Security Analysis of Visual Secret Sharing Scheme
Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 1)Publication Date: 2014-01-30
Authors : M.Venkatesh S.Rajesh;
Page : 127-134
Keywords : Visual Cryptography; Multi-Secrete Sharing;
Abstract
Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be encrypted by the human visual system. The benefit of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique needs cryptographic computation to divide the image into a number of parts let n. k-n secret sharing scheme is a special type of Visual Cryptographic technique where at least a group of k shares out of n shares reveals the secret information, less of it will reveal no information. It uses the characteristics of human vision to decrypt the encrypted images. For security, it also ensures that hackers cannot perceive any clues about secret image from individual cover images. The encrypting technologies of traditional cryptography are usually used to protect information security. With such technologies, the data become disordered after being encrypted and can then be recovered by a correct key. Various methods available they are gray level and color images based on studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. WS-VSS schemes for color images that reproduce clearer images with a smaller pixel expansion compared to US-VSS scheme.
Other Latest Articles
- Anti-Phishing Framework for Banking Based on Visual Cryptography
- OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS
- From Pascal’s Triangle to a Mathematical Frontier: Uncovering Hidden Patterns in the Oscillations of Generalized Golden Ratio
- On the Significance of History-Based Research Projects in Undergraduate Mathematics
- Slicing of Software Components Using Object-Oriented Technique
Last modified: 2014-01-26 17:12:56