Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices. Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side. In the proposed system we apply visual cryptography technique. The image is to be transferred on the network (also known as secret image) is first compressed and then hidden by cover image using LSB technique. To enhance security, additional security measures are applied further to get encrypted image using symmetric key algorithm. The shares are generated from the encrypted image using RNS (Residual Number System) algorithm. Next share stacking procedure is applied using CRT (Chinese Remainder Theorem) algorithm to get final encrypted image at receiver side. Further, decryption of final encrypted image is done by using same algorithm which is used for encryption purpose. By applying this technique security and quality of image is improved and pixel expansion problem will get reduced.
Keywords: Visual Cryptography, Visual Secret Share, Share Stacking, Security
Edition: Volume 3 Issue 12, December 2014
Pages: 2447 - 2449
How to Cite this Article?
Ketan Raju Kundiya, Ram B. Joshi, "Enhanced Security Providing using Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB141016, Volume 3 Issue 12, December 2014, 2447 - 2449
98 PDF Views | 77 PDF Downloads
Similar Articles with Keyword 'Visual Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 310 - 313Secure Server Verification by using Encryption Algorithm and Visual Cryptography
Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'Visual Secret Share'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3262 - 3267An Image Database Security Using Multilayer Multi Share Visual Cryptography
Apurva A. Mohod, Prof. Komal B. Bijwe
Similar Articles with Keyword 'Security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin