A Three Way Visual Cryptography & its Application in biometric Security : A Review

Abstract

Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images.

Authors and Affiliations

Mr. Praveen Chouksey, Mr. Reetesh. Rai

Keywords

Related Articles

Electric Power Generation Using Refrigeration Waste Heat

Electricity is most important one of the human life and industries. But the available energy is very less. Today the demand of energy is increasing tremendously, but available energy lacks in supply. This problem is ove...

Implementation of Active Relay Node for Efficient Path Planning In Intelligent VANET Communication System

Vehicular Ad hoc Networks (VANET) consists of radio-equipped vehicles and roadside units (RSU) and support many safety and commercial applications. Multi-hop forwarding can extend the communication range of both RSUs an...

Experimental Investigation on Elastic Properties of Concrete Incorporating GGBFS

Concrete is the most widely used man made construction material in the construction field all over the world. Concrete is made up of fine aggregates, coarse aggregate, cement and water for hydration of cement. Fine aggr...

Fuzzy Based PFC Bridgeless Dual Converter Fed BLDC Motor Drive

This paper shows another PFC bridgeless (BL) buck–boost converter for brushless direct current (BLDC) engine drive application in low-control applications. A Fuzzy logic execution in adaptable speed control of BLDC engi...

Synthesis of Furfural from Corn Cobs by Using Membrane Technology

Today all major companies used furfural as a selective solvent in refining of lubricating oil. Furfural is produced from agricultural waste biomass that contain pentosans, which are aldose sugars, composed of small ring...

Download PDF file
  • EP ID EP20415
  • DOI -
  • Views 221
  • Downloads 4

How To Cite

Mr. Praveen Chouksey, Mr. Reetesh. Rai (2015). A Three Way Visual Cryptography & its Application in biometric Security : A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk/articles/-A-20415