Visual Cryptography Scheme: A Review

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Visual cryptography is a technique that encrypts a secret image into n shares with each participant holding one or more shares. Visual cryptography has a number of applications. It is used for transmitting financial documents, banking applications, remote electronic voting applications, sharing secret information, authentication & validation. In day to day life information is increasingly important and gets more value when shared with others. To provide security for sharing information various techniques proposed for the visual cryptography. This proposed work presents a detail survey of different visual cryptography techniques and comparative study of these techniques. In this paper we provide a review of various techniques used for visual cryptography. We discuss various visual cryptography techniques like Halftone Visual Cryptography Scheme, Multiple Secret Sharing Scheme, Extended Visual Cryptography Scheme, Visual secret sharing, Natural Image Based Visual Secret Sharing etc.

Authors and Affiliations

Keywords

Related Articles

Non Conventional Methods of Power Generation for Future Power Outage Problems

Non Conventional Methods of Power Generation for Future Power Outage Problems

Various Shape Descriptors in Image Processing – A Review

Images have different features associated to them. Shape is an important visual feature in an image. It plays a vital role in Content Based Image Retrieval (CBIR). There are many shape descriptors that can be used in ima...

The Stability Analysis of the Mathematical Model of Tuberculosis Transmission Dynamics

In this paper, we present the stability analysis of the mathematical model of Tuberculosis transmission dynamics based on SEI model. The analysis is derived from the principles of compartmental modeling showing the rates...

Determining the Efficacy of Combination of Three Ayurvedic Formulations and dhoopana (Medicinal Fumigation) in Prevention of Infections Post Vaginal Delivery with Episiotomy

Abstract- Background -. Sutika paricharya or regimen for the puerperal state, as mentioned in the texts is specifically designed Ayurvedic regimen for restoring the health of the women after the exhausting and laborious...

Reliable ECG Signals Based on GMM for Body Area Network

A distinctive and natural trust region for protected data transportations in wireless healthcare systems such as body area networks is provided by the blood flow system in a humanoid body. Regrettably, biometric signal c...

Download PDF file
  • EP ID EP357243
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

(2015). Visual Cryptography Scheme: A Review. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357243