Abstract
Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. We conclude the paper with a discussion of these open problems and future research directions.
Similar content being viewed by others
Notes
as of mid-January 2021
References
A JB, Raj C, Sukumaran R, G SM (2019) Enhanced semantic visual secret sharing scheme for the secure image communication. 79(23-24), 17057–17079. https://doi.org/10.1007/s11042-019-7535-2
Abraham AS, Nair LR, Deepa MS (2017) A novel method for evaluation of visual security of images. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT). IEEE
Al-Khalid RI, Al-Dallah RA, Al-Anani AM, Barham RM, Hajir SI (2017) A secure visual cryptography scheme using private key with invariant share sizes. J Softw Eng Appl 10(01):1–10. https://doi.org/10.4236/jsea.2017.101001
Alex NS, Anbarasi LJ (2011) Enhanced image secret sharing via error diffusion in halftone visual cryptography. In: 2011 3rd International Conference on Electronics Computer Technology. IEEE
Amitharaja R, Shaik A, Thanikaise V (2016) Data security through data hiding in images: A review. J Artif Intell 10(1):1–21. https://doi.org/10.3923/jai.2017.1.21
Arumugam S, Lakshmanan R, Nagar AK (2012) On (k, n)∗-visual cryptography scheme. 71(1), 153–162. https://doi.org/10.1007/s10623-012-9722-2
Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images. In: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE
Askari N, Heys HM, Moloney CR (2014) Novel visual cryptography schemes without pixel expansion for halftone images. Can J Electr Comput Eng 37(3):168–177. https://doi.org/10.1109/cjece.2014.2333419
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106. https://doi.org/10.1006/inco.1996.0076
Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):143–161. https://doi.org/10.1016/s0304-3975(99)00127-9
Bhatnagar R, Kumar M (2018) Visual Cryptography: A literature survey. In: 2018 Second INternational Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE
Blesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. In: 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEE
Bonis AD, Santis AD (2004) Randomness in secret sharing and visual cryptography schemes. Theor Comput Sci 314(3):351–374. https://doi.org/10.1016/j.tcs.2003.12.018
Borchert B (2007) Segment-based Visual Cryptography. Tech. Rep. WSI-2007-04, WSI Institute for computer science
Chanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. International Journal of Multimedia Information Retrieval 8(4):195–215. https://doi.org/10.1007/s13735-018-0161-3
Chao HC, Fan TY (2017) Generating random grid-based visual secret sharing with multi-level encoding. Signal Process Image Commun 57:60–67. https://doi.org/10.1016/j.image.2017.05.005
Chao H-C, Fan T-Y (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing 68:69–80. https://doi.org/10.1016/j.dsp.2017.05.009
Chaturvedi A, Bhat IJ (2015) Analysis of schemes proposed for improving the segment based visual cryptography. International Journal of Computer Trends and Technology 30(1):26–30. https://doi.org/10.14445/22312803/ijctt-v30p105
Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE). IEEE
Chavan PV, Atique M (2015) Secured approach for authentication using threshold-based hierarchical visual cryptography. International Journal of Information Privacy, Security and Integrity 2(2):159. https://doi.org/10.1504/ijipsi.2015.075440
Chavan PV, Atique M, Malik L (2014) Signature based authentication using contrast enhanced hierarchical visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE
Chen J, Chen T-S, Hsu H-C, Lin Y-H (2009) Using multi-ringed shadow image of visual cryptography to hide more secret messages. The Imaging Science Journal 57(2):101–108. https://doi.org/10.1179/174313108x384656
Chen Q, Peng W-F, Zhang M, Chu Y-P (2010) An (n, n) threshold visual cryptography scheme for cheating prevention. In: 2010 3rd International Conference on Computer Science and Information Technology. IEEE
Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. 8, 111330–111346. https://doi.org/10.1109/access.2020.3000308
Dahat AV, Chavan PV (2016) Secret sharing based visual cryptography scheme us-ing cmy color space. Procedia Computer Science 78:550–555. https://doi.org/10.1016/j.procs.2016.02.101
Das SS, Sharma KD, Chandra JK, Bera JN (2018) A hierarchical image cryptosystem based on visual cryptography and vector quantization. In: Advances in Intelligent Systems and Computing, pp 3–11. Springer Singapore
Deepa AK, Bento B (2014) Embedded extended visual cryptography scheme for color image using ABC algorithm. In: 2014 12th International Conference on Signal Processing (ICSP). IEEE
Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Computers & Electrical Engineering 70:647–658. https://doi.org/10.1016/j.compeleceng.2017.09.017
Fang W-P (2008) Friendly progressive visual secret sharing. Pattern Recogn 41(4):1410–1414. https://doi.org/10.1016/j.patcog.2007.09.004
Fathimal M, Jansirani (2019) New fool proof examination system through color visual cryptography and signature authentication. In: The International Arab Journal of In-formation Technology, pp 322–336. Springer Berlin Heidelberg
Feng J-B, Wu H-C, Tsai C-S, Chang Y-F, Chu Y-P (2008) Visual secret sharing for multiple secrets. Pattern Recogn 41(12):3572–3581. https://doi.org/10.1016/j.patcog.2008.05.031
Fu Z, Yu B (2009) Research on rotation visual cryptography scheme. In: 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE
Geetha P, Jayanthi VS, Jayanthi AN (2019) Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. 78(13), 18503–18530. https://doi.org/10.1007/s11042-019-7163-x
Guo Y, Jia X, Chu Q, Wang D (2020) A novel XOR-based threshold visual cryptography with adjustable pixel expansion. 10(4), 1321. https://doi.org/10.3390/app10041321
Haouzia A, Noumeir R (2007) Methods for image authentication: a survey. Multimedia Tools and Applications 39(1):1–46. https://doi.org/10.1007/s11042-007-0154-3
Hodeish ME, Humbe VT (2018) An optimized halftone visual cryptography scheme using error diffusion. Multimedia Tools and Applications 77 (19):24937–24953. https://doi.org/10.1007/s11042-018-5724-z
Hou YC, Lin CF, Chang CY (2001) Visual cryptography for color images without pixel expansion. J Technol 2(4):151. https://doi.org/10.1049/iet-ifs:20080066
Hou Y-C (2003) Visual cryptography for color images. Pattern Recogn 36(7):1619–1629. https://doi.org/10.1016/s0031-3203(02)00258-3
Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Transactions on Circuits and Systems for Video Technology 21(11):1760–1764. https://doi.org/10.1109/tcsvt.2011.2106291
Hou Y-C, Quan Z-Y, Tsai C-F, Tseng A-Y (2013) Block-based progressive visual secret sharing. 233, 290–304.https://doi.org/10.1016/j.ins.2013.01.006
Hsu H-C, Chen J, Chen T-S, Lin Y-H (2007) Special type of circular visual cryptography for multiple secret hiding. The Imaging Science Journal 55 (3):175–179. https://doi.org/10.1179/174313107x176289
Hsu S-F, Chang Y-J, Wang R-Z, Lee Y-K, Huang S-Y (2012) Verifiable visual cryptography. In: 2012 Sixth International Conference on Genetic and Evolutionary Computing. IEEE
Ito KH, Tanaka H (1999) image size invariant visual cryptography. IEICE transactions on fundamentals of electronics, communications and computer sciences 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290
Jana B, Chowdhuri P, auMadhumita Mallick, auShyamal Kumar Mondal (2014) Cheating prevention in visual cryptography using steganographic scheme. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE
Jena D, Jena SK (2009) A novel visual cryptography scheme. In: 2009 International Conference on Advanced Computer Control. IEEE
Jin D (2005) Progressive color visual cryptography. Journal of Electronic Imaging 14(3):033019. https://doi.org/10.1117/1.1993625
Joshi AM, Jadhav DM, Kazi NA, Suryawanshi AN, Katti J (2016) Authentication of grayscale forensic image using visual secret sharing. In: 2016 Conference on Emerging Devices and Smart Systems (ICEDSS). IEEE
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377. https://doi.org/10.1364/ol.12.000377
Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended visual cryptography for color images using coding tables. In: 2012 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE
Kanakkath P, Madathil S, Krishnan R (2018) Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multimedia Tools and Applications 78(2):1315–1344. https://doi.org/10.1007/s11042-018-6158-3
Kang I, Arce GR, Lee H-K (2011) Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing 20(1):132–145. https://doi.org/10.1109/tip.2010.2056376
Kukreja S, Kasana G, Kasana SS (2020) Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors. https://doi.org/10.1007/s00371-020-01883-9
Kumar H, Srivastava A (2014) A secret sharing scheme for secure transmission of color images. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE
Kumar M, Verma HK, Sikka G (2018) A secure lightweight signature based authentication for cloud-IoT crowdsensing environments. Transactions on Emerging Telecommunications Technologies 30(4):e3292. https://doi.org/10.1002/ett.3292
Kumar S, Sharma RK (2013) Recursive information hiding of secrets by random grids. Cryptologia 37(2):154–161. https://doi.org/10.1080/01611194.2012.739585
Lee K-H, Chiu P-L (2012) An extended visual cryptography algorithm for general access structures. IEEE Transactions on Information Forensics and Security 7(1):219–229. https://doi.org/10.1109/tifs.2011.2167611
Lee K-H, Chiu P-L (2013) Image size invariant visual cryptography for general access structures subject to display quality constraints. IEEE Transactions on Image Processing 22(10):3830–3841. https://doi.org/10.1109/tip.2013.2262290
Li P, Ma J, Ma Q (2020) (t, k, n) XOR-based visual cryptography scheme with essential shadows. 72, 102911. https://doi.org/10.1016/j.jvcir.2020.102911
Li P, Ma J, Yin L, Ma Q (2020) A construction method of (2, 3) visual cryptography scheme. 8, 32840–32849. https://doi.org/10.1109/access.2020.2973659
Lin H-C, Yang C-N, Laih C-S, Lin H-T (2013) Natural language letter based visual cryptography scheme. J Vis Commun Image Represent 24 (3):318–331. https://doi.org/10.1016/j.jvcir.2013.01.003
Lin S-J, Chen S-K, Lin J-C (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21(8):900–916. https://doi.org/10.1016/j.jvcir.2010.08.006
Liu GY, Li ZW, Barkaoui K, Al-Ahmari AM (2013) Robustness of deadlock control for a class of petri nets with unreliable resources. Inf Sci 235:259–279. https://doi.org/10.1016/j.ins.2013.01.003
Lu J, Yang Z, Li L, Yuan W, Li L, Chang C-C (2017) Multiple schemes for mobile payment authentication using QR code and visual cryptography. Mob Inf Syst 2017:1–12. https://doi.org/10.1155/2017/4356038
Malar S, Kumar J (2011) Error filtering schemes for color images in visual cryptography. Int J Adv Comput Sci Appl, 2(11). https://doi.org/10.14569/ijacsa.2011.021112
Mary GG, Rani MMS (2018) Application of ant colony optimization for enhancement of visual cryptography images. In: Intelligent Systems Reference Library, pp 147–163. Springer International Publishing
Melgar MEV, Farias MCQ (2019) A (2,2) XOR-based visual cryptography scheme without pixel expansion. 63, 102592. https://doi.org/10.1016/j.jvcir.2019.102592
Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714–729. https://doi.org/10.1007/s10278-014-9700-5
Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: Multimedia and Expo, 2007 IEEE International Conference on. IEEE
Naor M, Shamir A (1995) Visual cryptography. In: Advances in Cryptology - EUROCRYPT’94, pp 1–12. Springer Berlin Heidelberg
Naor M, Shamir A (1997) Visual cryptography II: Improving the contrast via the cover base. In: Security Protocols, pp 197–202. Springer Berlin Heidelberg
Palevicius P, Ragulskis M (2015) Image communication scheme based on dynamic visual cryptography and computer generated holography. Opt Commun 335:161–167. https://doi.org/10.1016/j.optcom.2014.09.041
Pandey A, Som S (2016) Applications and usage of visual cryptography: A review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE
Pang L, Miao D, Lian C (2015) User-friendly random-grid-based visual secret sharing for general access structures. Security and Communication Networks 9(10):966–976. https://doi.org/10.1002/sec.1392
Parakh A, Kak S (2009) A recursive threshold visual cryptography scheme. Cryptologia 26(1):68–76. https://doi.org/10.1080/0161-110291890768
Petrauskiene V, Survila A, Fedaravicius A, Ragulskis M (2014) Dynamic visual cryptography for optical assessment of chaotic oscillations. Optics & Laser Technology 57:129–135. https://doi.org/10.1016/j.optlastec.2013.10.015
Praun E, Hoppe H, Webb M, Finkelstein A (2001) Real-time hatching. In: Proceedings of the 28th annual conference on Computer graphics and interactive techniques - SIGGRAPH ’01. ACM Press
Premkumar S, Narayanan AE (2012) Notice of violation of IEEE publication principles - new visual steganography scheme for secure banking application. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE
Prisco RD, Santis AD (2013) Color visual cryptography schemes for black and white secret images. 510, 62–86. https://doi.org/10.1016/j.tcs.2013.09.005
Prisco RD, Santis AD (2014) On the relation of random grid and deterministic visual cryptography. IEEE Transactions on Information Forensics and Security 9(4):653–665. https://doi.org/10.1109/tifs.2014.2305574
Punithavathi P, Geetha S (2016) Cancelable biometric template security using segment-based visual cryptography. In: Advances in Intelligent Systems and Computing, pp 511–521. Springer Singapore
Punithavathi P, Geetha S (2017) Visual cryptography: A brief survey. Information Security Journal: A Global Perspective 26(6):305–317. https://doi.org/10.1080/19393555.2017.1386249
R (2011) A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE
Ramya J, Parvathavarthini B (2014) An extensive review on visual cryptography schemes. In: 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE
Roy S, Venkateswaran P (2014) Online payment system using steganography and visual cryptography. In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. IEEE
Salama MA, Mursi MFM, Aly M (2018) Safeguarding images over insecure channel using master key visual cryptopgraphy. Ain Shams Engineering Journal 9(4):3001–3013. https://doi.org/10.1016/j.asej.2018.03.002
Saturwar JH, Chaudhari DN (2017) Review of models, issues and applications of digital watermarking based on visual cryptography. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE
Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2008) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-018-1160-1
Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Computer Science 70:462–468. https://doi.org/10.1016/j.procs.2015.10.080
Shankar K, Eswaran P (2016) A new k out of n secret image sharing scheme in visual cryptography. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO). IEEE
Shankar K, Eswaran P (2016) RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique. Journal of Circuits, Systems and Computers 25 (11):1650138. https://doi.org/10.1142/s0218126616501383
Sharma H, Kumar N, Jha GK (2011) Enhancement of security in visual cryptography system using cover image share embedded security algorithm (CISEA). In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011). IEEE
Shivani S, Agarwal S (2016) VPVC: verifiable progressive visual cryptography. Pattern Anal Applic 21(1):139–166. https://doi.org/10.1007/s10044-016-0571-x
Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25(9):1557–1561. https://doi.org/10.1109/tcsvt.2015.2389372
Shyu SJ, Huang S-Y, Lee Y-K, Wang R-Z, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651. https://doi.org/10.1016/j.patcog.2007.03.012
Singh P, Raman B, Misra M (2018) A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process 142:301–319. https://doi.org/10.1016/j.sigpro.2017.06.015
Sridhar S, Sudha GF (2021) Two in one image secret sharing scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. 74, 102996. https://doi.org/10.1016/j.jvcir.2020.102996
Thomas SA, Gharge S (2017) Review on various visual cryptography schemes. In: 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC). IEEE
Thomas SA, Gharge S (2018) Halftone visual cryptography for grayscale images using error diffusion and direct binary search. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE
Tuyls P, Kevenaar T, Schrijen G-J, Staring T, van Dijk M (2004) Visual crypto displays enabling secure communications. In: Security in Pervasive Computing, pp 271–284. Springer Berlin Heidelberg
Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 14(1):25–40. https://doi.org/10.1007/s11554-017-0678-3
Wang L, Yan B, Yang H-M, Pan J-S (2020) Flip extended visual cryptography for gray-scale and color cover images. 13(1), 65. https://doi.org/10.3390/sym13010065
Wang R-Z (2011) Random grid-based visual cryptography with identifiable shares. Journal of Electronic Imaging 20(1):013021. https://doi.org/10.1117/1.3557792
Wang R-Z, Hsu S-F (2011) Tagged visual cryptography. 18(11), 627–630. https://doi.org/10.1109/lsp.2011.2166543
Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: Transactions on Data Hiding and Multimedia Security V, pp 70–105. Springer Berlin Heidelberg
Wu H-C, Wang H-C, Yu R-W (2008) Color visual cryptography scheme using meaningful shares. In: 2008 Eighth International Conference on Intelligent Systems Design and Applications. IEEE
Wu X, Chen D, Yang C-N, Yang Y-Y (2019) A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image. 59, 550–562. https://doi.org/10.1016/j.jvcir.2019.02.008
Wu X, Yang C-N (2020) Probabilistic color visual cryptography schemes for black and white secret images. 70, 102793. https://doi.org/10.1016/j.jvcir.2020.102793
Wu Z, Liu Y-N, Wang D, Yang C-N (2019) An efficient essential secret image sharing scheme using derivative polynomial. Symmetry 11(1):69. https://doi.org/10.3390/sym11010069
Yan X, Liu F, Yan WQ, Yang G, Lu Y (2020) Weighted visual cryptographic scheme with improved image quality. 79(29-30), 21345–21360. https://doi.org/10.1007/s11042-020-08970-y
Yan X, Wang S, Niu X, Yang C-N (2015) Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process 109:317–333. https://doi.org/10.1016/j.sigpro.2014.12.002
Yang C-N (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494. https://doi.org/10.1016/j.patrec.2003.12.011
Yang C-N, Chen P-W, Shih H-W, Kim C (2012) Aspect ratio invariant visual cryptography by image filtering and resizing. Pers Ubiquit Comput 17(5):843–850. https://doi.org/10.1007/s00779-012-0535-0
Yang C-N, Chen T-S (2006) Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. Pattern Recogn 39(7):1300–1314. https://doi.org/10.1016/j.patcog.2006.01.013
Yang C-N, Lin Y-C, Li P (2020) Cheating immune k-out-of-n block-based progressive visual cryptography. 55, 102660. https://doi.org/10.1016/j.jisa.2020.102660
Yang C-N, Shih H-W, Wu C-C, Harn L (2012) $k$ out of $n$ region incrementing scheme in visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology 22(5):799–810. https://doi.org/10.1109/tcsvt.2011.2180952
Yang C-N, Wu C-C, Wang D-S (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173. https://doi.org/10.1016/j.ins.2014.03.033
Yang C-N, Wu X, Chou Y-C, Fu Z (2017) Constructions of general (k,n) reversible AMBTC-based visual cryptography with two decryption options. 48, 182–194. https://doi.org/10.1016/j.jvcir.2017.06.012
Yang N, Gao Q, Shi Y (2018) Visual-cryptographic image hiding with holographic optical elements. Opt Express 26(24):31995. https://doi.org/10.1364/oe.26.031995
Zhang X (2018) A visual cryptography scheme-based DNA microarrays. International Journal of Performability Engineering. https://doi.org/10.23940/ijpe.18.02.p14.334340
Zhao T, Chi Y (2020) Hierarchical visual cryptography for multisecret images based on a modified phase retrieval algorithm. 79(17-18), 12165–12181. https://doi.org/10.1007/s11042-020-08632-z
Acknowledgements
This work is supported in part by the Ministry of Education (MOE) Malaysia under the Fundamental Research Grant Scheme (FRGS), project number FRGS/1/2019/ICT05/USM/02/1.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ibrahim, D.R., Teh, J.S. & Abdullah, R. An overview of visual cryptography techniques. Multimed Tools Appl 80, 31927–31952 (2021). https://doi.org/10.1007/s11042-021-11229-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11229-9