A Review-Substitution Based (2,8) Chaos Secret Image Sharing Scheme in Visual Cryptography
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)Publication Date: 2016-11-05
Authors : Somprabha Verma; Dolly Gautam;
Page : 926-929
Keywords : Index Terms Visual Cryptography Secret Image Sharing Scheme chaotic Map 3D Permutation;
Abstract
Visual Cryptography (VC) is a revolutionary encoding methodology to share the image secret data during a secure means. Secret Image sharing refers to a crypto-logical technique within which secret image is split into variety of share pictures with or while not modification and also the secret image is retrieved by combining all or predefined assortment of share pictures. during this project introduces a (2, 8) secret image sharing theme integration the chaos-based image encoding with secret image sharing. It divides the key image into eight encrypted shares. Combining any 2 or additional shares is in a position to fully reconstruct the key image with none distortion. every image share is simply one pixel larger than the key image in row and column directions. during this project substitution method is using with permutation method which supplies wonderful performance for security of secret image.
Other Latest Articles
- The Influence of Classical Information on Crypto Analysis
- Rank SVM Based Tracking and Mapping Bug Reports to Relevant Files
- A Review on Presentation Slides Generation for Scientific Papers
- A Review for Detection of Distributed DOS Attack in MANET
- FPGA Implementation for Contrast Enhancement in Images Using Xilinx System Generator
Last modified: 2021-07-01 14:47:12