Downloads: 134 | Views: 285
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.4 / 10
Exploration of Color Visual Cryptography Schemes
Jinu Mohan, Dr. Rajesh.R
Abstract: Secret sharing is a method for distributing a secret among a group of participants. Visual Cryptography is a form of Visual Secret Sharing proposed by Moni Naor and Adi Shamir. Visual Cryptography Schemes hide the secret image into two or more images which are called shares. The secret image can be recovered simply by stacking the shares together without any complex computation involved. Color Visual Cryptography encrypts a color secret message into color halftone image shares. In this paper the various Visual Cryptography schemes are discussed and try to summarize the recent developments in Color Visual Cryptography technology.
Keywords: Visual Cryptography, Color Visual Cryptography, Halftone Technique, Color Decomposition, Meaningful Shares
Edition: Volume 4 Issue 7, July 2015
Pages: 1033 - 1038
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar