International Journal of Computer Applications
Visual cryptography encodes a Secret binary Image (SI) into shares of random binary patterns. The decoding process of a visual cryptography scheme, which differs from traditional secret sharing, does not need any cryptographic algorithms like symmetric and asymmetric algorithms. Visual cryptography is based on the images and is obtained by sending pixel information and stacking of pixels for recovery of the secret image. Instead of using binary patterns of the shares, which does not give any visual meaning and hinder the objectives of visual cryptography, halftone visual cryptography via error diffusion is used that encodes a secret binary image into n halftone shares (images) carrying significant visual information.