Skip navigation Download free eBooks and textbooks

Choose a category

Visual Cryptography and Its Applications

Visual Cryptography and Its Applications
4.3 (11 reviews) Read reviews
ISBN: 978-87-403-0126-7
1 edition
Pages : 163
Price: Free

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.

You can also read this in Premium


As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been.

300+ Business books exclusively in our Premium eReader

  • No adverts
  • Advanced features
  • Personal library
More about Premium

Buy this eBook

Buy now

Subscribe to all 800+ eBooks

Start free trial 30 day FREE trial

About the book

  1. Description
  2. Content
  3. About the Author
  4. Embed


As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting problem. Many attempts have been made to solve this problem within the cryptographic community.

In this book, one of these data security methods known as visual cryptography (VC) is presented. Specifically, visual cryptography allows effective and efficient secret sharing between a number of trusted parties. As with many cryptographic schemes, trust is the most difficult part. Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation.

Many types of visual cryptography are examined. From the very first type of traditional visual cryptography right up to the latest developments. Traditional VC specifically deals with sharing a single binary secret between a number of participants. Extended VC attempts to take this a step further by introducing shares that have significant visual meaning. This detracts from the suspicious looking encrypted shares that are generated using traditional methods. Dynamic, colour, progressive and image hatching VC schemes are also discussed.

Practical VC applications are also outlined. These applications involve the use of Moire patterns and watermarking techniques. Detailed analysis of the watermarking domain is presented along with various techniques and schemes that can incorporate VC successfully within the field of watermarking. The foundations of these techniques are reviewed and examples provided.


  • Preface
  • Traditional Visual Cryptography
    1. Secret Sharing
    2. Visual Cryptography
    3. Size Invariant Visual Cryptography
    4. Recursive Visual Cryptography
    5. Analysis of Visual Cryptography
    6. Mathematical Background
    7. Analysis in the Frequency Domain
  • Extended Visual Cryptography
    1. Extended Visual Cryptography
    2. Halftone Visual Cryptography
    3. Cheating Immune VC Schemes
    4. Dot-Size Variant Visual Cryptography
    5. Summary
  • Dynamic Visual Cryptography
    1. Motivation
    2. Basic Multiple Secret Sharing
    3. Embedding a Share of Visual Cryptography in a Halftone Image
  • Colour Visual Cryptography
    1. Colour Visual Cryptography
    2. Image Sharing Using Random Masks
    3. Quality Evaluation
    4. Summary
  • Progressive Visual Cryptography
    1. Motivation
    2. Progressive Visual Cryptography
    3. Summary
  • Image Hatching for Visual Cryptography
    1. Introduction
    2. Image Hatching with VC
    3. Security Analysis
    4. Summary
  • Applications for Visual Cryptography
    1. Moire Patterns
    2. Watermarking
    3. Criteria for Evaluation Purposes
    4. Summary
  • About the Author

    Dr WeiQi Yan received his Ph.D. degree from Institute of Computing Technology, Academia Sinica, China in 2001. His research interests include Multimedia Systems and Intelligent Multimedia Security, Forensics and Surveillance. He has over 90 publications. Dr Yan is serving as an associate editor for the Journal of Multimedia, an associate editor for the International Journal of Digital Crime Forensics, and a guest editor of the Springer Transactions on Data Hiding and Multimedia Security (DHMMS).

    Jonathan Weir received his BSc. degree in computer science from Queen's University Belfast, UK, in 2008. He is currently pursuing his Ph.D. degree in computer science at Queen's University Belfast, UK. His research interests are visual cryptography, digital imagery and image processing.


    Choose color
    Implementation code. Copy into your own page
    Embed Frame - Terms of Use

    The embed frame is free to use for private persons, universities and schools. It is not allowed to be used by any company for commercial purposes unless it is for media coverage. You may not modify, build upon, or block any portion or functionality of the embed frame, including but not limited to links back to the website.

    The Embed frame may not be used as part of a commercial business offering. The embed frame is intended for private people who want to share eBooks on their website or blog, professors or teaching professionals who want to make an eBook available directly on their page, and media, journalists or bloggers who wants to discuss a given eBook

    If you are in doubt about whether you can implement the embed frame, you are welcome to contact Thomas Buus Madsen on and seek permission.