A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Major Developments in Visual Cryptography
2019
International Journal of Engineering and Advanced Technology
This paper about visual cryptography discusses, general access structure, halftone, colour, progressive, region incrementing, extended visual cryptography, colour extended visual cryptography, XOR and ...
OR visual cryptography and the applications of visual cryptography. ...
XOR-based k-out-of-n schemes for even k are fundamentally different from those of odd k. ...
doi:10.35940/ijeat.a1016.1291s619
fatcat:pzdhw52tyfczvazdashrkfxriu
XOR-Based Visual Cryptography
2016
International Journal on Cybernetics & Informatics
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret ...
This paper discusses most of the visual cryptography schemes and the performance measures used to evaluate them KEYWORDS Visual cryptography, random grid, pixel expansion, extended visual cryptography, ...
of Qualified Participant The basic model for visual sharing of the k out of n secret image. ...
doi:10.5121/ijci.2016.5228
fatcat:trtpzo37cfgkngmqrzwdquykdm
Diverse Visual Cryptography Schemes: A Glimpse
2015
International Journal of Engineering Research and
Keywords -V isual cryptography, Meaningful share, random grid, pixel expansion, extended visual cryptography, progressive visual cryptography. I. ...
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret ...
model for visual sharing of the k out of n secret image is such that;o Any n participants can compute the original message if any k (or more) of them are stacked together. o No group of k-1 (or fewer) ...
doi:10.17577/ijertv4is070265
fatcat:a523fpkzybb3fpjbhjia3ioem4
Overview of Visual Secret Sharing Schemes for QR Code Message
2019
International Journal of Computer Engineering in Research Trends
By stacking two or more shares one another, QR code message can be revealed and visually recognized. It improves the security of the data transmission and also improves the clarity of a secret image. ...
To solve the QR information security problem, this paper proposed visual secret sharing schemes for QR code message. ...
So, as compared to the (k,n) visual cryptography, progressive visual cryptography is lessen strict because in that minimum 2 or more shares can reveal secret information progressively. ...
doi:10.22362/ijcert/2018/v5/i12/v5i1202
fatcat:fjhy3p46wzbl5k2l5zunnrxmfm
A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY
2014
International Journal of Research in Engineering and Technology
Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. ...
To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. ...
ACKNOWLEDGEMENTS We would like to thank reference authors and also like to thank the anonymous reviewers,whose comments and suggestions have helped them to improve the quality of the originalmanuscript ...
doi:10.15623/ijret.2014.0301029
fatcat:xeh2rftt4nfdxfah4hcxn2fhei
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis
2011
International Journal of Computer Science & Engineering Survey
In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security research work done in this area. construction method of visual cryptography is redesigned and extended ...
cryptography. ...
The construction of 'k' out of 'n' visual secret sharing is similar to the basic model with one difference. ...
doi:10.5121/ijcses.2011.2409
fatcat:qupw3aztd5hyjlmwhj3kltnnn4
Cheater identification in Visual secret sharing schemes using SHA Algorithm and Alpha channel
2015
International Journal of Computer Applications Technology and Research
Visual secret sharing (VSS) is an alternate form of secret sharing, where the visual information to be shared is distributed /encrypted in such a way that decryption done using Human Visual System. ...
Secret sharing or secret splitting refers to methods for distributing a secret among a group of participants, each of whom is allocated a share of the secret. ...
Naor and Shamir [1] establish visual cryptography as a visual variant of the k out of n secret sharing problem. ...
doi:10.7753/ijcatr0411.1010
fatcat:fqyeh6cnjzdudbpmu3jeiu5kta
Meaningful And Unexpanded Shares For Visual Secret Sharing Schemes
2015
Zenodo
This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. ...
In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. ...
Construction of k out of n threshold visual cryptography scheme for general access structure is better with respect to pixel expansion than [6] . ...
doi:10.5281/zenodo.1471329
fatcat:zql2fkijmrf77nnunv3fulljaq
Secured Sharing of Digital Images Via Diverse Media
2015
International Journal of Engineering Research and
In conventional visual cryptography schemes, secret shares are generated from secret image itself. The proposed work initially creates a cover image based on a key. ...
Secret color image is divided into n shares. Each of these n shares is encrypted using the extracted feature image. ...
Decryption In the decryption side we need at least k shares created out of n to successfully retrieve the secret image back. ...
doi:10.17577/ijertv4is110447
fatcat:qgwjfh4goja73gybjtyfwcdirq
A Review on Various Implemented Techniques for Visual Cryptography
2016
International Journal of Computer Applications
The area of Visual Cryptography has progressed progressively over the past some years. ...
Over the earlier period, information technology has gain access to more and more regions of our society. ...
secrets in S can be revealed when all of the (n+1) shares are accessible,
Segment Based Visual Cryptography: The Visual Cryptography schemes revealed on top of is based on pixels in the input image. ...
doi:10.5120/ijca2016912314
fatcat:zsqlqlfyvzherpgsltra4pecj4
Visual Cryptography and Steganography Methods Review
2015
International Journal on Recent and Innovation Trends in Computing and Communication
This paper provides a review of two methods -Visual Cryptography and Steganography for secure communication via a common communication channel. ...
The art of information hiding receive attention of the researchers. ...
(k, n) Visual Cryptography Scheme In basic method original image is divided into n shares and all n shares are equally important. ...
doi:10.17762/ijritcc2321-8169.150437
fatcat:ta5cd5z3ujh3lhnmwpcpol727a
An Efficient Image Watermarking for Combination of RST Attacks
2017
International Journal of Computer Applications
In our proposed approach, first enter the user name and password then generate QR-code using zxing library that will converted in to the share using Binary Visual cryptography algorithm. ...
Now share-1 and another share-2 is in data base so we will apply EX-OR operation to get the QR-Code. The final QR-code is decoded and we get the user name and password. ...
progressive visual cryptography and irregular grid based visual cryptography, also as of late created hierarchic "visual cryptography. ...
doi:10.5120/ijca2017914837
fatcat:6gnanjny7bcc5hac5qopbrkrka
Emerging Trends in Visual Secret Sharing
2018
International Journal of Engineering & Technology
There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri. ...
The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc. ...
Table 4 : 4 Example of cheating in 2-out-of-3 visual cryptography scheme ...
doi:10.14419/ijet.v7i3.12.16110
fatcat:xqb7rxszk5folcoawqquhetaim
A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD
2015
International Journal of Research in Engineering and Technology
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm. --- ...
In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. ...
The rest of the paper is organized as, section 2 discuss about the k out of k extended visual cryptography scheme and random grids method. ...
doi:10.15623/ijret.2015.0402058
fatcat:vwvebewltrd47lizzb4yodqrki
An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
2014
International Journal of Computer Network and Information Security
This paper proposes a new (k,n)-threshold image sharing scheme using extended visual cryptography scheme for color images based on bit plane encoding that encrypts a color image in such a way that results ...
It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the Extended Visual Cryptography scheme (EVCS). ...
Fundamentals of Visual Cryptography Visual cryptography is introduced by Normand Shamir [1] .They developed a black and white (k, n)-VC scheme for secret sharing. ...
doi:10.5815/ijcnis.2014.02.08
fatcat:jws26qtvjfhvrp7dyxu2dldlfe
« Previous
Showing results 1 — 15 out of 2,461 results