A Survey on Visual Cryptography Schemes

Amal C, R. Joshua Samuel Raj


This paper provides an analysis of the emerging visual cryptography (VC) and related security method which can be applied to any of the visual cryptography method. The actual encrypted data embedded image is displayed if and only if the user overcomes the cued click point verification. Hacking is the main issue faced during sharing secrets in visual schemes. The cued click point method can solve the issue up to a limit. Cued click point is a technology where the user has to verify the click points as a security measure and only then the user is provided with the actual visual secret image.
Keywords: Visual Cryptography; Cued Click points; Stereograms.

Full Text:


Copyright (c) 2016 Amal C, R. Joshua Samuel Raj

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 

Paper submission: ijr@pen2print.org