Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Survey of Cheating Prevention Techniques in Visual Cryptography
Smita Patil, Jyoti Rao
Visual cryptography (VC) is a technique of encoding a secret image into share images such that stacking a sufficient number of shares reveals the original secret image. Shares are generally presented in transparencies. So each participant holds a transparency. The original secret image is recovered after superimposing the transparencies one to other. Basically; the performance of visual cryptography scheme depends on different measures; like pixel expansion; security; contrast; computational complexity; accuracy; share generated; number of secret images and type of secret images encrypted by the scheme. Most of the prior research work on VC focuses on improving two parameters: pixel expansion and contrast. Visual cryptography (VC) has numerous applications; such as authentication and identification; steganography; and image encryption. Horng et al. showed that cheating is possible in VC; where some participants can betray the remaining participants by fake transparencies. So; designing cheating-prevention visual secret-sharing (CPVSS) schemes has been proposed by many researchers to overcome cheating problem from existing VC. Intent of this paper is on study and performance analysis of the cheating prevention visual cryptography schemes and cheating problem in VC and extended VC.
Keywords: Cheat-preventing scheme, cheating, secret sharing, visual cryptography, Security
Edition: Volume 3 Issue 6, June 2014
Pages: 560 - 563
How to Cite this Article?
Smita Patil, Jyoti Rao, "Survey of Cheating Prevention Techniques in Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014135, Volume 3 Issue 6, June 2014, 560 - 563
107 PDF Views | 83 PDF Downloads
Similar Articles with Keyword 'cheating'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 560 - 563Survey of Cheating Prevention Techniques in Visual Cryptography
Smita Patil, Jyoti Rao
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1705 - 1709Optimization of an Error Minimizing or Localizing Jammers in Wireless Networks
S. Rajeswari
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2425 - 2428Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme
Sneha A.Deshmukh, P.B.Sambhare
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018
Pages: 1000 - 1004Cloud Data Auditing Techniques with a Focus on Privacy and Security
Vardireddy Harish Kumar Reddy, K. Sashi Rekha
Similar Articles with Keyword 'secret sharing'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3220 - 3224Verifiable Secure Secret Image Sharing Scheme
Angel Rose A, Sinu Maria Kurian
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1812 - 1814A Survey on Deduplication Scheme in Cloud Storage
Deepa.D, Revathi.M
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2433 - 2435Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image
Priya K. Rahangdale, A. N. Jaiswal
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Similar Articles with Keyword 'visual cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 310 - 313Secure Server Verification by using Encryption Algorithm and Visual Cryptography
Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'Security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin