International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Visual cryptography (VC) is a technique of encoding a secret image into share images such that stacking a sufficient number of shares reveals the original secret image. Shares are generally presented in transparencies. So each participant holds a transparency. The original secret image is recovered after superimposing the transparencies one to other. Basically; the performance of visual cryptography scheme depends on different measures; like pixel expansion; security; contrast; computational complexity; accuracy; share generated; number of secret images and type of secret images encrypted by the scheme. Most of the prior research work on VC focuses on improving two parameters: pixel expansion and contrast. Visual cryptography (VC) has numerous applications; such as authentication and identification; steganography; and image encryption. Horng et al. showed that cheating is possible in VC; where some participants can betray the remaining participants by fake transparencies. So; designing cheating-prevention visual secret-sharing (CPVSS) schemes has been proposed by many researchers to overcome cheating problem from existing VC. Intent of this paper is on study and performance analysis of the cheating prevention visual cryptography schemes and cheating problem in VC and extended VC.

Keywords: Cheat-preventing scheme, cheating, secret sharing, visual cryptography, Security

Edition: Volume 3 Issue 6, June 2014

Pages: 560 - 563


How to Cite this Article?

Smita Patil, Jyoti Rao, "Survey of Cheating Prevention Techniques in Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014135, Volume 3 Issue 6, June 2014, 560 - 563

26 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cheating'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1705 - 1709

Optimization of an Error Minimizing or Localizing Jammers in Wireless Networks

S. Rajeswari

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 1000 - 1004

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Vardireddy Harish Kumar Reddy, K. Sashi Rekha

Share this article



Similar Articles with Keyword 'secret sharing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1597 - 1601

An Improved Method for Secret Image Sharing in Color Image through Error Diffusion

Ashwini N. Waghmare, Prof. Akhil Anjikar, Dr. M. Raghuwanshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A, Sinu Maria Kurian

Share this article



Similar Articles with Keyword 'visual cryptography'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1266 - 1269

Visual Cryptography for Biometric Privacy

Shubhangi Rajanwar, Shirish Kumbar, Akshay Jadhav

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1597 - 1601

An Improved Method for Secret Image Sharing in Color Image through Error Diffusion

Ashwini N. Waghmare, Prof. Akhil Anjikar, Dr. M. Raghuwanshi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this article



Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article
Top