Open Access Open Access  Restricted Access Subscription or Fee Access

Visual Cryptography

Priya Sethi, Shipra Kataria, Deepika Bansal


Visual cryptography is a creative technique of sharing secrets. The key idea behind visual cryptography is to encrypt the original secret image into number of shares. The individual share does not reveal the original secret image until two or more shares overlapped. The image is composed of white and black pixels. Visual cryptography provides information security by encrypting the visual information in such a manner that decryption can be done by manual perception system. There is no need of any cryptographic algorithm for decryption in visual cryptography. Performance of visual cryptography mainly depends on the pixel expansion and contrast. This paper put lights on the following sections:

  • What is VCS model?

  • Visual cryptography schemes

  • Security issues

  • Prevention methods

  • Visual cryptography with steganography


Visual Cryptography, Shares, Superimposition, Schemes, Steganography, Pixels, Security.

Full Text:



Sagar kumar Nirala,RajaSekhar Chaganti,Kamalendra Varma Gadi, “Securing images using colour visual cryptography and Wavelets”,2012

Naor, M., and Shamir, A. (1995), Visual cryptography, in ‘‘Advances in Cryptogoly Eurocrypt ’94’’ (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1 12, Springer-Verlag, Berlin.

R. Youmaran, A. Adler, A. Miri, “An Improved Visual Cryptography Scheme for Secret Hiding,” in Proceedings of 23rd IEEE Biennial Symposium on Communications, 2006, pp. 340-343.

P. S. Revenkar, Anisa Anjum, W. Gandhare, “Survey of Visual Cryptography Schemes,” International Journal of Security and Its Applications, Vol. 4, no. 2, April 2010, pp. 49-56.

Chandramathi S., Ramesh Kumar R., Suresh R. and Harish S., “An overview of visual cryptography”, 2010

Young-Chang Hou “Visual cryptography for color images” Pattern Recognition 36 (2003) 1619 – 1629

Zhongnin Wangarce, G.R., “Halftone Visual Cryptography by Interative Halftoning,” in Proceedings of 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), March 2010, pp. 1822-1825.

Chang-Chou Lin , Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, v.24 n.1-3.

Pallavi V. Chavan and Dr. Mohammad Atique, “Design of hierarchial visual cryptography”, 2012

C.A. Poynton, Frequently asked questions about color,∼poynton.

Nagaraj V. Dharwadkar , B.B. Ambedker, S.R. Joshi, “Visual Cryptography for Color Image using Color Error Diffusion”, ICGSTGVIP Journal ,volume 10, issue 1,February 2010.

Nakajima, M. and Yamaguchi, Y., “Extended visual cryptography for natural images”, Journal of WSCG, v10 i2. 303 -310.

HU Chih-Ming, TZENG Wen-Guey, “Cheating prevention in visual cryptography”, IEEE transactions on image processing ISSN 1057-7149 ,2007, vol. 16, no1, pp. 36-45.

Bin Yu, Jin Lu, Li Fang, “ A Co-Cheating Prevention Visual Cryptography Scheme,” in Proceeding of 3rd IEEE International Conference on Information and Computing, 2010, pp.157-160

Abboud, G., Marean, J., Yampolskiy, R.V., “Steganography and Visual Cryptography in Computer Forensics,” in Proceedings of 5th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010, pp. 25-32.

Mrs. G. Prema, S. Natarajan, "Steganography using genetic Algorithm along with visual Cryptography for Wireless Network Application", International conference on information communication and embedded systems (ICICES), 2013.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.