Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Visual cryptography for image processing and security : theory, methods, and applications (2nd ed.)
Liu F., Yan W., Springer International Publishing, New York, NY, 2015. 167 pp. Type: Book (978-3-319234-72-4)
Date Reviewed: Feb 10 2016

In this slim but overly packed volume, visual cryptography is reviewed along with its fundamental concepts in theory and practice. The area is absolutely critical at this time for counter-terrorism, corporate security, and in international relations; thus, the topic is of extraordinary interest in a wide variety of fields. One huge advantage of visual cryptography is that it is “a secret sharing technique which allows encryption of an image without requiring any complex computation or knowledge of cryptography.” It should be obvious from the description that this area will be an issue of profound interest and debate as a result. “The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail,” according to the publisher’s description of the book.

The authors, from China and Australia, present research on VCS and on aspects of the practice insofar as the ideas of probabilistic, size invariant, threshold, concolorous, and cheating immune components are concerned. Since this is such a highly technical volume, and to ensure a basic comprehension of the key components (probabilistic, size invariant, concolorous, and cheating immune), the definitions should be clear and presented early. Instead, definitions appear scattered and throughout the volume: probabilistic (pp. 14, 41, 83); size invariant (pp. 83, 96); and cheating immune (p. 53). Concolorous is not clearly defined in regard to VCS. The glossary is sparse, but there are basic definitions found there. The index might be referenced as a further aid, but it is very short and not helpful for these basic aspects of VCS.

Nonetheless, VCS is a technique that allows visual information (pictures, text, and so on) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The authors note that one of the best-known VCS techniques has been credited to Moni Naor and Adi Shamir (1994). It can be clearly understood that there are antecedents of visual cryptography in patents from the 1960s, as well as other antecedents in works on perception and secure communication. Secure communication is of primary interest to the authors in this volume. Finally, and perhaps most importantly, VCS can be used to protect biometric templates in which decryption does not require any complex computations. VCS is readily available to any neophyte.

In spite of the importance of the topic, the editors at Springer should have reviewed the volume more closely before publication. There are a number of troubling editorial issues that appear early in the text and are too numerous to document. A few examples should suffice to make the point: “Evidences shows” (p. v) should agree in subject and verb; a word needs to be supplied, as in “[a] one pad” (p. 1); “complicate” (p. 1) should be complicated; “the information range is much wide” [sic]; and “We notice that, [the] final goal” (p. 23), in which an article should be added.

There are helpful aspects of the text. At the end of each chapter, there are questions and exercises, which may assist the reader in grasping the importance of the material presented. In addition, there are voluminous references that supplement each chapter. There is no bibliography, though, which would have been an important supplement to add.

There are sound references on visual cryptography that interested readers may find more reliable [1,2,3,4,5].

Reviewer:  G. Mick Smith Review #: CR144159 (1604-0238)
1) Naor, M.; Shamir, A. Visual cryptography. In: Advances in cryptology -- Eurocrypt ’94 (LNCS 950). 1-12, Springer, 1995.
2) Ateniese, G.; Blundo, C.; De Santis, A.; Stinson, D. R. Extended capabilities for visual cryptography. Theoretical Computer Science 250 (2001), 143–161.
3) Gnanaguruparan, M.; Kak, S. Recursive hiding of secrets in visual cryptography. Cryptologia 26 (2002), 68–76.
4) Kafri, O.; Keren, E. Encryption of pictures and shapes by random grids. Optics Letters 12, 6(1987), 377–379.
5) Horng, G.; Chen, T.; Tasi, D. S. Cheating in visual cryptography. Designs, Codes and Cryptography 38, 2(2006), 219–236.
Bookmark and Share
  Editor Recommended
Featured Reviewer
Data Encryption (E.3 )
Would you recommend this review?
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy