Disa Walden


With the growth of digital media, it is becoming more prevalent to find a method to protect the security of that media. An effective method for securely transmitting images is found in the field of Visual Cryptography. While this method is effective for securely transmitting images, many methods have been developed since the first algorithm was proposed in 1994 by Naor and Shamir. A benchmarking scheme is proposed to give the algorithm capabilities, understand the implementation method, evaluate the algorithm development, and provide image reconstruction information. Additionally, the algorithms are ranked according to a Visual Cryptography standard. This would allow an easy way to differentiate between algorithms and determine the ideal algorithm for a given task or project.

Library of Congress Subject Headings

Data encryption (Computer science); Cryptography--Data processing; Computer algorithms--Evaluation; Image processing--Digital techniques

Publication Date


Document Type


Department, Program, or Center

Chester F. Carlson Center for Imaging Science (COS)


Dube, Roger


Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works. Physical copy available through RIT's The Wallace Library at: QA76.9.A25 W35 2012


RIT – Main Campus