An Outline of Various Secret Sharing Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Data is progressively important in our every day life. Data gets more esteem when imparted and shared to others. Due to advancement of technology, specially in networking and communication area, now it becomes very convenient to impart the data like speech or audio ,video and images effectively. It may offer ascent to security related issues. Visual cryptography, a developing cryptography engineering, uses the attributes of human vision to decrypt encrypted digital signals (Image). It does not need any cryptography learning and complex calculation. For security concerns, it additionally guarantees that programmers can't see any pieces of information around a secret image from individual share image. Since Naor and Shamir proposed the fundamental model of visual cryptography, specialists have distributed numerous related studies. A large portion of these studies, in any case, concentrate on paired pictures, few of them proposed systems for handling gray level and true color images. This paper gives you an outline of various technique for visual cryptography of gray level and RGB images focused around past studies in high contrast visual cryptography, and the halftone engineering. Our routines not just hold the preferences of high contrast visual cryptography, which abuses the human visual framework to decode secret image without processing, additionally have the retrograde similarity with the past results in highly contrasting visual cryptography, for example, the t out of n limit conspire, and could be connected to black and white images effortlessly.

Keywords: Visual Cryptography, Stegnography, Image Processing, Data hiding, Secret Sharing technique

Edition: Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

Share this Article

How to Cite this Article?

Kavita Choudhary, Kumar Vaibhav, "An Outline of Various Secret Sharing Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155924, Volume 4 Issue 6, June 2015, 2657 - 2659

141 PDF Views | 106 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Visual Cryptography'

Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Views: 130 , Downloads: 102 | CTR: 78 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1155 - 1157

Avoidance of Unauthorized user using Visual Cryptography

Dayanand G Savakar, Pandurang H Biradar

Share this Article

Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Similar Articles with Keyword 'Stegnography'

Views: 127 , Downloads: 104 | CTR: 82 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Views: 120 , Downloads: 105 | CTR: 88 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2101 - 2105

Implementation of Steganography with ETC System for Different Data Transmission

Gauri Chavan, S. S. Vairagar

Share this Article

Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Views: 138 , Downloads: 123 | CTR: 89 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 423 - 426

An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects

Komal B.Bijwe, G. R. Bamnote

Share this Article

Views: 131 , Downloads: 123 | CTR: 94 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 602 - 605

A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur, Sonika Jindal

Share this Article

Similar Articles with Keyword 'Image Processing'

Views: 151 , Downloads: 103 | CTR: 68 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Views: 41 , Downloads: 28 | CTR: 68 % | Weekly Popularity: ⮙10

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Views: 54 , Downloads: 34 | CTR: 63 %

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Views: 52 , Downloads: 40 | CTR: 77 % | Weekly Popularity: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 376 - 379

Glaucoma Detection Using Support Vector Machine Algorithm

Aukif Yousuf Wani, Preeti Sondhi

Share this Article

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Similar Articles with Keyword 'Data hiding'

Views: 136 , Downloads: 99 | CTR: 73 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Views: 124 , Downloads: 99 | CTR: 80 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Views: 126 , Downloads: 102 | CTR: 81 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Views: 137 , Downloads: 102 | CTR: 74 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Views: 131 , Downloads: 103 | CTR: 79 % | Weekly Popularity: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Similar Articles with Keyword 'Secret Sharing technique'

Views: 130 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Views: 141 , Downloads: 106 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Views: 140 , Downloads: 117 | CTR: 84 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1320 - 1325

Gray Scale Image Authentication Using SSS Technique

Vandana Navale, Archana Lomte

Share this Article

Views: 129 , Downloads: 123 | CTR: 95 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 188 - 190

Performance Analysis of Various Secret Sharing Techniques

Surbhi Sharma, Pradeep Kumar

Share this Article

Views: 142 , Downloads: 125 | CTR: 88 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 935 - 937

A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme

Harshal S. Tekade, Dr. Baisa L. Gunjal

Share this Article
Top