1016/j.optlastec.2013.10.015

    Article  Google Scholar 

  76. Praun E, Hoppe H, Webb M, Finkelstein A (2001) Real-time hatching. In: Proceedings of the 28th annual conference on Computer graphics and interactive techniques - SIGGRAPH ’01. ACM Press

  77. Premkumar S, Narayanan AE (2012) Notice of violation of IEEE publication principles - new visual steganography scheme for secure banking application. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE

  78. Prisco RD, Santis AD (2013) Color visual cryptography schemes for black and white secret images. 510, 62–86. https://doi.org/10.1016/j.tcs.2013.09.005

  79. Prisco RD, Santis AD (2014) On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9(4):653–665. https://doi.org/10.1109/tifs.2014.2305574

    Article  Google Scholar 

  80. Punithavathi P, Geetha S (2016) Cancelable biometric template security using segment-based visual cryptography. In: Advances in Intelligent Systems and Computing, pp 511–521. Springer Singapore

  81. Punithavathi P, Geetha S (2017) Visual cryptography: A brief survey. Information Security Journal: A Global Perspective 26(6):305–317. https://doi.org/10.1080/19393555.2017.1386249

    Google Scholar 

  82. R (2011) A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE

  83. Ramya J, Parvathavarthini B (2014) An extensive review on visual cryptography schemes. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE

  84. Roy S, Venkateswaran P (2014) Online payment system using steganography and visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE

  85. Salama MA, Mursi MFM, Aly M (2018) Safeguarding images over insecure channel using master key visual cryptopgraphy. Ain Shams Engineering Journal 9(4):3001–3013. https://doi.org/10.1016/j.asej.2018.03.002

    Article  Google Scholar 

  86. Saturwar JH, Chaudhari DN (2017) Review of models, issues and applications of digital watermarking based on visual cryptography. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE

  87. Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2008) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1160-1

  88. Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science 70:462–468. https://doi.org/10.1016/j.procs.2015.10.080

    Article  Google Scholar 

  89. Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO). IEEE

  90. Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers 25 (11):1650138. https://doi.org/10.1142/s0218126616501383

    Article  Google Scholar 

  91. Sharma H, Kumar N, Jha GK (2011) Enhancement of security in visual cryptography system using cover image share embedded security algorithm (CISEA). In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011). IEEE

  92. Shivani S, Agarwal S (2016) VPVC: verifiable progressive visual cryptography. Pattern Anal Applic 21(1):139–166. https://doi.org/10.1007/s10044-016-0571-x

    Article  MathSciNet  Google Scholar 

  93. Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25(9):1557–1561. https://doi.org/10.1109/tcsvt.2015.2389372

    Article  Google Scholar 

  94. Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651. https://doi.org/10.1016/j.patcog.2007.03.012

    Article  MATH  Google Scholar 

  95. Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319. https://doi.org/10.1016/j.sigpro.2017.06.015

    Article  Google Scholar 

  96. Sridhar S, Sudha GF (2021) Two in one image secret sharing scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. 74, 102996. https://doi.org/10.1016/j.jvcir.2020.102996

  97. Thomas SA, Gharge S (2017) Review on various visual cryptography schemes. In: 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE

  98. Thomas SA, Gharge S (2018) Halftone visual cryptography for grayscale images using error diffusion and direct binary search. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE

  99. Tuyls P, Kevenaar T, Schrijen G-J, Staring T, van Dijk M (2004) Visual crypto displays enabling secure communications. In: Security in Pervasive Computing, pp 271–284. Springer Berlin Heidelberg

  100. Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 14(1):25–40. https://doi.org/10.1007/s11554-017-0678-3

    Article  Google Scholar 

  101. Wang L, Yan B, Yang H-M, Pan J-S (2020) Flip extended visual cryptography for gray-scale and color cover images. 13(1), 65. https://doi.org/10.3390/sym13010065

  102. Wang R-Z (2011) Random grid-based visual cryptography with identifiable shares. Journal of Electronic Imaging 20(1):013021. https://doi.org/10.1117/1.3557792

    Article  Google Scholar 

  103. Wang R-Z, Hsu S-F (2011) Tagged visual cryptography. 18(11), 627–630. https://doi.org/10.1109/lsp.2011.2166543

  104. Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: Transactions on Data Hiding and Multimedia Security V, pp 70–105. Springer Berlin Heidelberg

  105. Wu H-C, Wang H-C, Yu R-W (2008) Color visual cryptography scheme using meaningful shares. In: 2008 Eighth International Conference on Intelligent Systems Design and Applications. IEEE

  106. Wu X, Chen D, Yang C-N, Yang Y-Y (2019) A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image. 59, 550–562. https://doi.org/10.1016/j.jvcir.2019.02.008

  107. Wu X, Yang C-N (2020) Probabilistic color visual cryptography schemes for black and white secret images. 70, 102793. https://doi.org/10.1016/j.jvcir.2020.102793

  108. Wu Z, Liu Y-N, Wang D, Yang C-N (2019) An efficient essential secret image sharing scheme using derivative polynomial. Symmetry 11(1):69. https://doi.org/10.3390/sym11010069

    Article  Google Scholar 

  109. Yan X, Liu F, Yan WQ, Yang G, Lu Y (2020) Weighted visual cryptographic scheme with improved image quality. 79(29-30), 21345–21360. https://doi.org/10.1007/s11042-020-08970-y

  110. Yan X, Wang S, Niu X, Yang C-N (2015) Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process 109:317–333. https://doi.org/10.1016/j.sigpro.2014.12.002

    Article  Google Scholar 

  111. Yang C-N (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494. https://doi.org/10.1016/j.patrec.2003.12.011

    Article  Google Scholar 

  112. Yang C-N, Chen P-W, Shih H-W, Kim C (2012) Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17(5):843–850. https://doi.org/10.1007/s00779-012-0535-0

    Article  Google Scholar 

  113. Yang C-N, Chen T-S (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39(7):1300–1314. https://doi.org/10.1016/j.patcog.2006.01.013

    Article  MATH  Google Scholar 

  114. Yang C-N, Lin Y-C, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. 55, 102660. https://doi.org/10.1016/j.jisa.2020.102660

  115. Yang C-N, Shih H-W, Wu C-C, Harn L (2012) $k$ out of $n$ region incrementing scheme in visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22(5):799–810. https://doi.org/10.1109/tcsvt.2011.2180952

    Article  Google Scholar 

  116. Yang C-N, Wu C-C, Wang D-S (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173. https://doi.org/10.1016/j.ins.2014.03.033

    Article  MathSciNet  MATH  Google Scholar 

  117. Yang C-N, Wu X, Chou Y-C, Fu Z (2017) Constructions of general (k,n) reversible AMBTC-based visual cryptography with two decryption options. 48, 182–194. https://doi.org/10.1016/j.jvcir.2017.06.012

  118. Yang N, Gao Q, Shi Y (2018) Visual-cryptographic image hiding with holographic optical elements. Opt Express 26(24):31995. https://doi.org/10.1364/oe.26.031995

    Article  Google Scholar 

  119. Zhang X (2018) A visual cryptography scheme-based DNA microarrays. International Journal of Performability Engineering. https://doi.org/10.23940/ijpe.18.02.p14.334340

  120. Zhao T, Chi Y (2020) Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. 79(17-18), 12165–12181. https://doi.org/10.1007/s11042-020-08632-z

Download references

Acknowledgements

This work is supported in part by the Ministry of Education (MOE) Malaysia under the Fundamental Research Grant Scheme (FRGS), project number FRGS/1/2019/ICT05/USM/02/1.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Je Sen Teh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ibrahim, D.R., Teh, J.S. & Abdullah, R. An overview of visual cryptography techniques. Multimed Tools Appl 80, 31927–31952 (2021). https://doi.org/10.1007/s11042-021-11229-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11229-9

Keywords

Navigation