Comparative Study of Various Visual Cryptography Techniques to Analyze the Quality of Reconstruction

Abstract

Visual cryptography is one among the cryptographic techniques available, where the secret information is encrypted by giving a key. The secret image will be encrypted into n number of shares. By stacking the shares, the original secret image is decrypted. Here, decryption uses human eyes to recover the secret image without any complex decryption algorithm. Visual cryptography is unique way to protect secrets. This paper compares various algorithms used in visual cryptography in terms of quality, security and size of the recovered image.

Authors and Affiliations

T. Ambritha, J. Poorani Sri, J. Jessintha Jebarani, M. Pradhiba Selvarani

Keywords

Related Articles

Review: Efficient Spam Detection on Social Network

With the rapid growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit...

Closing the Location of IP Spoofers Using Greedy Algorithm

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or impr...

Automation System for Household Electronic Devices Using Touch Interface

Today, we face a lot of problems when it comes to household circuits. For example, if the Air Conditioner is set for three hours in the night time and once it switches off, the person has to wake up and turn on the fan....

Distance Protection Scheme for Transmission Lines

This paper presents a protection scheme for transmission lines using the principle of distance relay. Even though many schemes exist for the protection of transmission lines, distance protection scheme is optimal due to...

Smart Grid Management Using Big Data In Cloud

Smart grid is a technological innovation that improves efficiency, reliability, and sustainability of electricity services. The main challenges of smart grids are how to manage different types of front-end intelligent d...

Download PDF file
  • EP ID EP22006
  • DOI -
  • Views 200
  • Downloads 7

How To Cite

T. Ambritha, J. Poorani Sri, J. Jessintha Jebarani, M. Pradhiba Selvarani (2016). Comparative Study of Various Visual Cryptography Techniques to Analyze the Quality of Reconstruction. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(4), -. https://europub.co.uk/articles/-A-22006