0% found this document useful (0 votes)
79 views1 page

Visual Cryptography

Visual cryptography is a cryptographic technique that allows visual information like pictures and text to be encrypted in a way that can be decrypted by the human visual system without computers. It works by breaking an image into n shares, where only someone with all n shares can decrypt the original image, while anyone with n-1 shares or less cannot see the secret information. It uses two transparent images, one with random pixels and one with the secret information, that both need to be overlaid to reveal the message. Some advantages are that it offers secrecy without computers, is simple to implement, and infinite computational power cannot break the encryption. Applications include bank customer identification, anti-spam measures, and electronic voting verification.

Uploaded by

Ram Babu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views1 page

Visual Cryptography

Visual cryptography is a cryptographic technique that allows visual information like pictures and text to be encrypted in a way that can be decrypted by the human visual system without computers. It works by breaking an image into n shares, where only someone with all n shares can decrypt the original image, while anyone with n-1 shares or less cannot see the secret information. It uses two transparent images, one with random pixels and one with the secret information, that both need to be overlaid to reveal the message. Some advantages are that it offers secrecy without computers, is simple to implement, and infinite computational power cannot break the encryption. Applications include bank customer identification, anti-spam measures, and electronic voting verification.

Uploaded by

Ram Babu
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Visual Cryptography Security for Human Authentication

Visual cryptography is a cryptographic technique which allows visual information i.e. pictures, text, etc. to be encrypted in such a way that decryption can be done by human visual system without the use of computers. Visual Cryptography is a visual secret sharing scheme, where an image was broken up into n shares. The individual with all the n shares only can decrypt the image, while any n-1 shares cannot reveal information about original image. Visual Cryptography uses two transparent images: One image contains random pixels, and Other image contains the secret information. Both the transparent images are required to reveal the information. Both the layers are to be printed onto a transparent sheet, which thus can be easily recognized by human eye.

How Visual Cryptography Works:


A plain text in the forms of images is encrypted in Visual cryptography. The encrypted text creates shares which are passed through a channel i.e. fax or email and sent to decryption process. The decryption process of Visual Cryptography contains a human visual system.

Each pixel of the images is divided into smaller blocks.[same number of white and black blocks] either horizontally or vertically. If the pixel is divided into two, one is black and the other will be white one. If is divided into four, there will be two white and two black parts. The information pixel will be completely black, also called the overlayed version of pixels.

Advantages of Visual Cryptography



Visual cryptography offers absolute secrecy according to the information theory. There is no need of computer in order to detect the information at the receiver end in visual cryptography. Secure ways of encrypting is possible with the help of visual cryptography. Visual cryptography is simple to implement. In Visual Cryptography, encryption doesnt require any NP-Hard problem dependency. Infinite computational power cannot predict the message in visual cryptography. We can send cipher text in visual cryptography through fax or e-mail. In Visual Cryptography, decryption algorithm is not required. Therefore a person unknown to cryptography can decrypt the message.

Applications of Visual Cryptography



Visual cryptography is used in bank customer identification. Anti spam-bot measure can be done by visual cryptography. Visual cryptography is used in electronic voting machines/ remote voting machines to verify receipts. Visual cryptography has wide range of applications in both private and public sectors of our society.

You might also like