Visual Cryptography Scheme: A Review

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Visual cryptography is a technique that encrypts a secret image into n shares with each participant holding one or more shares. Visual cryptography has a number of applications. It is used for transmitting financial documents, banking applications, remote electronic voting applications, sharing secret information, authentication & validation. In day to day life information is increasingly important and gets more value when shared with others. To provide security for sharing information various techniques proposed for the visual cryptography. This proposed work presents a detail survey of different visual cryptography techniques and comparative study of these techniques. In this paper we provide a review of various techniques used for visual cryptography. We discuss various visual cryptography techniques like Halftone Visual Cryptography Scheme, Multiple Secret Sharing Scheme, Extended Visual Cryptography Scheme, Visual secret sharing, Natural Image Based Visual Secret Sharing etc.

Authors and Affiliations

Keywords

Related Articles

Design and Simulations of Solid Oxide Fuel Cell Power System using Three Phase Inverter for Grid Applications

Fuel cell technology is a relatively new energy-saving technology that has the potential to compete with the conventional existing generation facilities. Among the various Distributed Generation or onsite generation or l...

The Way of School Democratization through Topic Work

"The way of school democratizitation through topic work Dr. Shqipe Haxhihyseni (Shyti) Universiteti “A.Moisiu” Durrës Albania The research on this topic is a great achievement in the field of open education, considerin...

Gesture Authentication via Multi-touch Biometrics

A novel authentication mechanism relied upon multi-touch gestures on touch sensitive device are examined in this paper. We defined an approved set of 22 gestures was characterized using movement features of fingers and h...

Socio – Economic Factors that Affect Sorghum Production in Adamawa State, Nigeria

"Abstract The study examines the socio-economic characteristics affecting sorghum production in Adamawa State. Data were collected from 240 farmers with the help of structured schedule, using random and purposive samplin...

CCME & TM Method for WQI Calculations - A Comparison

WQI i.e. water quality index has been calculated on the basis of methods suggested by Tiwari& Mishra (TM) and Canadian Council of Ministers of Environment (CCME) The calculations are based on the studies of parameters fo...

Download PDF file
  • EP ID EP357243
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

(2015). Visual Cryptography Scheme: A Review. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357243