A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
XOR-Based Visual Cryptography
2016
International Journal on Cybernetics & Informatics
This paper discusses most of the visual cryptography schemes and the performance measures used to evaluate them KEYWORDS Visual cryptography, random grid, pixel expansion, extended visual cryptography, ...
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret ...
This scheme provides meaningful share images but endure pixel expansion problem
RANDOM GRIDS BASED VISUAL CRYPTOGRAPHY Random grid (RG) is a method to implement visual cryptography (VC) without pixel ...
doi:10.5121/ijci.2016.5228
fatcat:trtpzo37cfgkngmqrzwdquykdm
Random grid based visual cryptography using a common share
2015
2015 International Conference on Computing and Network Communications (CoCoNet)
The binary secret image is divided into two share images (random grids) as in (2, 2) visual cryptography scheme. ...
This scheme can be viewed as a modified scheme of (2, 2) random grid based visual cryptography. ...
This paper discusses some visual cryptography schemes that can generate nonexpanded share images. ...
doi:10.1109/coconet.2015.7411259
fatcat:fg7kkf5atvf6fnwvn3wieg37wq
Halftone Image Watermarking based on Visual Cryptography
2012
International Journal of Computer Applications
At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme. ...
In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme. ...
The random numbers are generated to implement the concept of visual cryptography to generate the shares. Step3. ...
doi:10.5120/5805-8010
fatcat:x3v4yqz2qfgardgoarn2s6xuiu
Diverse Visual Cryptography Schemes: A Glimpse
2015
International Journal of Engineering Research and
Keywords -V isual cryptography, Meaningful share, random grid, pixel expansion, extended visual cryptography, progressive visual cryptography. I. ...
There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret ...
Extended Visual Cryptography
3. Halftone Visual Cryptography
4. Recursive Threshold Visual Cryptography Scheme
5. Random Grids based Visual Cryptography
6. Colour Visual Cryptography Schemes
7. ...
doi:10.17577/ijertv4is070265
fatcat:a523fpkzybb3fpjbhjia3ioem4
Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares
2014
International journal of network security and its applications
Four shares are generated out of hierarchical visual cryptography. Any three shares are collectively taken to form the key share. ...
Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography. ...
We are also thankful to all the authors those who contributed in the area of visual cryptography. ...
doi:10.5121/ijnsa.2014.6108
fatcat:wv4hayknw5g4rkpdluohlqskay
Secure System Framework for Secure Visual Cryptography
2015
International Journal of Computer Applications
Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side. ...
General Terms Visual Cryptography Scheme (VCS), LSB technique, RNS (Residual Number System) algorithm, CRT (Chinese Remainder Theorem) algorithm. ...
ACKNOWLEDGMENTS We take this opportunity to thank Ms.H.K.Khanuja for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this paper. ...
doi:10.5120/19254-0957
fatcat:imrvkppiarg3pi7pgkwefwf5lm
Framework for Visual Cryptographic based Encryption and Decryption
2017
International Journal of Computer Applications
A framework for implementation of visual cryptography based on encryption and decryption is presented and implemented. ...
The environmental analysis is done with the help of various types of UML diagrams and then its framework for implementation is designed. ...
Specifically, visual cryptography allows us to effectively and efficiently share secrets between a numbers of trusted parties. As with many cryptographic schemes, trust is the most difficult part. ...
doi:10.5120/ijca2017913485
fatcat:avxmyx6rufayzm5vb2ecfjhyra
Secret Image Enhanced Sharing Using Visual Cryptography
2017
Cybernetics and Information Technologies
To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group to retrieve either only a part or the complete ...
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the ...
Extended VC scheme The traditional VC scheme generates random noisy pixel image shares, which reveal that some secret information is hidden in them. ...
doi:10.1515/cait-2017-0034
fatcat:gdedvlzgnbgb7ntv5dqhx22gkm
A Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography
2012
International Journal of Computer Applications
A distinctive property of visual cryptography scheme is that one can visually, without computation, decode the secret by superimposing shadow images. ...
The visual cryptography scheme is a perfect secure method that encrypts a secret image by breaking it into shadow images. ...
An alternative to encrypt messages is visual cryptography, where the decryption is completely performed by the human visual system. ...
doi:10.5120/4573-6571
fatcat:vfmmmwwz7jcdhepygg4m4vkqee
Error Filtering Schemes for Color Images in Visual Cryptography
2011
International Journal of Advanced Computer Science and Applications
The color visual cryptography methods are free from the limitations of randomness on color images. The two basic ideas used are error diffusion and pixel synchronization. ...
The proposed color image visual cryptic filtering scheme presents a deblurring effect on the non-uniform distribution of visual cryptic share pixels. ...
Using this basic VCS Scheme we can"t completely retrieve the white Secrete pixel which generates loss in contrast. ...
doi:10.14569/ijacsa.2011.021112
fatcat:t5oba53y2rhezogzhdla2yogxq
Visual Cryptography Authentication for Locker Systems using Biometric Input
2015
International Journal of Computer Applications
This project aims to implement visual cryptography and biometric authentication to build a secure locker system. ...
Visual Cryptography is an encryption technique that hides information in the images such that it can be decrypted by the human vision if the correct key image is used. ...
Various Visual Cryptography Schemes Various schemes proposed for implementing Visual Cryptography in images are as follows:
Visual Secret Sharing Scheme (VSSS) In 1994 Naor and Shamir [4] proposed ...
doi:10.5120/ijca2015906855
fatcat:uxhlm5fyozhq7mqf6vosqkq3ze
Smart Joint Bank Locker Operation using Visual Cryptography
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Visual cryptography (VC) hides the details of the image used as a key by generating shares. Image steganography embeds the shares with a cover image, which ensures secure storage of the shares. ...
To avoid using the manual operation of keys, a visual cryptographic scheme is proposed to operate the vaults using shares. ...
Thus the method warranties complete security using visual cryptography, steganography, unique share generation method.
V. ...
doi:10.35940/ijitee.j9714.0881019
fatcat:45tmtkreg5bmxmowqb6qx2isia
Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme
2016
Procedia Computer Science
It results in need of robust security services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network. ...
The generated shares have a best quality so that human brain can't predict the original secret by any combination. ...
A (t, n) visual cryptography scheme with unlimited n is proposed to reduce the overhead of generating and distributing transparencies. ...
doi:10.1016/j.procs.2016.02.032
fatcat:mg2kvrw74fhxheregsstwef3qa
A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
2016
International Journal of Computer Applications
Proposed scheme can verify the share using steganography and then use XOR visual cryptography for share generation, by using this scheme preventing the misuse of adversaries. ...
Visual cryptography is a technique which is beneficial for defense and security. ...
The visual cryptography scheme is to divide a secret image into random shares, which reveal no information about The Visual Cryptography scheme is same like a secret sharing scheme to divide a secret image ...
doi:10.5120/ijca2016908101
fatcat:4z3icra33rhzzl7pk6d6gjc2ua
Secret sharing scheme Circular Visual Cryptography for Color Images
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Visual Cryptography Scheme (VCS) is one of the procedures to verify the data utilizing straightforward calculation while in some other security method complex calculation was utilized. ...
The unscrambling procedure is finished utilizing the Human Visual Scheme (HVS). ...
PSNR
The greater security level is expanded by the Circular VCS Scheme. To verify Binary, Gray and Color Image with proposed Circular Random network-based Visual Cryptography. ...
doi:10.32628/cseit11953131
fatcat:scebafui3nbrjdve26l4vyduhm
« Previous
Showing results 1 — 15 out of 5,545 results