International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 155

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 1, January 2016


A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images

Bhagyashri P. Kandalkar, G. D. Dalavi


Abstract: Cryptography refers to the study of science and art for achieving security by encode the messages to make them the data is not readable. For example the readable message is converted into an unreadable message by using cryptographic system and this process called well-structured and systematic. The Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. In this project, I am presenting a novel technique of in the Development of Visual Cryptography Using low complexity algorithm and bit shifting which image is encrypted at multiple levels using low complexity and bit shifting algorithm method. In encryption secret image is converted into monochromatic image i. e. Red, Green and Blue channels are separated and each channel encrypted using low complexity and bit shifting algorithm. It is a bitwise operation. In this project a modified approach is being proposed for increasing the security of the data. For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the Low complexity and bit shifting algorithm which is designed by the user. Shares obtain at each level are stored in database using that database image is encrypted to further levels. For decryption all the shares are need to be superimposed in proper sequence using these two algorithms. Sender encrypts the message using the secret key and then sends it to the receiver. The receiver decrypts the message to get the secret information. Visual Cryptography (VC) is a technique which encrypts the image and converts it into unreadable format with the help of key by decrypting the image we get original secret image. This paper provides a higher level of security for Development of visual cryptography technique for authentication using facial images.


Keywords: Visual Cryptography, Security, bitwise operation, Cryptography, Encrypting, Decrypting


Edition: Volume 5 Issue 1, January 2016,


Pages: 8 - 12


How to Cite this Article?

Bhagyashri P. Kandalkar, G. D. Dalavi, "A Review Paper on Development of Visual Cryptography Technique for Authentication Using Facial Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV152524, Volume 5 Issue 1, January 2016, 8 - 12

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Visual Cryptography'

Downloads: 107

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2710 - 2713

Secret Hiding Using Visual Cryptography

Rahul Gupta

Share this Article

Downloads: 111

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1309 - 1311

Visual Cryptography Scheme: A Review

Anjali Maharudra Bhunje, Premanand K. Kadbe

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 10 Issue 10, October 2021

Pages: 762 - 764

Smart Antennas: Technological Advancement for Wireless Communication Networks

Jyoti Jha

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

Similar Articles with Keyword 'Encrypting'

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael's Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

Downloads: 106

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 801 - 804

A Steganography Implementation Based On DCT Algorithm By Using MATLAB GUI Function

Er. Yashpal Lather, Er. Megha Goyal

Share this Article

Similar Articles with Keyword 'Decrypting'

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael's Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

Downloads: 126

Research Paper, Electronics & Communication Engineering, India, Volume 2 Issue 8, August 2013

Pages: 176 - 178

Analytical Study of AES and Proposed Variant with Enhance Block Length and Key Length

Sayed Tathir Abbas, Ravindera Kumar

Share this Article

Similar Articles with Keyword 'Visual'

Downloads: 152

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 130 - 134

Segmentation of Touching Characters in Indian Scripts

B. Hari Kumar, N. Sateesh

Share this Article

Downloads: 93

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015

Pages: 508 - 513

Saliency Technique for Efficient Back Ground Subtraction

Aiswarya Muralidharan, S. Sivakumar

Share this Article
Top