Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,461 Hits in 6.1 sec

Major Developments in Visual Cryptography

2019 International Journal of Engineering and Advanced Technology  
This paper about visual cryptography discusses, general access structure, halftone, colour, progressive, region incrementing, extended visual cryptography, colour extended visual cryptography, XOR and  ...  OR visual cryptography and the applications of visual cryptography.  ...  XOR-based k-out-of-n schemes for even k are fundamentally different from those of odd k.  ... 
doi:10.35940/ijeat.a1016.1291s619 fatcat:pzdhw52tyfczvazdashrkfxriu

XOR-Based Visual Cryptography

Nidhin Soman, Smruthy Baby
2016 International Journal on Cybernetics & Informatics  
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret  ...  This paper discusses most of the visual cryptography schemes and the performance measures used to evaluate them KEYWORDS Visual cryptography, random grid, pixel expansion, extended visual cryptography,  ...  of Qualified Participant The basic model for visual sharing of the k out of n secret image.  ... 
doi:10.5121/ijci.2016.5228 fatcat:trtpzo37cfgkngmqrzwdquykdm

Diverse Visual Cryptography Schemes: A Glimpse

Sruthy K Joseph, Ramesh R
2015 International Journal of Engineering Research and  
Keywords -V isual cryptography, Meaningful share, random grid, pixel expansion, extended visual cryptography, progressive visual cryptography. I.  ...  There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret  ...  model for visual sharing of the k out of n secret image is such that;o Any n participants can compute the original message if any k (or more) of them are stacked together. o No group of k-1 (or fewer)  ... 
doi:10.17577/ijertv4is070265 fatcat:a523fpkzybb3fpjbhjia3ioem4

Overview of Visual Secret Sharing Schemes for QR Code Message

Komal S. Patil, Suhas B. Bhagate, Dhanashri M. Kulkarni
2019 International Journal of Computer Engineering in Research Trends  
By stacking two or more shares one another, QR code message can be revealed and visually recognized. It improves the security of the data transmission and also improves the clarity of a secret image.  ...  To solve the QR information security problem, this paper proposed visual secret sharing schemes for QR code message.  ...  So, as compared to the (k,n) visual cryptography, progressive visual cryptography is lessen strict because in that minimum 2 or more shares can reveal secret information progressively.  ... 
doi:10.22362/ijcert/2018/v5/i12/v5i1202 fatcat:fjhy3p46wzbl5k2l5zunnrxmfm

A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY

Prashant B Swadas .
2014 International Journal of Research in Engineering and Technology  
Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image.  ...  To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities.  ...  ACKNOWLEDGEMENTS We would like to thank reference authors and also like to thank the anonymous reviewers,whose comments and suggestions have helped them to improve the quality of the originalmanuscript  ... 
doi:10.15623/ijret.2014.0301029 fatcat:xeh2rftt4nfdxfah4hcxn2fhei

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Morampudi Naresh kumar, Datrika Srinivas Rao, D Sravanthi
2011 International Journal of Computer Science & Engineering Survey  
In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area. construction method of visual cryptography is redesigned and extended  ...  cryptography.  ...  The construction of 'k' out of 'n' visual secret sharing is similar to the basic model with one difference.  ... 
doi:10.5121/ijcses.2011.2409 fatcat:qupw3aztd5hyjlmwhj3kltnnn4

Cheater identification in Visual secret sharing schemes using SHA Algorithm and Alpha channel

Deepika M P, A Sreekumar
2015 International Journal of Computer Applications Technology and Research  
Visual secret sharing (VSS) is an alternate form of secret sharing, where the visual information to be shared is distributed /encrypted in such a way that decryption done using Human Visual System.  ...  Secret sharing or secret splitting refers to methods for distributing a secret among a group of participants, each of whom is allocated a share of the secret.  ...  Naor and Shamir [1] establish visual cryptography as a visual variant of the k out of n secret sharing problem.  ... 
doi:10.7753/ijcatr0411.1010 fatcat:fqyeh6cnjzdudbpmu3jeiu5kta

Meaningful And Unexpanded Shares For Visual Secret Sharing Schemes

Mr. V.B.Phadtare, Dr. V.R. Ghorpade
2015 Zenodo  
This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography.  ...  In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication.  ...  Construction of k out of n threshold visual cryptography scheme for general access structure is better with respect to pixel expansion than [6] .  ... 
doi:10.5281/zenodo.1471329 fatcat:zql2fkijmrf77nnunv3fulljaq

Secured Sharing of Digital Images Via Diverse Media

Richu Shibu, Meekha Merina George, Leya Elizabeth Sunny
2015 International Journal of Engineering Research and  
In conventional visual cryptography schemes, secret shares are generated from secret image itself. The proposed work initially creates a cover image based on a key.  ...  Secret color image is divided into n shares. Each of these n shares is encrypted using the extracted feature image.  ...  Decryption In the decryption side we need at least k shares created out of n to successfully retrieve the secret image back.  ... 
doi:10.17577/ijertv4is110447 fatcat:qgwjfh4goja73gybjtyfwcdirq

A Review on Various Implemented Techniques for Visual Cryptography

Amit Kumar, Anurag Jain
2016 International Journal of Computer Applications  
The area of Visual Cryptography has progressed progressively over the past some years.  ...  Over the earlier period, information technology has gain access to more and more regions of our society.  ...  secrets in S can be revealed when all of the (n+1) shares are accessible, Segment Based Visual Cryptography: The Visual Cryptography schemes revealed on top of is based on pixels in the input image.  ... 
doi:10.5120/ijca2016912314 fatcat:zsqlqlfyvzherpgsltra4pecj4

Visual Cryptography and Steganography Methods Review

Kavita M
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
This paper provides a review of two methods -Visual Cryptography and Steganography for secure communication via a common communication channel.  ...  The art of information hiding receive attention of the researchers.  ...  (k, n) Visual Cryptography Scheme In basic method original image is divided into n shares and all n shares are equally important.  ... 
doi:10.17762/ijritcc2321-8169.150437 fatcat:ta5cd5z3ujh3lhnmwpcpol727a

An Efficient Image Watermarking for Combination of RST Attacks

Sheshang D., Sanjay Gaur
2017 International Journal of Computer Applications  
In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted in to the share using Binary Visual cryptography algorithm.  ...  Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password.  ...  progressive visual cryptography and irregular grid based visual cryptography, also as of late created hierarchic "visual cryptography.  ... 
doi:10.5120/ijca2017914837 fatcat:6gnanjny7bcc5hac5qopbrkrka

Emerging Trends in Visual Secret Sharing

Mainejar Yadav, Ranvijay .
2018 International Journal of Engineering & Technology  
There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri.  ...  The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc.  ...  Table 4 : 4 Example of cheating in 2-out-of-3 visual cryptography scheme  ... 
doi:10.14419/ijet.v7i3.12.16110 fatcat:xqb7rxszk5folcoawqquhetaim

A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD

Jainthi.K .
2015 International Journal of Research in Engineering and Technology  
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm. ---  ...  In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares.  ...  The rest of the paper is organized as, section 2 discuss about the k out of k extended visual cryptography scheme and random grids method.  ... 
doi:10.15623/ijret.2015.0402058 fatcat:vwvebewltrd47lizzb4yodqrki

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Pushpendra K Rajput
2014 International Journal of Computer Network and Information Security  
This paper proposes a new (k,n)-threshold image sharing scheme using extended visual cryptography scheme for color images based on bit plane encoding that encrypts a color image in such a way that results  ...  It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the Extended Visual Cryptography scheme (EVCS).  ...  Fundamentals of Visual Cryptography Visual cryptography is introduced by Normand Shamir [1] .They developed a black and white (k, n)-VC scheme for secret sharing.  ... 
doi:10.5815/ijcnis.2014.02.08 fatcat:jws26qtvjfhvrp7dyxu2dldlfe
« Previous Showing results 1 — 15 out of 2,461 results