Visual Cryptographic Applications
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 6
Abstract
Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secrets is then divided into different parts based on the pixel of the digital secret. These parts are called shares. The shares are then overlapped correctly to visualize the secret. This paper shows the different applicable areas of Visual Cryptography.
Authors and Affiliations
Anushree Suklabaidya , G. Sahoo
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
The problem of the knowledge acquisition and efficient knowledge exploitation is very popular also in agriculture area. One of the methods for knowledge acquisition from the existing agricultural databases is the methods...
Various Schemes to Speed up the PC during Virus Scan
The current threat landscape is changing and we have seen a large volume of new viruses captured by security vendors each day. Customers always complain that anti-virus software slow down their computers by consuming muc...
Problem Analysis of Routing Protocols in MANET in Constrained Situation
A Mobile Ad-hoc network (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network hav...
Generating Customer Profiles for Retail Stores Using Clustering Techniques
The retail industry collects huge amounts of data on sales, customer buying history, goods transportation, consumption, and service. With increased availability and ease of use of modern computing technology and e-commer...
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different technique...