A Comprehensive Study on Visual Cryptography
Keywords:
Algorithm, Mathematical, Security, TechniquesAbstract
This article is a deal with the Review study of visual cryptography there is a need for study. The information helps the mathematician, computer engineers, Academicians’ and researchers for better understanding of data whenever it is required. So for this a study is made on the basis of secondary data. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography is a new technique which provides information security which uses simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows Visual information like pictures, text. to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. . In this paper we provide an overview of the emerging Visual Cryptography (VC) and related security. Research work done in this area.
References
. mizuho nakajima,yasushi yamaguchi. extended visual cryptography for natural images.
. Jagdeep Verma, Dr.Vineeta Khemchandani, A Visual Cryptographic Technique to Secure Image Shares, International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb 2012, pp.1121-1125.
. Chih-Ming Hu and Wen-Guey Tzeng Cheating Prevention in Visual Cryptography, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 1, JANUARY 2007 pp 36-47.
. Nayan A. Ardak Prof. Avinash Wadhe, Visual Cryptography Scheme for Privacy Protection, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2026-2029.
. A (2, n) visual cryptographic technique for banking applications, Jayanta Kumar Pal, J. K. Mandal2 and Kousik and Dasgupta, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010, pp:118-127.
. Gaurav Palande, Shekhar Jadhav, Ashutosh Malwade, Vishal Divekar, Prof. S. Baj, March 2014 An Enhanced Anti-Phishing Framework Based on Visual Cryptography, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-3),
. Md. Tanbin Islam Siyam, Kazi Md. Rokibul Alam and Tanveer Al Jami, An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications, International Journal of Computer Applications (0975 – 8887) Volume 65–No.6, March 2013.
. Puja Devi Rana*, Anita Singhrova**, Suman Deswal, Design and Implementation of K-Split Segmentation Approach for Visual Cryptography, International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012 1 ISSN 2250-3153,
. Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli, visual cryptography for print and scan applications.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.