Definition
Visual cryptography is a method for encrypting visual information such as images where the decryption is accomplished without the need for complex mathematical algorithms. In this method, a secret image is encrypted into n random noise images known as sheets such that decryption is possible only when at least k of the n sheets are available and combined using a logical operator; combining less than ksheets does not reveal the secret image. Visual cryptography has been utilized to preserve the privacy of raw digital biometric data stored in a central database. An input biometric image (or template) is decomposed into two components such that the original data can only be recovered when both components are simultaneously available; individual components cannot be easily matched against the original input biometric data, thereby de-identifying (i.e., obscuring) the identity of the input data. This approach has been tested on the face, fingerprint, and iris modalities in the...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
G.I. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometric identification, in IEEE Symposium on Security and Privacy, Oakland, 1998, pp. 148–157
N. Ratha, J. Connell, R. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
A. Jain, A. Ross, U. Uludag, Biometric template security: challenges and solutions, in Proceedings of European Signal Processing Conference (EUSIPCO), Antalya, 2005, pp. 469–472
C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1–25 (2011)
A. Ross, A.A. Othman, Visual cryptography for face privacy. Proc. SPIE 7667, 76670B–76670B–13 (2010)
A. Ross, A. Othman, Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)
A.K. Jain, U. Uludag, Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)
J. Dong, T. Tan, Effects of watermarking on iris recognition performance, in 10th International Conference on Control, Automation, Robotics and Vision, Hanoi, 2008, pp. 1156–1161
N. Agrawal, M. Savvides, Biometric data hiding: a 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching, in Computer Vision and Pattern Recognition Workshop, Miami, 2009, pp. 85–92
U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
M. Naor, A. Shamir, Visual cryptography, in Advances in Cryptology – EUROCRYPT’94, Perugia, ed. by A. Santis. Lecture Notes in Computer Science, vol. 950 (Springer, 1995), pp. 1–12
M. Nakajima, Y. Yamaguchi, Extended visual cryptography for natural images. J. Winter Sch. Comput. Graphics 10(2), 303–310 (2002)
D. Jin, W.-Q. Yan, M.S. Kankanhalli, Progressive color visual cryptography. J. Electron. Imaging 14(3), 19–33 (2005) [Online]. Available: http://link.aip.org/link/?JEI/14/033019/1
G. Ateniese, C. Blundo, A. Santis, D. Stinson, Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1–2), 143–161 (2001)
R. Floyd, L. Steinberg, An adaptive algorithm for spatial greyscale. SPIE Milest. Ser. 154, 281–283 (1999)
S. Shevell, The Science of Color (Elsevier, Amsterdam, 2003)
T. Cootes, G. Edwards, C. Taylor, Active appearance models. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 681–685 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Othman, A., Ross, A. (2015). Visual Cryptography. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_9077
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_9077
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering