Visual Cryptography Scheme: A Review
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Anjali Maharudra Bhunje; Premanand K. Kadbe;
Page : 1309-1311
Keywords : Information security; Secret sharing scheme; Visual Cryptography; Data hiding; Transmission risk; Natural images;
Abstract
Visual cryptography is a technique that encrypts a secret image into n shares with each participant holding one or more shares. Visual cryptography has a number of applications. It is used for transmitting financial documents, banking applications, remote electronic voting applications, sharing secret information, authentication& validation. In day to day life information is increasingly important and gets more value when shared with others. To provide security for sharing information various techniques proposed for the visual cryptography. This proposed work presents a detail survey of different visual cryptography techniques and comparative study of these techniques. In this paper we provide a review of various techniques used for visual cryptography. We discuss various visual cryptography techniques like Halftone Visual Cryptography Scheme, Multiple Secret Sharing Scheme, Extended Visual Cryptography Scheme, Visual secret sharing, Natural Image Based Visual Secret Sharing etc.
Other Latest Articles
- Chemical Reaction and Radiation Effects on Unsteady MHD Natural Convection Flow of a Rotating Fluid Past a Vertical Porous Flat Plate in the Presence of Viscous Dissipation
- Underwater Signal Processing Techniques for Sediment Classification
- Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique
- Experimental Investigation on Surface Roughness in Finish Turning of EN 8 Steel
- Characteristic Study of Rapid Prototyped Parts at Different Build Orientation
Last modified: 2021-06-30 21:34:49