Filters








1,372 Hits in 4.4 sec

New Algorithm for user Friendly Encryption

Shyni T S, Anusree L
2015 International Journal of Engineering Research and  
This paper proposes a new algorithm for encrypting secret data to be communicated over internet. This method combines the advantage of normal encryption and visual cryptography.  ...  The secret image is encrypted using a new encryption algorithm producing multiple encrypted images. Images are same as the cover images thus become easy to handle.  ...  On the other hand for generating white pixel in stack image both share 1 and share 2 use same combination of black and white pixels.  ... 
doi:10.17577/ijertv4is051342 fatcat:oqk5psdjy5aovan7auj2il3xwa

Cheater identification in Visual secret sharing schemes using SHA Algorithm and Alpha channel

Deepika M P, A Sreekumar
2015 International Journal of Computer Applications Technology and Research  
Moreover the proposed scheme can be used with any visual cryptographic scheme to identify the cheaters.  ...  In these schemes, normally a participant holds one share, and when the participants stack a sufficient number of shares, the secret image /the original image can be reconstructed through the human visual  ...  Lin [20] proposed a new approach for colored visual cryptography scheme.  ... 
doi:10.7753/ijcatr0411.1010 fatcat:fqyeh6cnjzdudbpmu3jeiu5kta

A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPTOGRAPHIC SCHEMES BY WITHOUT PIXEL EXPANSION

P Saranya, G Sathayavathy
2014 International Journal of Computer Applications Technology and Research  
This paper proposed general constructions for threshold multiple-secret visual cryptographic schemes (MVCSs) that are capable of encoding s secret images.  ...  The visual secrets sharing scheme for multiple secrets is called multiple-secret visual cryptographic schemes (MVCSs).  ...  Until now some important VC schemes, such as the (k,n)-VC scheme, the general access structure for VC and the extended VC (EVC) [7, 8 ,9, 10, 11, 12] have been proposed.  ... 
doi:10.7753/ijcatr0301.1007 fatcat:vkeugfzpxjacnhtfatfpj4kpuy

PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY

Anshul Sharma
2020 Zenodo  
on visual basis and on mathematical basis using mathematical parameters for index of quality of the image like PSNR and Universal quality index UQI.  ...  Improved shares have been developed by changing the error filters that were earlier used in halftone visual cryptography via error diffusion and results were compared with the existing work for improvements  ...  Ateniese et al. designed a more general model for VSS schemes based on general access structures [4] . An access structure is a specification of all the qualified and forbidden subsets of shares.  ... 
doi:10.5281/zenodo.3813470 fatcat:yxiphjwxtzfrnidhy2e6grqgqi

Attestation Using Visual Cryptography (3,3) Scheme

Dodda Pratap Roy
2020 International Journal of Emerging Trends in Engineering Research  
In this paper we propose a complete new and different way of authentication(attestation) which helps to provide more security than other authentication systems by using the Visual Cryptography (3,3) Scheme  ...  Visual Cryptography is a technique in cryptography which is used to encrypt the images and all other visual information.  ...  both black & white pixels Figure 5 : 5 Figure 5: Result of applying a program on VC 2 out of 2 scheme Figure 6 : 6 Figure 6: Encryption Structure of Visual Cryptography 3 out of 3 Scheme Figure 7  ... 
doi:10.30534/ijeter/2020/06832020 fatcat:ron5qqblhfdcxgyxqev3xye3nq

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Morampudi Naresh kumar, Datrika Srinivas Rao, D Sravanthi
2011 International Journal of Computer Science & Engineering Survey  
by generic algorithms.  ...  cryptographic algorithms.  ...  Construction of k out of n threshold visual cryptography scheme for general access structure is better with respect to pixel expansion than [1] .the natural generated encrypted schemes .  ... 
doi:10.5121/ijcses.2011.2409 fatcat:qupw3aztd5hyjlmwhj3kltnnn4

Major Developments in Visual Cryptography

2019 International Journal of Engineering and Advanced Technology  
Visual cryptography is a cryptographic mechanism that gets applied in visual information protection for secured transfer of data.  ...  This paper about visual cryptography discusses, general access structure, halftone, colour, progressive, region incrementing, extended visual cryptography, colour extended visual cryptography, XOR and  ...  General Access Structure VCS A VCS for General Access Structures (GAS) splits the Information into a subset of restricted and forbidden set of participants, wherein only the participants belonging to the  ... 
doi:10.35940/ijeat.a1016.1291s619 fatcat:pzdhw52tyfczvazdashrkfxriu

Cheating Prevention Schemes for Visual Cryptography

Biltta P George, Deepika M P
2015 International Journal of Engineering Research and  
We considered the cheating problem in the visual cryptography scheme and investigate various cheating prevention schemes.  ...  Visual cryptography is an encryption technique to encrypt a secret image into different shares such that stacking a sufficient number of shares reveals the secret image.  ...  It is also noted that most CPVCS can only be based on a VCS with specific access structure, for example, the (2, n) threshold access structure.  ... 
doi:10.17577/ijertv4is070306 fatcat:qzuo5yhydfanhkuxp6jdhldaxu

Framework for Visual Cryptographic based Encryption and Decryption

Saumya Awasthi, Ajay Pratap, Romesh Srivastava
2017 International Journal of Computer Applications  
A framework for implementation of visual cryptography based on encryption and decryption is presented and implemented.  ...  Target image is converted into black & white image and one digitized image, after that both are send to user site separately. Decryption is performed by the overlapping of these two images.  ...  Khan, Saroj Institute Of Technology And Management, Lucknow for his support.  ... 
doi:10.5120/ijca2017913485 fatcat:avxmyx6rufayzm5vb2ecfjhyra

An Automated Group Key Authentication System Using Secret Image Sharing Scheme [article]

Dipak Kumar Kole, Subhadip Basu
2014 arXiv   pre-print
For secured group communication, the CAS generates a secret alphanumeric group key image.  ...  We have achieved 99.1% classification accuracy for 26 printed English uppercase characters and 10 numeric digits.  ...  The term visual came from the simple decoding technique with the help of human visual system. Fig. 3 shows the structure of a simple visual cryptographic scheme.  ... 
arXiv:1410.4019v1 fatcat:5rdtanhubfgzbk7cwzsvebggne

An Optimization Model for Secure Sharing of Visual Cryptographic Images Generated by Using arbitrary Pixel Stereogram

Divya R
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Visual cryptography schemes (VCSs) are the methods to provide data security in network systems by generating arbitrary and non meaningful parts of a original image under consideration.  ...  Hence a binocular visual cryptography (BVC) and an algorithm for encryption are used to protect the shared pixels in the arbitrary dot stereogram in addition to the other modes of transmission for the  ...  A model that defined a series of building rules to obtain the original pictures of the (2,num) binocular cryptography for visual secrets such that the pictures have the highest black and white variance  ... 
doi:10.17762/ijritcc2321-8169.1503141 fatcat:ljoytn24njcxrifhjs4fftdoau

Meaningful And Unexpanded Shares For Visual Secret Sharing Schemes

Mr. V.B.Phadtare, Dr. V.R. Ghorpade
2015 Zenodo  
This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography.  ...  In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication.  ...  Construction of k out of n threshold visual cryptography scheme for general access structure is better with respect to pixel expansion than [6] .  ... 
doi:10.5281/zenodo.1471329 fatcat:zql2fkijmrf77nnunv3fulljaq

XOR-Based Visual Cryptography

Nidhin Soman, Smruthy Baby
2016 International Journal on Cybernetics & Informatics  
Actually, two XOR-based VC algorithms are proposed, namely XOR-based VC for general access structure (GAS) and adaptive region incrementing XOR-based VC. to be encrypted in such a way that the decryption  ...  Visual cryptography scheme is a cryptographic technique which allows visual information.It is solve the poor visual quality problem. XOR-based VC.  ...  VC for General Access Structure.  ... 
doi:10.5121/ijci.2016.5228 fatcat:trtpzo37cfgkngmqrzwdquykdm

A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach

Kumar Gaurav, Sanjeev Gupta
2017 International Journal of Computer Applications  
a cryptographic come within reach of, a provably secure time domain attribute-based access control (TAAC) scheme, to secure the cloud-based video content sharing.  ...  A HVC generate procedure is projected that can make an option for secret halftone image into color half-tone shares.  ...  a cryptographic approach, a provably secure time domain attribute-based access control (TAAC) scheme, to secure the cloud-based video content sharing.  ... 
doi:10.5120/ijca2017915857 fatcat:xqw2bnnqtvgojjxrvtxkmigogu

A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD

Jainthi.K .
2015 International Journal of Research in Engineering and Technology  
This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.  ...  In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares.  ...  Ateniese and Blundo proposed a VC scheme based upon general access structure. The shares are look like noise like structure and the management of the shares is complex.  ... 
doi:10.15623/ijret.2015.0402058 fatcat:vwvebewltrd47lizzb4yodqrki
« Previous Showing results 1 — 15 out of 1,372 results