Securing Digital Images Using visual Cryptography

Abstract

Visual cryptography technique allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. Security has become an inseparable issue as Information Technology is ruling the world now. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography can be applied for copy right for images, access control to user images ,visual authentication and identification any kind images of images like(normal or digital).Visual cryptography is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information (pictures, text, etc)to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking sufficient number of shares reveals the secret image. Shares are visually presented in transparencies.

Authors and Affiliations

Kirti P. Sahare

Keywords

Related Articles

Outlier Detection and Analysis using Hybrid Approach for Mixed datasets

There are several approaches of outlier detection employed in many study areas amongst which distance based and density based outlier detection techniques have gathered most attention of researchers.So we are using hybri...

Physico-Chemical Characterization of Ground Water, Case Study of Okene, North Central Nigeria

Okene is fast becoming an urban city and the search for groundwater is ever on the increase. Peoples resulted to drilling of boreholes in order to supplement the earth dam that has served as the only source of water for...

A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering

Cloud is huge platform that provides various services its users such as, storage, management, maintain, searching, sorting of data etc. With this advantages data owner outsourced their data in cloud. Before outsourcing o...

Wireless Transmission of Power

This article gives you information about the wireless transmission of power (Witricity). This may look futuristic but this technology makes future free of chargers, wires, Cables etc, Like Wi-Fi zones there will be elect...

A Comparison Study of Non-Standard Analysis and Non-Archimedean Ultrametric Theory

Infinitesimal elements are mainly considered in non-standard analysis. Recently a new scale free analysis has been developed using the concept of relative infinitesimals, scale free infinitesimals and their corresponding...

Download PDF file
  • EP ID EP242713
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

Kirti P. Sahare (2015). Securing Digital Images Using visual Cryptography. International journal of Emerging Trends in Science and Technology, 2(12), 3410-3414. https://europub.co.uk/articles/-A-242713