XOR- Based Secrete Sharing Scheme For Image Database Security: A Review
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Bhagyashree A. Dhamande; Rutuja N. Kamble;
Page : 2062-2066
Keywords : visual cryptography; random key generator; XOR-encryption; PSNR; Mean square error;
Abstract
Visual cryptography provides secured digital transmission that is employed for just once. The first pictures are often apply by exploitation this theme. It is easy and uncomplicated technique to execute the key image for shadow pictures. The shadow pictures are the shrunken version of the first image, during which the key image share is embedded. These are wont to guard the information and secret pictures within the network in order that it's not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow pictures. Once these shadow pictures are distributed within the original image. Convalescent of secret image is completed by human sensory system by spile all the shadow pictures.
Other Latest Articles
- Comparison of Facts Devices to Relieve Congestion in Deregulated Power Sector by Using Fuzzy Technique
- Isolation of Solanine from Potato Leaves and Evaluation of Its Antimicrobial Activity
- Evaluation of Castor Ecotypes of Selected Regions of the Western Ghats of Karnataka, India through Bio-Chemical Assay
- Optimization Technique for Efficient Dynamic Query Forms with NoSQL
- Numerical Study of Fluid Flow and Heat Transfer over a Circular Tubes Bank of Heat Exchanger with Different Shapes of Vortex Generator
Last modified: 2021-06-30 21:12:54