ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 11)

Publication Date:

Authors : ; ;

Page : 2425-2428

Keywords : Cover image; data hiding; data extraction; Image encryption; Image decryption and Data recovery; DWT;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

To maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves hiding the data using data hiding algorithm to maintain the images secrecy. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key.

Last modified: 2021-06-30 21:12:54