Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015
An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Data is progressively important in our every day life. Data gets more esteem when imparted and shared to others. Due to advancement of technology, specially in networking and communication area, now it becomes very convenient to impart the data like speech or audio ,video and images effectively. It may offer ascent to security related issues. Visual cryptography, a developing cryptography engineering, uses the attributes of human vision to decrypt encrypted digital signals (Image). It does not need any cryptography learning and complex calculation. For security concerns, it additionally guarantees that programmers can't see any pieces of information around a secret image from individual share image. Since Naor and Shamir proposed the fundamental model of visual cryptography, specialists have distributed numerous related studies. A large portion of these studies, in any case, concentrate on paired pictures, few of them proposed systems for handling gray level and true color images. This paper gives you an outline of various technique for visual cryptography of gray level and RGB images focused around past studies in high contrast visual cryptography, and the halftone engineering. Our routines not just hold the preferences of high contrast visual cryptography, which abuses the human visual framework to decode secret image without processing, additionally have the retrograde similarity with the past results in highly contrasting visual cryptography, for example, the t out of n limit conspire, and could be connected to black and white images effortlessly.
Keywords: Visual Cryptography, Stegnography, Image Processing, Data hiding, Secret Sharing technique
Edition: Volume 4 Issue 6, June 2015
Pages: 2657 - 2659
How to Cite this Article?
Kavita Choudhary, Kumar Vaibhav, "An Outline of Various Secret Sharing Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155924, Volume 4 Issue 6, June 2015, 2657 - 2659
141 PDF Views | 106 PDF Downloads
Similar Articles with Keyword 'Visual Cryptography'
Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Views: 130 , Downloads: 102 | CTR: 78 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar
Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Similar Articles with Keyword 'Stegnography'
Views: 127 , Downloads: 104 | CTR: 82 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1319 - 1323Advanced Technique for Comprehensive Data Security
Pramendra Kumar, Vijay Kumar Sharma
Views: 120 , Downloads: 105 | CTR: 88 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2101 - 2105Implementation of Steganography with ETC System for Different Data Transmission
Gauri Chavan, S. S. Vairagar
Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Views: 138 , Downloads: 123 | CTR: 89 % | Weekly Popularity: ⮙7
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013
Pages: 423 - 426An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects
Komal B.Bijwe, G. R. Bamnote
Views: 131 , Downloads: 123 | CTR: 94 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 602 - 605A Review on Various Approaches for Data Hiding
Sukhjinder Pal Kaur, Sonika Jindal
Similar Articles with Keyword 'Image Processing'
Views: 151 , Downloads: 103 | CTR: 68 %
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Views: 41 , Downloads: 28 | CTR: 68 % | Weekly Popularity: ⮙10
Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021
Pages: 524 - 528Detection and Classification of Skin Cancer using Image Processing Techniques
Maha Shawish, Balsam Eid
Views: 54 , Downloads: 34 | CTR: 63 %
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1673 - 1677Convolution Neural Network Based Image Recognition
Sofia Hamid, Mrigana Walia
Views: 52 , Downloads: 40 | CTR: 77 % | Weekly Popularity: ⮙14
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021
Pages: 376 - 379Glaucoma Detection Using Support Vector Machine Algorithm
Aukif Yousuf Wani, Preeti Sondhi
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Similar Articles with Keyword 'Data hiding'
Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Views: 124 , Downloads: 99 | CTR: 80 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Views: 126 , Downloads: 102 | CTR: 81 % | Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1130 - 1132Survey On: Reversible Data Hiding in Encrypted JPEG Images
N. B. Pokale, Sanjivani S. Koli
Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1537 - 1542A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙6
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1642 - 1643A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams
Shrutika S. Giradkar, Antara Bhattacharya
Similar Articles with Keyword 'Secret Sharing technique'
Views: 130 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1689 - 1691Authentication of Colored Document Image with Data Repair Capability
Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav
Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Views: 140 , Downloads: 117 | CTR: 84 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1320 - 1325Gray Scale Image Authentication Using SSS Technique
Vandana Navale, Archana Lomte
Views: 129 , Downloads: 123 | CTR: 95 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 188 - 190Performance Analysis of Various Secret Sharing Techniques
Surbhi Sharma, Pradeep Kumar
Views: 142 , Downloads: 125 | CTR: 88 % | Weekly Popularity: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 935 - 937A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme
Harshal S. Tekade, Dr. Baisa L. Gunjal