Visual cryptography allows encrypting images such that the decryption can be performed by the human visual system without any computation. It works by splitting an image into shares, such that individual shares reveal no information about the original image but combining a sufficient number of shares reveals the hidden image. The document discusses various schemes for visual cryptography including general k out of n schemes, 2 out of 2 schemes using 2 or 4 subpixels per pixel, 3 out of 3 schemes, and 2 out of 6 schemes. It also covers extensions for color, grayscale, and continuous tone images as well as applications such as voting and banking.