Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

To maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves hiding the data using data hiding algorithm to maintain the images secrecy. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key.

Keywords: Cover image, data hiding, data extraction, Image encryption, Image decryption and Data recovery, DWT

Edition: Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Share this Article

How to Cite this Article?

Sneha A.Deshmukh, P.B.Sambhare, "Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141472, Volume 3 Issue 11, November 2014, 2425 - 2428

125 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cover image'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A, Sinu Maria Kurian

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 70 - 73

Implementation of 16 * 16 Quantization Table Steganography on Gray Scale Images

Hina Anand, Kapil Narwal, Kartik Mudgal

Share this Article

Similar Articles with Keyword 'data hiding'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1534 - 1539

Data Anonymization Approach for Data Privacy

Padma L. Gaikwad, M. M. Naoghare

Share this Article

Similar Articles with Keyword 'data extraction'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1191 - 1194

Web Data Extraction by Using Trinity

Sayali Khodade, Nilav Mukharjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1152 - 1154

A Survey on Content based Video Retrieval Using Speech and Text information

Laxmikant S. Kate, M. M. Waghmare

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1434 - 1436

Method for Repossession of Content Based Video using Speech and Text Information

Manasi A. Kabade, U.A. Jogalekar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article

Similar Articles with Keyword 'Image encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1830 - 1833

A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security

Ganesh Lamkhade, Ajay Kumar Gupta

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2814 - 2815

Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator

Rakhi Lande, Rekha Pandit

Share this Article

Similar Articles with Keyword 'DWT'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2049 - 2052

Fingerprint Compression Technique using Sparse Representation

Swapnil Raut, Nisha Wankhade

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article
Top