Survey on Visual Cryptography Schemes

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

Visual cryptography (VC) is a encryption scheme used to share secret image. It encodes image into n shares. These shares are either printed on transparencies or are encoded and stored in a digital form. The shares can look as noise-like pixels or as meaningful images. Decoding does not require all n shares .These shares are printed on transparencies and stacking them top to each other reveal the secret image. In this survey paper, we present the readers a overview of visual cryptography scheme and different approaches of visual cryptography.

Authors and Affiliations

Keywords

Related Articles

A Review of Carrier Based Modulation Techniques

A review of different carrier based pulse width modulation techniques is presented in this paper. These modulation techniques are used for switching the power electronic devices which are used in inverters and converters...

Current Status of e-Agriculture and Global Trends: A Survey Conducted in TransNzoia County, Kenya

Information Technology (IT) has long been viewed as having great potential for improving decision making in agriculture. In all phases of the agricultural industry, information technologies are vital to the management an...

Survey on Document Image Binarization for Degraded Document Images

The Technology is connecting the whole world together by the medium of internet. Each segment of our data is present in the form of digital document. We can able to store, duplicate, and backup our data in digital form....

Carbon Nano Tubes obtained from Plant Based Oil (Nigella sativa) and it’s Hydrogen Storage Capacity

The spray pyrolysis technique of plant based oil i.e. Kalonji seed oil (Nigella sativa) at 800°C temperature under inert gas atmosphere and in presence of Nickel catalyst, carbon nanotubes (CNTs) were obtained. In this p...

Modelling and Analysis of Lattice Towers for Wind Turbines

Towers are the fundamental support structures for wind turbines which give them the suitable height to capture wind. Lattice towers are freestanding framework towers which have found applications in transmission towers,...

Download PDF file
  • EP ID EP339564
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

(2015). Survey on Visual Cryptography Schemes. UNKNOWN, 4(1), -. https://europub.co.uk/articles/-A-339564