A Three Way Visual Cryptography & its Application in biometric Security : A Review

Abstract

Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images.

Authors and Affiliations

Mr. Praveen Chouksey, Mr. Reetesh. Rai

Keywords

Related Articles

Evaluation of Critical Success Factor in Construction Industry

The maіn objectіve of project management іs to ascertaіn success of the construction project and identification of the paramount factors whіch play a vіtal role іn the prosperіty of the project. However, to identify the...

PC Monitoring using Android over Internet

Since there are much application available for remote monitoring between computer to computer but In this application we are doing remote monitoring between mobile phone and computer. Basically nowadays we see that in m...

slugMR Brain Image Segmentation Based on Principle Component Analysis and Self-Organizing Map

In this paper, a fully unsupervised segmentation of Magnetic Resonance (MR) brain image is presented, which is based on a competitive learning algorithm- Self Organizing Map (SOM). We tried to address the problem of se...

Implementation on Data Cleaning for RFID and WSN Integration

Today’s manufacturing environments are very dynamic and turbulent. Wireless Sensor Network (WSN) and Radio Frequency Identification (RFID) integration is a developing innovation which utilizes focal points of the both f...

slugCalculating Threshold Current Density and Output Power of Vertical Cavity Surface Emitting Laser

In this paper, threshold current density and output power of the vertical cavity surface emitting laser is analytically calculated as a function of different electrical and optical parameters, and their interdependency...

Download PDF file
  • EP ID EP20415
  • DOI -
  • Views 296
  • Downloads 4

How To Cite

Mr. Praveen Chouksey, Mr. Reetesh. Rai (2015). A Three Way Visual Cryptography & its Application in biometric Security : A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk/articles/-A-20415