International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015


An Outline of Various Secret Sharing Techniques

Kavita Choudhary [2] | Kumar Vaibhav


Abstract: Data is progressively important in our every day life. Data gets more esteem when imparted and shared to others. Due to advancement of technology, specially in networking and communication area, now it becomes very convenient to impart the data like speech or audio, video and images effectively. It may offer ascent to security related issues. Visual cryptography, a developing cryptography engineering, uses the attributes of human vision to decrypt encrypted digital signals (Image). It does not need any cryptography learning and complex calculation. For security concerns, it additionally guarantees that programmers can't see any pieces of information around a secret image from individual share image. Since Naor and Shamir proposed the fundamental model of visual cryptography, specialists have distributed numerous related studies. A large portion of these studies, in any case, concentrate on paired pictures, few of them proposed systems for handling gray level and true color images. This paper gives you an outline of various technique for visual cryptography of gray level and RGB images focused around past studies in high contrast visual cryptography, and the halftone engineering. Our routines not just hold the preferences of high contrast visual cryptography, which abuses the human visual framework to decode secret image without processing, additionally have the retrograde similarity with the past results in highly contrasting visual cryptography, for example, the t out of n limit conspire, and could be connected to black and white images effortlessly.


Keywords: Visual Cryptography, Stegnography, Image Processing, Data hiding, Secret Sharing technique


Edition: Volume 4 Issue 6, June 2015,


Pages: 2657 - 2659


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kavita Choudhary, Kumar Vaibhav, "An Outline of Various Secret Sharing Techniques", International Journal of Science and Research (IJSR), Volume 4 Issue 6, June 2015, pp. 2657-2659, https://www.ijsr.net/get_abstract.php?paper_id=SUB155924

Similar Articles with Keyword 'Visual Cryptography'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha | Dr. K. Usha Rani

Share this Article

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan [2]

Share this Article
Top