{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T07:22:14Z","timestamp":1762068134563,"version":"build-2065373602"},"reference-count":19,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revealed when the user folds the share along the specific axis. The second channel encodes subpixels on the basis of the encrypted message bits. It is designed to hide a wide range of data types. The third channel may be applied to a single share or multiple shares and is revealed when the proper parts of the shares are stacked. Fold and overlapping algorithms are adequate for printed shares, but the encryption method is only suitable for digital shares. The capacity of these methods ranges from half of the image size to the whole image size. The presented algorithms work on black-and-white images but are expandable to color visual cryptography. They may find applications in steganography and other data-hiding techniques. The created subliminal channels do not interfere with regular images that may still be revealed by stacking the shares. In short, this article introduces subliminal channels in visual cryptography, presents three algorithms for both binary and colorful images, shows examples of use with the results obtained, and discusses features of each method.<\/jats:p>","DOI":"10.3390\/cryptography6030046","type":"journal-article","created":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T22:12:43Z","timestamp":1663539163000},"page":"46","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Subliminal Channels in Visual Cryptography"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0646-3255","authenticated-orcid":false,"given":"Katarzyna","family":"Koptyra","sequence":"first","affiliation":[{"name":"Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krak\u00f3w, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8298-8627","authenticated-orcid":false,"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[{"name":"Cryptography and Cognitive Informatics Laboratory, AGH University of Science and Technology, 30-059 Krak\u00f3w, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,16]]},"reference":[{"key":"ref_1","unstructured":"Simmons, G.J. (1984, January 9\u201311). The subliminal channel and digital signature. Proceedings of the Eurocrypt 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, Lecture Notes in Computer Science, Paris, France."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Naor, M., and Shamir, A. (1994). Visual Cryptography. Advances in Cryptology\u2013EUROCRYPT \u201994, Proceedings, Springer.","DOI":"10.1007\/BFb0053419"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to Share a Secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_4","unstructured":"Yourmaran, R., Adler, A., and Miri, A. (June, January 30). An Improved Visual Cryptography Scheme For Secret Hiding. Proceedings of the 23rd Biennial Symposium on Communications, Kingston, ON, Canada."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Rao, Y.S., Sukonkina, Y., Bhagwati, C., and Singh, U.K. (2008, January 19\u201321). Fingerprint based authentication application using visual cryptography methods. Proceedings of the TENCON 2008\u20142008 IEEE Region 10 Conference, Hyderabad, India.","DOI":"10.1109\/TENCON.2008.4766425"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","article-title":"Extended capabilities for visual cryptography","volume":"250","author":"Ateniese","year":"2001","journal-title":"Theor. Comput. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/S0031-3203(02)00258-3","article-title":"Visual cryptography for color images","volume":"36","author":"Hou","year":"2003","journal-title":"Pattern Recognit."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.tcs.2013.09.005","article-title":"Color visual cryptography schemes for black and white secret images","volume":"510","year":"2013","journal-title":"Theor. Comput. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1023\/A:1008280705142","article-title":"Constructions and Properties of k out of n visual secret sharing schemes","volume":"11","author":"Verheul","year":"1997","journal-title":"Des. Codes Cryptogr."},{"key":"ref_10","unstructured":"Weir, J.P. (2012). Visual Cryptography and Its Applications, BookBoon."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Chen, T., Wu, C.S., and Lee, W.B. (2007, January 26\u201328). A Novel Subliminal Channel Found in Visual Cryptography and Its Application to Image Hiding. Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), Kaohsiung, Taiwan.","DOI":"10.1109\/IIH-MSP.2007.51"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"023020","DOI":"10.1117\/1.2193912","article-title":"Visual cryptography with extra ability of hiding confidential data","volume":"15","author":"Fang","year":"2006","journal-title":"J. Electron. Imaging"},{"key":"ref_13","unstructured":"Chang, C.C., Chuang, J.C., and Lin, P.Y. (2005, January 20\u201322). Sharing a secret two-tone image in two gray-level images. Proceedings of the 11th International Conference on Parallel and Distributed Systems, Fukuoka, Japan."},{"key":"ref_14","unstructured":"Crocker, L.D., Boulay, P., and Morra, M. (2022, March 30). Digital Halftoning. Computer Lab and Reference Library, June 1991. Available online: https:\/\/gist.githubusercontent.com\/tcoppex\/d6d2f3dad05a806a6068b860750c8895\/raw\/437843dba782af9dcce89838c0b48b38644fbb5f\/DHALF.TXT."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Koptyra, K., and Ogiela, M.R. (2015, January 14\u201316). Key generation for multi-secret steganography. Proceedings of the 2nd International Conference on Information Science and Security (ICISS), Seoul, Korea.","DOI":"10.1109\/ICISSEC.2015.7371013"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Koptyra, K., and Ogiela, M.R. (2022). Steganography in IoT: Information Hiding with APDS-9960 Proximity and Gestures Sensor. Sensors, 22.","DOI":"10.3390\/s22072612"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Castiglione, A., Santis, A.D., Pizzolante, R., Castiglione, A., Loia, V., and Palmieri, F. (2015, January 24\u201327). On the Protection of fMRI Images in Multi-domain Environments. Proceedings of the 29th International Conference on Advanced Information Networking and Applications, Gwangju, Korea.","DOI":"10.1109\/AINA.2015.224"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., and Palmieri, F. (2013, January 3\u20135). Text Compression and Encryption through Smart Devices for Mobile Communication. Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan.","DOI":"10.1109\/IMIS.2013.121"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Quirchmayr, G., Basl, J., You, I., Xu, L., and Weippl, E. (2012). A Secure Distributed Video Surveillance System Based on Portable Devices. Multidisciplinary Research and Practice for Information Systems, Springer. CD-ARES 2012, Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-32498-7"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/6\/3\/46\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:33:06Z","timestamp":1760142786000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/6\/3\/46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,16]]},"references-count":19,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["cryptography6030046"],"URL":"https:\/\/doi.org\/10.3390\/cryptography6030046","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2022,9,16]]}}}