A Three Way Visual Cryptography & its Application in biometric Security : A Review

Abstract

Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images.

Authors and Affiliations

Mr. Praveen Chouksey, Mr. Reetesh. Rai

Keywords

Related Articles

Piezoelectric Energy Harvesting in Roadways and Railways

Electricity has become major need nowadays and everyday a new research is conducted to find alternate sources of energy mostly focussed on non-conventional sources of energy. Nearly every aspect of our lives relies on u...

Comparison of Different De-Interlacing Algorithms Using Fuzzy Logic

Video processing is a special case of signal processing. These video processing techniques are used in television sets, DVDs, video players and other devices. Digital video is a representation of moving visual images in...

Performance Enhancement of Domestic Refrigerator Using Hydrocarbon Mixture R-436A as Refrigerant

Domestic refrigerators use R-12 and R-134a as refrigerants because these gases have excellent thermodynamic properties. According to MONTREAL and KYOTO protocols, R-12 should have been phased out by 2010 and the consump...

Optimization of machining parameters in wire electrical discharge machine process by combination of genetic algorithm and artificial neural network

Wire electrical discharge machining (WEDM) has become an important non-traditional machining process. Wire Electrical discharge machining (WEDM) process, at present is still an experience process, wherein selected param...

Improving Copy-Move Forgery Detection Time by Using DCT, Correlation and SOBEL Edge Detector

Copy move image forgery is often used in which region of an image is copied and pasted at another location to hide an important scene, clone or duplicate the number of aspects in the same image. Block representing have...

Download PDF file
  • EP ID EP20415
  • DOI -
  • Views 297
  • Downloads 4

How To Cite

Mr. Praveen Chouksey, Mr. Reetesh. Rai (2015). A Three Way Visual Cryptography & its Application in biometric Security : A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk/articles/-A-20415