International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Visual cryptography provides secured digital transmission that is employed for just once. The first pictures are often apply by exploitation this theme. It is easy and uncomplicated technique to execute the key image for shadow pictures. The shadow pictures are the shrunken version of the first image, during which the key image share is embedded. These are wont to guard the information and secret pictures within the network in order that it's not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow pictures. Once these shadow pictures are distributed within the original image. Convalescent of secret image is completed by human sensory system by spile all the shadow pictures.

Keywords: visual cryptography, random key generator, XOR-encryption, PSNR, Mean square error

Edition: Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

Share this Article

How to Cite this Article?

Bhagyashree A. Dhamande, Rutuja N. Kamble, "XOR- Based Secrete Sharing Scheme For Image Database Security: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141310, Volume 3 Issue 11, November 2014, 2062 - 2066

37 PDF Views | 32 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'visual cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2353 - 2359

Improved Visual Cryptography Scheme using Hopfield for Halftone Images

Ramandeep Kaur, Ravneet Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

Similar Articles with Keyword 'PSNR'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2040 - 2043

An Efficient Method for Image Denoising Using Orthogonal Wavelet Transform

Akshata S Kori, Manjunatha A S.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1655 - 1659

Speckle Noise ReductionUsing Local Binary Pattern; Anisotropic Diffusion and Bilateral Filter

Mandeep Singh Sandhu, Rajandeep Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1811 - 1816

A Video Steganography Approach using Random Least Significant Bit Algorithm

Arijit Basu, Gaurav Kumar, Soumyajit Sarkar

Share this Article

Similar Articles with Keyword 'Mean square error'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1538 - 1540

Survey on Optimization of Fractal Image Compression

Er. Awdhesh Kumari, Dr. Shaveta Rani, Dr. Paramjeet Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2062 - 2066

XOR- Based Secrete Sharing Scheme For Image Database Security: A Review

Bhagyashree A. Dhamande, Rutuja N. Kamble

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 798 - 802

A Survey on Different Types of Image Formats and Compression Techniques

Vrinda Shivashetty, G.G Rajput

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1647 - 1651

A New Hybrid Technique for Detection of Liver Cancer on Ultrasound Images

Ramandeep Kaur Bhullar, Navpreet Kaur Walia

Share this Article



Top