Downloads: 106 | Views: 328
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.6 / 10
Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Abstract: Visual Cryptography is a special encryption technique that encrypts the secrect image into n numbers of shares to hide information in images in such a way that it can be decrypted by the human visual system. It is imperceptible to reveal the secret information unless a certain number of shares (K) or more are superimposed. Simple Visual Cryptography is very insecure. Variable length key based Visual Cryptography for color image uses a varible length Symmetric key based Visual Cryptography scheme for color images where a secrect key is used to encrypt the image and division of the encrypted image is done useing Random Number. Unless the secrect key is known, the original image will not be decrypted. Here secrect key ensures the security of images. The proposed method introduces the concept of above scheme. Encryption process encrypts Original Image using variable length Symmetric key, gives encrypted image. Share generation process divides the encrypted images into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
Keywords: Visual Cryptography VS, Random Numbers, Secret Sharing, Symmetric key
Edition: Volume 4 Issue 5, May 2015
Pages: 2545 - 2549
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Downloads: 107
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1899 - 1902Privacy Preservation in Cloud Using Attribute Based Encryption
T. Arokiaarun, D. Saveetha
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1952 - 1957Navigation Query Security through Privacy Preservation and Cryptography in VANETs
Anuradha T, Saba Tahseen