International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 196

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


A Review of Image Steganographic Technique Based On Extended Visual Cryptography Scheme

Harshal S. Tekade | Dr. Baisa L. Gunjal


Abstract: Secret sharing techniques are required when important and sensible information is transferred from one end to another end. User shares data in form of text and images. There are lots of techniques for secrete text sharing like encryption of text and sharing keys of decryption, hide text behind particular image known as steganography etc. When particular user wants to share image with another user then visual cryptography techniques are applied for sharing. Basic visual cryptography involves two images. After overlapping of these images properly, user will get secrete image. Among these two images, one image containing random pixels and another information contains secrete information. Required information cannot be retrieved unless and until both images are overlapped properly. User can print these images on semitransparent papers and later they can overlap it manually which is one of the advantages. These visual cryptographic techniques are having number of controlling parameters like image quality, image height and width while sharing etc. In this visual cryptography decoding part is done by human visual system without any computation. This visual cryptography can be extended by increasing the overlapping layers. By working on unfocused areas of this visual cryptography like maintaining contrast of reconstructed image, increase in size of original image, additional processing for colored images etc.


Keywords: Visual cryptography, steganography, decryption, secrete sharing, overlapping


Edition: Volume 4 Issue 11, November 2015,


Pages: 935 - 937


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top