International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 289

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.2 / 10


     

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi


Abstract: A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices. Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side. In the proposed system we apply visual cryptography technique. The image is to be transferred on the network (also known as secret image) is first compressed and then hidden by cover image using LSB technique. To enhance security, additional security measures are applied further to get encrypted image using symmetric key algorithm. The shares are generated from the encrypted image using RNS (Residual Number System) algorithm. Next share stacking procedure is applied using CRT (Chinese Remainder Theorem) algorithm to get final encrypted image at receiver side. Further, decryption of final encrypted image is done by using same algorithm which is used for encryption purpose. By applying this technique security and quality of image is improved and pixel expansion problem will get reduced.


Keywords: Visual Cryptography, Visual Secret Share, Share Stacking, Security


Edition: Volume 3 Issue 12, December 2014


Pages: 2447 - 2449



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ketan Raju Kundiya, Ram B. Joshi, "Enhanced Security Providing using Visual Cryptography", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 2447-2449, https://www.ijsr.net/getabstract.php?paperid=SUB141016

Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article
Top