Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙2
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices. Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side. In the proposed system we apply visual cryptography technique. The image is to be transferred on the network (also known as secret image) is first compressed and then hidden by cover image using LSB technique. To enhance security, additional security measures are applied further to get encrypted image using symmetric key algorithm. The shares are generated from the encrypted image using RNS (Residual Number System) algorithm. Next share stacking procedure is applied using CRT (Chinese Remainder Theorem) algorithm to get final encrypted image at receiver side. Further, decryption of final encrypted image is done by using same algorithm which is used for encryption purpose. By applying this technique security and quality of image is improved and pixel expansion problem will get reduced.
Keywords: Visual Cryptography, Visual Secret Share, Share Stacking, Security
Edition: Volume 3 Issue 12, December 2014
Pages: 2447 - 2449
How to Cite this Article?
Ketan Raju Kundiya, Ram B. Joshi, "Enhanced Security Providing using Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB141016, Volume 3 Issue 12, December 2014, 2447 - 2449
135 PDF Views | 108 PDF Downloads
Similar Articles with Keyword 'Visual Cryptography'
Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Views: 130 , Downloads: 102 | CTR: 78 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar
Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'Visual Secret Share'
Views: 122 , Downloads: 107 | CTR: 88 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3262 - 3267An Image Database Security Using Multilayer Multi Share Visual Cryptography
Apurva A. Mohod, Prof. Komal B. Bijwe
Views: 135 , Downloads: 108 | CTR: 80 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
Similar Articles with Keyword 'Security'
Views: 30 , Downloads: 25 | CTR: 83 % | Weekly Popularity: ⮙18
Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021
Pages: 139 - 144Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic
Senthuran Nallainathan
Views: 47 , Downloads: 40 | CTR: 85 %
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Views: 165 , Downloads: 40 | CTR: 24 %
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Views: 63 , Downloads: 45 | CTR: 71 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 700 - 705Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects
Kale Jyoti S