A Comprehensive Study on Visual Cryptography

Authors

  • Lakshmi MS post P.G student of Andhra university dept of (CSC) and lecturer at Aditya Degree College Kakina da E.G.Dt, Andhra Pradesh INDIA
  • Raju GL Post P.G. Student of JNTU-K dept of (CSE) and lecturer at Aditya Degree College Kakinada E.G.Dt, Andhra Pradesh, INDIA

Keywords:

Algorithm, Mathematical, Security, Techniques

Abstract

This article is a deal with the Review study of visual cryptography there is a need for study. The information helps the mathematician, computer engineers, Academicians’ and researchers for better understanding of data whenever it is required. So for this a study is made on the basis of secondary data. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information like pictures, text. to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. . In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security. Research work done in this area.

References

. mizuho nakajima,yasushi yamaguchi. extended visual cryptography for natural images.

. Jagdeep Verma, Dr.Vineeta Khemchandani, A Visual Cryptographic Technique to Secure Image Shares, International Journal of

Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb 2012, pp.1121-1125.

. Chih-Ming Hu and Wen-Guey Tzeng Cheating Prevention in Visual Cryptography, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 1, JANUARY 2007 pp 36-47.

. Nayan A. Ardak Prof. Avinash Wadhe, Visual Cryptography Scheme for Privacy Protection, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2026-2029.

. A (2, n) visual cryptographic technique for banking applications, Jayanta Kumar Pal, J. K. Mandal2 and Kousik and Dasgupta, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010, pp:118-127.

. Gaurav Palande, Shekhar Jadhav, Ashutosh Malwade, Vishal Divekar, Prof. S. Baj, March 2014 An Enhanced Anti-Phishing Framework Based on Visual Cryptography, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-3),

. Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam and Tanveer Al Jami, An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications, International Journal of Computer Applications (0975 – 8887) Volume 65–No.6, March 2013.

. Puja Devi Rana*, Anita Singhrova**, Suman Deswal, Design and Implementation of K-Split Segmentation Approach for Visual Cryptography, International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 1 ISSN 2250-3153,

. Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli, visual cryptography for print and scan applications.

Downloads

Published

2024-02-26

How to Cite

Lakshmi, M. S., & Raju, G. L. (2024). A Comprehensive Study on Visual Cryptography. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(08), 1065–1069. Retrieved from https://ijact.in/index.php/j/article/view/187

Issue

Section

Review Article

Similar Articles

<< < 22 23 24 25 26 27 28 29 30 31 > >> 

You may also start an advanced similarity search for this article.