Securing and Secrete Image Sharing Using Visual Cryptography Scheme

Abstract

To verify identity of person his /her physical or behavioural characteristics can be use,this strategy is called as Biometrics. Preservation of privacy of digital biometric data such as iris,face images etc. which stored in central database becomes more essential. This paper introduced the new visual cryptographic technique that allows encryption of visual information such that decryption can perform using human visual system hence cryptography computation does not required any extra hardware and software. In visual cryptography secrete image is encrypted into number of shares which independently can not reveal information about original image. For getting information about original image all sheets must be available simultaneously.

Authors and Affiliations

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase

Keywords

Related Articles

Managing Object Oriented Software Understandability: A Design Perspective

Estimating understandability of object oriented software early in the development process; particularly at design phase greatly reduce the overall development cost and effort. To design and deliver quality products insid...

Perception of Undergraduate Students towards Use of Digital Technology in Mathematics Education

Digital Technology has been a boon, especially in the field of education. Being one of the mot efficient ways of supplementing the traditional teaching-learning process, it has rightfully become one of the most important...

Performance Analysis of FSO Link in Monsoon (Rainy) Season in Delhi, India

In this paper, we present a comprehensive survey of attenuation due to rain conditions in the months of monsoon in Delhi region. In this paper I used Marshal and Palmer rain distribution model for four specific months of...

An Induction Generator based AC/DC Hybrid Electric Power Generation System for Additional Electrically Powered Airliner

For an additional aircraft power system, both AC and DC power having high voltage levels are required. with various flight loads. This paper introduces an induction generator based on AC / DC hybrid MEA power generation...

Big Data Analysis: Concepts, Challenges And Opportunities

Big Data has the potential to bring valued insights for advanced decision making. It has become a trending practice to adopt Big Data into their process. It has attracted both the academicians as well as the industry peo...

Download PDF file
  • EP ID EP749010
  • DOI -
  • Views 36
  • Downloads 0

How To Cite

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase (2015). Securing and Secrete Image Sharing Using Visual Cryptography Scheme. International Journal of Innovative Research in Computer Science and Technology, 3(1), -. https://europub.co.uk/articles/-A-749010