Filters








13,042 Hits in 5.6 sec

A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme

2015 International Journal of Science and Research (IJSR)  
Secret sharing techniques are required when important and sensible information is transferred from one end to another end. User shares data in form of text and images.  ...  These visual cryptographic techniques are having number of controlling parameters like image quality, image height and width while sharing etc.  ...  The error diffusion used improves the visual quality of the encrypted shares as well as the decrypted secret image.  ... 
doi:10.21275/v4i11.nov151285 fatcat:c7da3rplingkhdkpzdfzkvfkfi

Secure System Framework for Secure Visual Cryptography

Ketan RajuKundiya, Ram B. Joshi
2015 International Journal of Computer Applications  
A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network.  ...  The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices.  ...  We are also thankful to all the staff members of the Department of Computer Engineering for their valuable time, support, comments, suggestions and persuasion.  ... 
doi:10.5120/19254-0957 fatcat:imrvkppiarg3pi7pgkwefwf5lm

A Review on Visual Secret Sharing Schemes for Binary, Gray & Color Image

Vishal V. Panchbhai
2020 Bioscience Biotechnology Research Communications  
The aim of this paper is to review and examine numerous existing visual secret sharing schemes, which tries to solve above problems.  ...  Cryptography is used to solve some of above problems. Visual Secret Sharing (VSS) schemes capable to handle the problem related with sharing of visual data.  ...  The visual secret sharing schemes with meaningful shares are more user-friendly and secure for transmission than noise-like shares thus it encourages to develop algorithm for generation of meaningful shares  ... 
doi:10.21786/bbrc/13.14/63 fatcat:se4sure4bbh3npqcnvwrbi2dca

Survey Paper on Digital Image Sharing by Diverse Image Media

Ashwini Udmale, S.B. Nimbekar
2016 International Journal of Computer Applications  
Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme.  ...  In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end.  ...  For the evaluation of the display quality of recovered images author consider blackness as one of the performance metric.  ... 
doi:10.5120/ijca2016908688 fatcat:eey7m52ntfekfn7avradytbp5q

Extended capabilities of feature-extraction for digital image sharing by diverse image media

Snehal Pawar
2016 2016 International Conference on Computing, Analytics and Security Trends (CAST)  
In accustomed visual secret sharing algorithm issue like hide secret images in shares that may be printed on transparencies or are encoded and stored in a digital form exist.  ...  The shares can be either meaningful images or noise-like pixels, which will definitely arouse suspicion and increase interception threat during transmission of the shares.  ...  A construction of EVCS which was realized by embedding the random shares into the meaningful covering shares. A method to revamp the visual quality of the share images.  ... 
doi:10.1109/cast.2016.7914930 fatcat:r2kzotxav5hm3por7rihlnpuqa

Emerging Trends in Visual Secret Sharing

Mainejar Yadav, Ranvijay .
2018 International Journal of Engineering & Technology  
Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device.  ...  The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc.  ...  The visual quality of the recovered secret images will be degraded as the quantity of secret images will be increases.  ... 
doi:10.14419/ijet.v7i3.12.16110 fatcat:xqb7rxszk5folcoawqquhetaim

A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme

Elavarasi G, Dr.Vanitha M
2017 International Journal of Engineering and Technology  
Here a new Color Visual Secret Sharing (CVSS)plot is connected to produce shares for input medicinal picture.  ...  At first the medicinal picture is part into various shadow pictures and the picture is uncovered when every one of these shadows are stacked together.Performance of the proposed method is evaluated by  ...  display quality Several papers investigated meaningful halftone shares [7] - [9] and emphasized the quality of the shares more than the quality of the recovered images.  ... 
doi:10.21817/ijet/2017/v9i5/170905313 fatcat:ibyst6kyebcuhfmyqbuhstfrba

Extended Capabilities of Feature-Extraction for Digital Image Sharing by Diverse Image Media

2015 International Journal of Science and Research (IJSR)  
In accustomed visual secret sharing algorithm issue like hide secret images in shares that may be printed on transparencies or are encoded and stored in a digital form exist.  ...  The shares can be either meaningful images or noise-like pixels, which will definitely arouse suspicion and increase interception threat during transmission of the shares.  ...  A construction of EVCS which was realized by embedding the random shares into the meaningful covering shares. A method to revamp the visual quality of the share images.  ... 
doi:10.21275/v4i11.nov151101 fatcat:e6q4jjh75fc3zpi5rkhlh5q5ue

Key based Visual Cryptography Scheme using Novel Secret Sharing Technique with Steganography

Poonam Bidgar
2013 IOSR Journal of Electronics and Communication Engineering  
So, finally this method will produce meaningful shares and use of secret key will ensure the security of scheme.  ...  Visual Cryptography is also one of them which is used to hide secret visual information (such as image, text, etc) in which secret sharing scheme is used.  ...  Acknowledgment The authors gratefully acknowledge all those who have helped in making of this review paper successfully.  ... 
doi:10.9790/2834-0821118 fatcat:jasqtvuz6rh5ngswiggd4cu4cy

A Novel Scheme of Visual Secret Sharing using Privilege Assigned Shares

Shivani Pahuja, Singara Singh Kasana
2018 The Oxford Journal of Intelligent Decision and Data Science  
as compared to the recovered image using the traditional Visual Cryptographic schemes. (3) The size of the secret image and the generated share will be same.  ...  Various existing Visual Cryptographic Schemes which makes use of traditional concepts of visual cryptography ensures that every share holds the same capability when are superimposed to recover the secret  ...  process of decryption and the visual quality of recovered secret image depends on the number of shares which are available for decryption process.  ... 
doi:10.5899/2018/ojids-00045 fatcat:hi5ma2a3drcvbflna6ywalq4oe

XOR-Based Visual Cryptography

Nidhin Soman, Smruthy Baby
2016 International Journal on Cybernetics & Informatics  
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret  ...  Visual cryptography scheme is a cryptographic technique which allows visual information.It is solve the poor visual quality problem. XOR-based VC.  ...  After the sets of shares are superimposed, this meaningful information disappears andthe secret is recovered.  ... 
doi:10.5121/ijci.2016.5228 fatcat:trtpzo37cfgkngmqrzwdquykdm

A Survey on Sharing Secret Image using NVSS Scheme

Sejal Patel, Jyoti Rao
2016 International Journal of Computer Applications  
Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more.  ...  The the light transmission of constructed shares is greater as compared to earlier technique and also the visual quality of regenerated secrets is better.  ...  Table 1 . 1 Comparison of Various VSS Techniques Schemes Encryption Techniques Meaningful shares Color Secret Shares Quality of recovered image Pixel Expansion [3] Probabilistic No No Recognizable  ... 
doi:10.5120/ijca2016908154 fatcat:olzewww3lrbspprskwq7hw5zpy

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

Rola I. Al-Khalid, Randa A. Al-Dallah, Aseel M. Al-Anani, Raghad M. Barham, Salam I. Hajir
2017 Journal of Software Engineering and Applications  
The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.  ...  The two shares are generated based on a private key. At the receiving side, the secret color image is revealed by stacking the two shares and exploiting the human vision system.  ...  The scheme improved the quality of the share images and the recovered secret image.  ... 
doi:10.4236/jsea.2017.101001 fatcat:7ll5dqs475cyra65kpn3rp42ti

Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme [chapter]

Yang-Wai Chow, Willy Susilo, Duncan S. Wong
2012 Lecture Notes in Computer Science  
Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares.  ...  In conjunction, these approaches effectively improve on the perceived visual quality of a recovered visual cryptography image.  ...  Since visual cryptography relies on the human visual system to average the black and white pixel contributions of superimposed shares, the perceived visual quality of the recovered image is an extremely  ... 
doi:10.1007/978-3-642-34129-8_2 fatcat:k6y2gxjrorhldkck6g7rn46sp4

Information Security using Visual Secret Sharing Scheme and Solution to Potential Attacks

Jesalkumari Varolia, R.R. Sedamkar
2021 International Journal of Computer Applications  
The main focus is on better image quality of reconstructed Image and protection from potential attacks on generated shares.  ...  This paper discusses many potential attacks on visual secret sharing system and offering more safety than current method.  ...  [19] proposed the scheme Block-based Progressive Visual Secret Sharing. The scheme recovers the gray-scale and color images with the contrast of 50% and 25% for noise-like and meaningful shares.  ... 
doi:10.5120/ijca2021921501 fatcat:fqf76gkkznc7pb5hqkddgw2jce
« Previous Showing results 1 — 15 out of 13,042 results