Filters








5,545 Hits in 5.9 sec

XOR-Based Visual Cryptography

Nidhin Soman, Smruthy Baby
2016 International Journal on Cybernetics & Informatics  
This paper discusses most of the visual cryptography schemes and the performance measures used to evaluate them KEYWORDS Visual cryptography, random grid, pixel expansion, extended visual cryptography,  ...  There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret  ...  This scheme provides meaningful share images but endure pixel expansion problem RANDOM GRIDS BASED VISUAL CRYPTOGRAPHY Random grid (RG) is a method to implement visual cryptography (VC) without pixel  ... 
doi:10.5121/ijci.2016.5228 fatcat:trtpzo37cfgkngmqrzwdquykdm

Random grid based visual cryptography using a common share

Sruthy K Joseph, Ramesh R
2015 2015 International Conference on Computing and Network Communications (CoCoNet)  
The binary secret image is divided into two share images (random grids) as in (2, 2) visual cryptography scheme.  ...  This scheme can be viewed as a modified scheme of (2, 2) random grid based visual cryptography.  ...  This paper discusses some visual cryptography schemes that can generate nonexpanded share images.  ... 
doi:10.1109/coconet.2015.7411259 fatcat:fg7kkf5atvf6fnwvn3wieg37wq

Halftone Image Watermarking based on Visual Cryptography

Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar
2012 International Journal of Computer Applications  
At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme.  ...  In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme.  ...  The random numbers are generated to implement the concept of visual cryptography to generate the shares. Step3.  ... 
doi:10.5120/5805-8010 fatcat:x3v4yqz2qfgardgoarn2s6xuiu

Diverse Visual Cryptography Schemes: A Glimpse

Sruthy K Joseph, Ramesh R
2015 International Journal of Engineering Research and  
Keywords -V isual cryptography, Meaningful share, random grid, pixel expansion, extended visual cryptography, progressive visual cryptography. I.  ...  There are diverse visual cryptography schemes developed based on different factors like pixel expansion, meaningless or meaningful shares, contrast, security, type of secret image and the number of secret  ...  Extended Visual Cryptography 3. Halftone Visual Cryptography 4. Recursive Threshold Visual Cryptography Scheme 5. Random Grids based Visual Cryptography 6. Colour Visual Cryptography Schemes 7.  ... 
doi:10.17577/ijertv4is070265 fatcat:a523fpkzybb3fpjbhjia3ioem4

Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares

Pallavi Vijay Chavan, Mohammad Atique, Latesh Malik
2014 International journal of network security and its applications  
Four shares are generated out of hierarchical visual cryptography. Any three shares are collectively taken to form the key share.  ...  Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography.  ...  We are also thankful to all the authors those who contributed in the area of visual cryptography.  ... 
doi:10.5121/ijnsa.2014.6108 fatcat:wv4hayknw5g4rkpdluohlqskay

Secure System Framework for Secure Visual Cryptography

Ketan RajuKundiya, Ram B. Joshi
2015 International Journal of Computer Applications  
Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side.  ...  General Terms Visual Cryptography Scheme (VCS), LSB technique, RNS (Residual Number System) algorithm, CRT (Chinese Remainder Theorem) algorithm.  ...  ACKNOWLEDGMENTS We take this opportunity to thank Ms.H.K.Khanuja for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this paper.  ... 
doi:10.5120/19254-0957 fatcat:imrvkppiarg3pi7pgkwefwf5lm

Framework for Visual Cryptographic based Encryption and Decryption

Saumya Awasthi, Ajay Pratap, Romesh Srivastava
2017 International Journal of Computer Applications  
A framework for implementation of visual cryptography based on encryption and decryption is presented and implemented.  ...  The environmental analysis is done with the help of various types of UML diagrams and then its framework for implementation is designed.  ...  Specifically, visual cryptography allows us to effectively and efficiently share secrets between a numbers of trusted parties. As with many cryptographic schemes, trust is the most difficult part.  ... 
doi:10.5120/ijca2017913485 fatcat:avxmyx6rufayzm5vb2ecfjhyra

Secret Image Enhanced Sharing Using Visual Cryptography

K. Brindha, N. Jeyanthi
2017 Cybernetics and Information Technologies  
To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group to retrieve either only a part or the complete  ...  In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the  ...  Extended VC scheme The traditional VC scheme generates random noisy pixel image shares, which reveal that some secret information is hidden in them.  ... 
doi:10.1515/cait-2017-0034 fatcat:gdedvlzgnbgb7ntv5dqhx22gkm

A Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography

B. Padhmavathi, P. Nirmal Kumar, M. A. Dorai Rangaswamy
2012 International Journal of Computer Applications  
A distinctive property of visual cryptography scheme is that one can visually, without computation, decode the secret by superimposing shadow images.  ...  The visual cryptography scheme is a perfect secure method that encrypts a secret image by breaking it into shadow images.  ...  An alternative to encrypt messages is visual cryptography, where the decryption is completely performed by the human visual system.  ... 
doi:10.5120/4573-6571 fatcat:vfmmmwwz7jcdhepygg4m4vkqee

Error Filtering Schemes for Color Images in Visual Cryptography

Shiny Malar, Jeya Kumar
2011 International Journal of Advanced Computer Science and Applications  
The color visual cryptography methods are free from the limitations of randomness on color images. The two basic ideas used are error diffusion and pixel synchronization.  ...  The proposed color image visual cryptic filtering scheme presents a deblurring effect on the non-uniform distribution of visual cryptic share pixels.  ...  Using this basic VCS Scheme we can"t completely retrieve the white Secrete pixel which generates loss in contrast.  ... 
doi:10.14569/ijacsa.2011.021112 fatcat:t5oba53y2rhezogzhdla2yogxq

Visual Cryptography Authentication for Locker Systems using Biometric Input

Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru
2015 International Journal of Computer Applications  
This project aims to implement visual cryptography and biometric authentication to build a secure locker system.  ...  Visual Cryptography is an encryption technique that hides information in the images such that it can be decrypted by the human vision if the correct key image is used.  ...  Various Visual Cryptography Schemes Various schemes proposed for implementing Visual Cryptography in images are as follows: Visual Secret Sharing Scheme (VSSS) In 1994 Naor and Shamir [4] proposed  ... 
doi:10.5120/ijca2015906855 fatcat:uxhlm5fyozhq7mqf6vosqkq3ze

Smart Joint Bank Locker Operation using Visual Cryptography

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Visual cryptography (VC) hides the details of the image used as a key by generating shares. Image steganography embeds the shares with a cover image, which ensures secure storage of the shares.  ...  To avoid using the manual operation of keys, a visual cryptographic scheme is proposed to operate the vaults using shares.  ...  Thus the method warranties complete security using visual cryptography, steganography, unique share generation method. V.  ... 
doi:10.35940/ijitee.j9714.0881019 fatcat:45tmtkreg5bmxmowqb6qx2isia

Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme

Supriya Narad, Pallavi Chavan
2016 Procedia Computer Science  
It results in need of robust security services and schemes. This paper proposes the Shamir Secret Sharing Scheme along with Cascade forward back propagation neural network.  ...  The generated shares have a best quality so that human brain can't predict the original secret by any combination.  ...  A (t, n) visual cryptography scheme with unlimited n is proposed to reduce the overhead of generating and distributing transparencies.  ... 
doi:10.1016/j.procs.2016.02.032 fatcat:mg2kvrw74fhxheregsstwef3qa

A Secure and Verifiable Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Shubhangi Khairnar, Reena Kharat
2016 International Journal of Computer Applications  
Proposed scheme can verify the share using steganography and then use XOR visual cryptography for share generation, by using this scheme preventing the misuse of adversaries.  ...  Visual cryptography is a technique which is beneficial for defense and security.  ...  The visual cryptography scheme is to divide a secret image into random shares, which reveal no information about The Visual Cryptography scheme is same like a secret sharing scheme to divide a secret image  ... 
doi:10.5120/ijca2016908101 fatcat:4z3icra33rhzzl7pk6d6gjc2ua

Secret sharing scheme Circular Visual Cryptography for Color Images

Sudhir Parmar, Sheshang D. Degadwala
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Visual Cryptography Scheme (VCS) is one of the procedures to verify the data utilizing straightforward calculation while in some other security method complex calculation was utilized.  ...  The unscrambling procedure is finished utilizing the Human Visual Scheme (HVS).  ...  PSNR The greater security level is expanded by the Circular VCS Scheme. To verify Binary, Gray and Color Image with proposed Circular Random network-based Visual Cryptography.  ... 
doi:10.32628/cseit11953131 fatcat:scebafui3nbrjdve26l4vyduhm
« Previous Showing results 1 — 15 out of 5,545 results