Skip to main content

Visual Cryptography

  • Reference work entry
  • First Online:
Encyclopedia of Biometrics
  • 192 Accesses

Definition

Visual cryptography is a method for encrypting visual information such as images where the decryption is accomplished without the need for complex mathematical algorithms. In this method, a secret image is encrypted into n random noise images known as sheets such that decryption is possible only when at least k of the n sheets are available and combined using a logical operator; combining less than ksheets does not reveal the secret image. Visual cryptography has been utilized to preserve the privacy of raw digital biometric data stored in a central database. An input biometric image (or template) is decomposed into two components such that the original data can only be recovered when both components are simultaneously available; individual components cannot be easily matched against the original input biometric data, thereby de-identifying (i.e., obscuring) the identity of the input data. This approach has been tested on the face, fingerprint, and iris modalities in the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in IEEE Symposium on Security and Privacy, Oakland, 1998, pp. 148–157

    Google Scholar 

  2. N. Ratha, J. Connell, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. A. Jain, A. Ross, U. Uludag, Biometric template security: challenges and solutions, in Proceedings of European Signal Processing Conference (EUSIPCO), Antalya, 2005, pp. 469–472

    Google Scholar 

  4. C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1–25 (2011)

    Article  Google Scholar 

  5. A. Ross, A.A. Othman, Visual cryptography for face privacy. Proc. SPIE 7667, 76670B–76670B–13 (2010)

    Article  Google Scholar 

  6. A. Ross, A. Othman, Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)

    Article  Google Scholar 

  7. A.K. Jain, U. Uludag, Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)

    Article  Google Scholar 

  8. J. Dong, T. Tan, Effects of watermarking on iris recognition performance, in 10th International Conference on Control, Automation, Robotics and Vision, Hanoi, 2008, pp. 1156–1161

    Google Scholar 

  9. N. Agrawal, M. Savvides, Biometric data hiding: a 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching, in Computer Vision and Pattern Recognition Workshop, Miami, 2009, pp. 85–92

    Google Scholar 

  10. U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  11. M. Naor, A. Shamir, Visual cryptography, in Advances in Cryptology – EUROCRYPT’94, Perugia, ed. by A. Santis. Lecture Notes in Computer Science, vol. 950 (Springer, 1995), pp. 1–12

    Chapter  Google Scholar 

  12. M. Nakajima, Y. Yamaguchi, Extended visual cryptography for natural images. J. Winter Sch. Comput. Graphics 10(2), 303–310 (2002)

    Google Scholar 

  13. D. Jin, W.-Q. Yan, M.S. Kankanhalli, Progressive color visual cryptography. J. Electron. Imaging 14(3), 19–33 (2005) [Online]. Available: http://link.aip.org/link/?JEI/14/033019/1

  14. G. Ateniese, C. Blundo, A. Santis, D. Stinson, Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)

    Article  MATH  Google Scholar 

  15. R. Floyd, L. Steinberg, An adaptive algorithm for spatial greyscale. SPIE Milest. Ser. 154, 281–283 (1999)

    Google Scholar 

  16. S. Shevell, The Science of Color (Elsevier, Amsterdam, 2003)

    Google Scholar 

  17. T. Cootes, G. Edwards, C. Taylor, Active appearance models. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 681–685 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Othman, A., Ross, A. (2015). Visual Cryptography. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_9077

Download citation

Publish with us

Policies and ethics