Downloads: 129 | Views: 294
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.4 / 10
A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme
Harshal S. Tekade, Dr. Baisa L. Gunjal
Abstract: Secret sharing techniques are required when important and sensible information is transferred from one end to another end. User shares data in form of text and images. There are lots of techniques for secrete text sharing like encryption of text and sharing keys of decryption, hide text behind particular image known as steganography etc. When particular user wants to share image with another user then visual cryptography techniques are applied for sharing. Basic visual cryptography involves two images. After overlapping of these images properly, user will get secrete image. Among these two images, one image containing random pixels and another information contains secrete information. Required information cannot be retrieved unless and until both images are overlapped properly. User can print these images on semitransparent papers and later they can overlap it manually which is one of the advantages. These visual cryptographic techniques are having number of controlling parameters like image quality, image height and width while sharing etc. In this visual cryptography decoding part is done by human visual system without any computation. This visual cryptography can be extended by increasing the overlapping layers. By working on unfocused areas of this visual cryptography like maintaining contrast of reconstructed image, increase in size of original image, additional processing for colored images etc.
Keywords: Visual cryptography, steganography, decryption, secrete sharing, overlapping
Edition: Volume 4 Issue 11, November 2015
Pages: 935 - 937
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 11, November 2024
Pages: 404 - 406Comparative Analysis of Open-Source Encryption Tools: GnuPG vs. VeraCrypt
Ravi Kumar Singh, Vikalp, Dushyant Sharma, Aditya Pandey
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 772 - 776Cryptographic Algorithm to Augment Data Security
Vipin R Bharadwaj, Nalina V, Rithvik Mohan V
Downloads: 12 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021
Pages: 788 - 791A New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas