XOR- Based Secrete Sharing Scheme For Image Database Security: A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 419

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.1 / 10


     

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble


Abstract: Visual cryptography provides secured digital transmission that is employed for just once. The first pictures are often apply by exploitation this theme. It is easy and uncomplicated technique to execute the key image for shadow pictures. The shadow pictures are the shrunken version of the first image, during which the key image share is embedded. These are wont to guard the information and secret pictures within the network in order that it's not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow pictures. Once these shadow pictures are distributed within the original image. Convalescent of secret image is completed by human sensory system by spile all the shadow pictures.


Keywords: visual cryptography, random key generator, XOR-encryption, PSNR, Mean square error


Edition: Volume 3 Issue 11, November 2014


Pages: 2062 - 2066



Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Bhagyashree A. Dhamande, Rutuja N. Kamble, "XOR- Based Secrete Sharing Scheme For Image Database Security: A Review", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2062-2066, https://www.ijsr.net/getabstract.php?paperid=OCT141310, DOI: https://www.doi.org/10.21275/OCT141310

Top