Visual Cryptographic Applications

Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 6

Abstract

Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secrets such as printed or pictures, etc. These secrets are fed into the system in a digital (image) form. The digital form of the secrets is then divided into different parts based on the pixel of the digital secret. These parts are called shares. The shares are then overlapped correctly to visualize the secret. This paper shows the different applicable areas of Visual Cryptography.

Authors and Affiliations

Anushree Suklabaidya , G. Sahoo

Keywords

Related Articles

Cloud Computing: A solution to Geographical Information Systems (GIS) Cloud Computing and GIS

Geographical Information Systems or Geospatial Information Systems (GIS) is a collection of tools that captures, stores, analyzes, manages, and presents data that are linked to geographical locations. GIS plays an essent...

Ruling the Remoteness of Associates and Kin Using Cellular hone with Latitude Radius Algorithm

LBS are the mobile services in which the user location nformation is used to provide a service. Providing Location Based Service (LBS) using Global Positioning System (GPS) as a location provider. The main objective of...

Improved Optimal Competitive Hopfield Network for the Maximum Stable Set Problem

A large number of problems in artificial intelligence and other areas of computer science can be viewed as special cases of the Maximum Stable Set Problem (MSSP). In this paper, we propose a new approach to solve the MSS...

Implementation of Multiplatform RIA using User Interface Components

Abstract—Nowadays, there are a growing number of Web 1.0 applications that are migrating towards Web 2.0 User Interfaces, in search of multimedia support and higher levels of interaction among other features. These We...

Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network

Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the Nneighbors using proactive...

Download PDF file
  • EP ID EP151449
  • DOI -
  • Views 135
  • Downloads 0

How To Cite

Anushree Suklabaidya, G. Sahoo (2013). Visual Cryptographic Applications. International Journal on Computer Science and Engineering, 5(6), 455-464. https://europub.co.uk/articles/-A-151449