Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Visual Cryptography

Handbook of Research on Cyber Crime and Information Privacy
A visual cryptography technique works by splitting the secret image into two or more non-identical meaningless images. The image reconstruction is possible only in case of all images stacked together.
Published in Chapter:
Preserving Information Security Using Fractal-Based Cryptosystem
Shafali Agarwal (Independent Researcher, Plano, USA)
Copyright: © 2021 |Pages: 28
DOI: 10.4018/978-1-7998-5728-0.ch026
Abstract
The chapter intends to propose a hybrid cryptosystem based on a chaotic map and a fractal function. The sequential order of process execution provides a computationally less expensive and simple approach that still designed a secure cryptosystem. A one-dimensional Ricker map and its modified form are employed to initially shuffle the image pixels twice, and also a pseudo-random sequence is generated using both maps. The algorithm implemented a sequence of pixel confusion-diffusion steps using the image rotation and a transcendental anti-Mandelbrot fractal function (TAMFF) and its Mann-iterated fractal function (Sup-TAMFF). Finally, the pixel value of an image obtained in the last step and the recent two pixels of the encrypted image is XORed with the corresponding pseudo-random matrix value to get the cipher image. Subsequently, various performance tests are conducted to verify the suitability of the given method to be used in real-world information transmission.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR