Data security is more important than ever before as technology develops and more and more personal information is converted to digital form.
This data must be protected safely and securely so that does not prevent access by a designated authority, which is a very challenging and intriguing problem. This issue has been the subject of numerous attempts to fix it within the cryptography community.
This book introduces Visual Cryptography (VC), one of these data security techniques. Particularly, visual cryptography makes it possible for several trusted parties to share secrets effectively and efficiently. The most challenging aspect of many cryptographic systems is building trust. With the use of visual cryptography, one secret can be divided into two or more shares in a highly effective way. Without using a computer, the original secret can be found when the shares are precisely superimposed together after being xeroxed onto transparencies.
There are numerous forms of visual cryptography investigated. From the earliest kind of conventional visual cryptography to the most recent advancements. Traditional venture capital deals primarily with the distribution of a single binary secret among numerous parties. By introducing shares with considerable visual meaning, extended VC aims to take this a step further. This takes away from the encrypted shares that are generated using conventional techniques and gives off a suspicious appearance. Additionally included are dynamic, color, progressive, and image hatching VC schemes.
There is also a description of useful VC applications. These applications make use of watermarking methods and Moire patterns. The watermarking domain is thoroughly analyzed, and several methods and schemes that can successfully integrate VC into the watermarking area are offered. Examples are given together with a review of the approaches' underlying principles.