Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)Publication Date: 2014-11-05
Authors : Sneha A.Deshmukh; P.B.Sambhare;
Page : 2425-2428
Keywords : Cover image; data hiding; data extraction; Image encryption; Image decryption and Data recovery; DWT;
Abstract
To maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves hiding the data using data hiding algorithm to maintain the images secrecy. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key.
Other Latest Articles
- Range of Some Heavy Metals in Flesh Tissues of Chrysichthys auratus of Jaja Creek, Niger Delta Zone, Nigeria
- Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security
- A Survey of Reactive Routing Protocols for Detection&Prevention of Selective Black-hole Attack in MANET
- Survey of Clustering Schemes in Mobile Ad hoc Networks
- Single Phase to Three Phase Converter with a Variation-Tolerant Phase Shifting Technique by Two Phase Interleaved PFC Boost Converter
Last modified: 2021-06-30 21:12:54