Exploring Visual Cryptography Techniques: A Comprehensive Review
DOI:
https://doi.org/10.22401/d8y2v967Keywords:
Visual cryptography, Image encryption, Shares, Encryption /DecryptionAbstract
The backdrop: visual cryptography represents a contemporary encryption technology valued for its ease of implementation and comprehensibility, eliminating the need for a secure channel for key transmission and similar requirements. This paper aims: delve into the diverse methods employed in optical encryption, exploring their advantages and drawbacks, with a particular focus on image encryption techniques and the outcomes documented in various research studies. The objective is to identify the strengths and weaknesses inherent in these methodologies, paving the way for potential solutions in the future of optical encryption research. Notably, challenges persist in effectively handling color images and utilizing multiple shares (n, n), impacting both the security and the restoration aspects. The time computation aspects, encompassing creation, encryption, and restoration of these shares, also present challenges. Consequently, ongoing improvements are necessary to address these intricacies and enhance the robustness and applicability of visual cryptography technologies in diverse contexts.
References
Ahamed, S. A.; Sarkar, I.; Molla, M.A.; Roy, S.; Bose, R.; “Utilizing the RGB Color Model and Halftone Technique for Color Segregation in Visual Cryptography”, (2023).
Wang, L.; Yan, B.; Yang, H.M.; Pan, J.S.; “Flip extended visual cryptography for gray-scale and color cover images”. Symmetry, 13(1), 65, 2020.
Sahni, G.K.; Hari, K.V.; "Schemes and Applications of Visual Cryptography". International Journal of Emerging Technologies in Engineering Research (IJETER) 8.6, 2020.
Ibrahim, D.; Sihwail, R.; Arrifin, K.A.Z.; Abuthawabeh, A.; Mizher, M.A.; “Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm”. Symmetry 15(7): 1305, 2023.
Somwanshi, D.R.; Vikas, T.H.; "An Optimal (2, 2) Visual Cryptography Schemes For Information Security". First International Conference on Advances in Computer Vision and Artificial Intelligence Technologies (ACVAIT 2022). Atlantis Press 2023.
Bachiphale, P.; Nitish, Z.; "Review Based on Visual Cryptographic Scheme and Applications". Rivista Italiana di Filosofia Analitica Junior 14.2: 81-87, 2023.
Ren, L.; Zhang, D.; “A QR code-based user-friendly visual cryptography scheme”. Scientific Reports 12(1): 7667, 2022.
Patel, D.D.; Subhashchandra, D.; “Securing textual information with an image in the image using a visual cryptography AES algorithm”. Int. J. Enh. Res. Manag. Comp. Appl. 12(6), 2319-7471, 2023.
Chouksey, P.; Miri, R.; Srinivas, K.; “Visual Cryptography with RSA Encryption for Secure Image Communication.” 2021.
Hameed, R.S.; Ibrahim, A.W.S.; “Color halftone visual cryptography scheme using dynamic codebook and error diffusion technique”. Iraqi J. Info. Technol. 9(4), 2019.
Islam, M.; A.; Riad Md Al-Amin K.; Pias, T. S.; “Enhancing security of image steganography using visual cryptography”. In 2021 2nd International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST) (pp. 694-698). IEEE. 2021.
Sardar, M.K.; Adhikari, A.; “A new lossless secret color image sharing scheme with small shadow size”. J. Visu. Commun. Imag. Repr. 68: 102768, 2020.
Dyala, R.I.; Rosni A.; Je Sen T.; “An enhanced color visual cryptography scheme based on the binary dragonfly algorithm”. Int. J. Comp. Appl., 2020.
Fadhil, S.A.; Farhan, A.K.; “Color Visual Cryptography Based on Three Dimensional Chaotic Map”. Iraqi J. Comp. Comm. Cont. Sys. Eng. 22(2): 2022.
Aswad, F.M.; Ihsan, S.; Salama, A.M.; “An optimization of color halftone visual cryptography scheme based on Bat algorithm”. J. Intell. Sys. 30(1): 816-835, 2021.
Özcan, H.; Gülağiz, F.K.; Altuncu, M.A.; İlkin, S.; Şahin, S.; “A new visual cryptography method based on the profile hidden Markov model”. Adv. Elect. Comp. Eng. 21(1): 21-36, 2021.
Mhala, N.C.; Pais, A.R.; “Contrast enhancement of progressive visual secret sharing (pvss) scheme for gray-scale and color images using super-resolution”. Signal Processing 162: 253-267, 2019.
Karolin, M.; Meyyappan, T.; “Image encryption and decryption using RSA algorithm with share creation techniques”. Int. J. Eng. Adv. Tech. 9(2): 2797-2800, 2019.
Chouksey, P.; Miri, R.; Srinivas, K.; “Enhanced Visual Cryptography for Color Images using Error Diffusion based AES Encryption”. Turkish Online Journal of Qualitative Inquiry: 13: 1, 2022.
Shankar, K.; Taniar, D.; Yang, E.; Yi, O.; “Secure and optimal secret sharing scheme for color images”. Mathematics 9(19): 2360, 2021.
Karolin, M.; Meyyappan, T.; “Authentic secret share creation techniques using visual cryptography with public key encryption”. Multimedia Tools and Applications 80(21-23): 32023-32040, 2021.
Saini, P.; Kumar, K.; Kashid, S.; Negi, A.; “MEVSS: Modulo Encryption Based Visual Secret Sharing Scheme for Securing Visual Content”. In International Conference on Deep Learning, Artificial Intelligence and Robotics (pp.24-35). Cham: Springer International Publishing. 2022.
Maurya, R.; Kannojiya, A.K.; Rajitha, B.; “An extended visual cryptography technique for medical image security”. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) (pp. 415-421). IEEE. 2020.
Karolin, M.; Meyyappan, T.; “Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography”. IETE Journal of Research 1-8: 2022.
John, B.A.; Selva, M.G.; Manoj, K.S.; “Multiple secret image communication using visual cryptography”. Wireless Personal Communications 122(4): 3085-3103, 2021.
Ren, L.; Zhang, D.: “A QR code-based user-friendly visual cryptography scheme”. Scientific Reports 12(1): 7667, 2022.
Dong, Y.; Huang, X.; Ye, G.; “Visually meaningful image encryption scheme based on DWT and schur decomposition”. Security and Communication Networks: 1-16, 2021.
Mokhtari, A.M.,; Ramezani, R.; Latif, A.M.; “High-quality visual cryptography of real-value images without pixel expansion using fuzzy random grids”. Iranian Journal of Fuzzy Systems, 2023.
Seuti, T.; Al-Mamun, M.; Sarowar, S.A.H.M.; “Enhanced Steganography Technique via Visual Cryptography and Deep Learning”. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning: BIM 2021 (pp. 623-636). Springer Singapore. (2022).
Al-Ta'i, Z.T.M.; Sadoon, S.M.; “Securing Privacy: Encrypted Image Retrieval with CNNs and Chaos-Based Visual Cryptography on Cloud Computing”. International Journal of Intelligent Engineering & Systems 16(6): 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Hajir Alauldeen Al-Bayati, Lahieb M. Jawad, Dalal N. Hamod
This work is licensed under a Creative Commons Attribution 4.0 International License.