A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme
2015
International Journal of Science and Research (IJSR)
Secret sharing techniques are required when important and sensible information is transferred from one end to another end. User shares data in form of text and images. ...
These visual cryptographic techniques are having number of controlling parameters like image quality, image height and width while sharing etc. ...
The error diffusion used improves the visual quality of the encrypted shares as well as the decrypted secret image. ...
doi:10.21275/v4i11.nov151285
fatcat:c7da3rplingkhdkpzdfzkvfkfi
Secure System Framework for Secure Visual Cryptography
2015
International Journal of Computer Applications
A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. ...
The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices. ...
We are also thankful to all the staff members of the Department of Computer Engineering for their valuable time, support, comments, suggestions and persuasion. ...
doi:10.5120/19254-0957
fatcat:imrvkppiarg3pi7pgkwefwf5lm
A Review on Visual Secret Sharing Schemes for Binary, Gray & Color Image
2020
Bioscience Biotechnology Research Communications
The aim of this paper is to review and examine numerous existing visual secret sharing schemes, which tries to solve above problems. ...
Cryptography is used to solve some of above problems. Visual Secret Sharing (VSS) schemes capable to handle the problem related with sharing of visual data. ...
The visual secret sharing schemes with meaningful shares are more user-friendly and secure for transmission than noise-like shares thus it encourages to develop algorithm for generation of meaningful shares ...
doi:10.21786/bbrc/13.14/63
fatcat:se4sure4bbh3npqcnvwrbi2dca
Survey Paper on Digital Image Sharing by Diverse Image Media
2016
International Journal of Computer Applications
Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme. ...
In proposed work for regeneration of secret image a generated noisy share, natural images and seed (needed for random functions used) are required at the receiving end. ...
For the evaluation of the display quality of recovered images author consider blackness as one of the performance metric. ...
doi:10.5120/ijca2016908688
fatcat:eey7m52ntfekfn7avradytbp5q
Extended capabilities of feature-extraction for digital image sharing by diverse image media
2016
2016 International Conference on Computing, Analytics and Security Trends (CAST)
In accustomed visual secret sharing algorithm issue like hide secret images in shares that may be printed on transparencies or are encoded and stored in a digital form exist. ...
The shares can be either meaningful images or noise-like pixels, which will definitely arouse suspicion and increase interception threat during transmission of the shares. ...
A construction of EVCS which was realized by embedding the random shares into the meaningful covering shares. A method to revamp the visual quality of the share images. ...
doi:10.1109/cast.2016.7914930
fatcat:r2kzotxav5hm3por7rihlnpuqa
Emerging Trends in Visual Secret Sharing
2018
International Journal of Engineering & Technology
Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device. ...
The chapter has also covered various future enhancements in VC based on cryptanalysis, optimal pixel expansion, multiple secret encoding, progressive VC etc. ...
The visual quality of the recovered secret images will be degraded as the quantity of secret images will be increases. ...
doi:10.14419/ijet.v7i3.12.16110
fatcat:xqb7rxszk5folcoawqquhetaim
A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme
2017
International Journal of Engineering and Technology
Here a new Color Visual Secret Sharing (CVSS)plot is connected to produce shares for input medicinal picture. ...
At first the medicinal picture is part into various shadow pictures and the picture is uncovered when every one of these shadows are stacked together.Performance of the proposed method is evaluated by ...
display quality Several papers investigated meaningful halftone shares [7] - [9] and emphasized the quality of the shares more than the quality of the recovered images. ...
doi:10.21817/ijet/2017/v9i5/170905313
fatcat:ibyst6kyebcuhfmyqbuhstfrba
Extended Capabilities of Feature-Extraction for Digital Image Sharing by Diverse Image Media
2015
International Journal of Science and Research (IJSR)
In accustomed visual secret sharing algorithm issue like hide secret images in shares that may be printed on transparencies or are encoded and stored in a digital form exist. ...
The shares can be either meaningful images or noise-like pixels, which will definitely arouse suspicion and increase interception threat during transmission of the shares. ...
A construction of EVCS which was realized by embedding the random shares into the meaningful covering shares. A method to revamp the visual quality of the share images. ...
doi:10.21275/v4i11.nov151101
fatcat:e6q4jjh75fc3zpi5rkhlh5q5ue
Key based Visual Cryptography Scheme using Novel Secret Sharing Technique with Steganography
2013
IOSR Journal of Electronics and Communication Engineering
So, finally this method will produce meaningful shares and use of secret key will ensure the security of scheme. ...
Visual Cryptography is also one of them which is used to hide secret visual information (such as image, text, etc) in which secret sharing scheme is used. ...
Acknowledgment The authors gratefully acknowledge all those who have helped in making of this review paper successfully. ...
doi:10.9790/2834-0821118
fatcat:jasqtvuz6rh5ngswiggd4cu4cy
A Novel Scheme of Visual Secret Sharing using Privilege Assigned Shares
2018
The Oxford Journal of Intelligent Decision and Data Science
as compared to the recovered image using the traditional Visual Cryptographic schemes. (3) The size of the secret image and the generated share will be same. ...
Various existing Visual Cryptographic Schemes which makes use of traditional concepts of visual cryptography ensures that every share holds the same capability when are superimposed to recover the secret ...
process of decryption and the visual quality of recovered secret image depends on the number of shares which are available for decryption process. ...
doi:10.5899/2018/ojids-00045
fatcat:hi5ma2a3drcvbflna6ywalq4oe
XOR-Based Visual Cryptography
2016
International Journal on Cybernetics & Informatics
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret ...
Visual cryptography scheme is a cryptographic technique which allows visual information.It is solve the poor visual quality problem. XOR-based VC. ...
After the sets of shares are superimposed, this meaningful information disappears andthe secret is recovered. ...
doi:10.5121/ijci.2016.5228
fatcat:trtpzo37cfgkngmqrzwdquykdm
A Survey on Sharing Secret Image using NVSS Scheme
2016
International Journal of Computer Applications
Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more. ...
The the light transmission of constructed shares is greater as compared to earlier technique and also the visual quality of regenerated secrets is better. ...
Table 1 . 1 Comparison of Various VSS Techniques Schemes
Encryption
Techniques
Meaningful shares
Color Secret
Shares
Quality of
recovered image
Pixel Expansion
[3]
Probabilistic
No
No
Recognizable ...
doi:10.5120/ijca2016908154
fatcat:olzewww3lrbspprskwq7hw5zpy
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes
2017
Journal of Software Engineering and Applications
The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed. ...
The two shares are generated based on a private key. At the receiving side, the secret color image is revealed by stacking the two shares and exploiting the human vision system. ...
The scheme improved the quality of the share images and the recovered secret image. ...
doi:10.4236/jsea.2017.101001
fatcat:7ll5dqs475cyra65kpn3rp42ti
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
[chapter]
2012
Lecture Notes in Computer Science
Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. ...
In conjunction, these approaches effectively improve on the perceived visual quality of a recovered visual cryptography image. ...
Since visual cryptography relies on the human visual system to average the black and white pixel contributions of superimposed shares, the perceived visual quality of the recovered image is an extremely ...
doi:10.1007/978-3-642-34129-8_2
fatcat:k6y2gxjrorhldkck6g7rn46sp4
Information Security using Visual Secret Sharing Scheme and Solution to Potential Attacks
2021
International Journal of Computer Applications
The main focus is on better image quality of reconstructed Image and protection from potential attacks on generated shares. ...
This paper discusses many potential attacks on visual secret sharing system and offering more safety than current method. ...
[19] proposed the scheme Block-based Progressive Visual Secret Sharing. The scheme recovers the gray-scale and color images with the contrast of 50% and 25% for noise-like and meaningful shares. ...
doi:10.5120/ijca2021921501
fatcat:fqf76gkkznc7pb5hqkddgw2jce
« Previous
Showing results 1 — 15 out of 13,042 results