You are on page 1of 2

One underlying the emergence of visual cryptography is a traditional cryptography

depends on many complex calculations to encrypt and decrypt secret; then the
computer is very important for encryption and decryption. . In 1994, Naor and
Shamir (1995) proposed a new method applied on secret images, called visual
What Is VC? Visual cryptography is a new technique which provides information
security. Visual cryptography is a way to hide a message image such that
decryption can be done directly without the help of computers. However, this
method has several disadvantages that complicate the decrypted message and
gives the advantage to the cryptanalyst.
This technique allows Visual information (pictures, text, etc) to be encrypted in such
a way that their decryption can be performed by the human visual system, without
any complex cryptographic algorithms. This technique encrypts a secret image into
shares such that stacking a sufficient number of shares reveals the secret image.
Shares are usually presented in transparencies. In this paper we provide an
overview of the emerging Visual Cryptography (VC) and related security research
work done in this area.

Sharing system represents the basic version 2-2 secrets. The point is of an image
black and white P produced two images P1 and P2. P1 and P2 both are random,
which is random distribution of black and white pixels, and not shows any
information. But when P1 and P2 stacked, it will show the original image P, by
contrast lost as much as 50%. Examples of visual cryptography can be seen in
Figure – 1
Visual cryptography has the encryption strength - a one-time-pad. If only owned P1,
P information can not be known without P2. In fact any sophisticated computing will
remain can find sharetidak P if one exists. In other words, the system encryption
with a cryptographic visual unbreakable.

Visual cryptography method proposed pixel-base Shamir and Naor, split images
based on pixel-pixel image. Suppose that an image consists of pixels are black and
white. Each pixel is displayed in n modified version (called shares), one for each
transparency. Each share is a collection of black and white msubpixel printed
adjacent to the other so that the human visual system can see it generally as a
black or white picture.
Visual cryptography technique is basically using a seven-segmen yang display has
found in sevent-segment 1908.Tampilan using seven bars, which three including
horizontal and four vertical rest. By marking the selected subset in the seventh
segment, will be represented digit 0, .., 9, as shown in Figure - 3.

Segment-based visual cryptography addresses some of the pitfalls of pixel based visual cryptography with reduction in decryption process time being one and the secret being much more clearly visible to normal human eye being the other. . This concept proposes a secure yet easy way of transferring data with nil chances of guessing attacks.