Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number
نویسندگان
چکیده
منابع مشابه
Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number
Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). It is a kind of secret-sharing scheme that encrypts the secret image into n number of shares. It is imperceptible to reveal the secret information unless a certain number of shares(k) or more are superimposed. As the decryption process is d...
متن کاملVisual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking
Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares(k) or more. Simple visual cryptography is insecure because of the decryption proce...
متن کاملExtended Visual Cryptography for Color Shares using Random Number Generators
Visual cryptography is a special image encryption technique. It is different from traditional cryptography, because it does not need complex computation to decrypt. The benefit of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique proposed here...
متن کاملk-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence
Visual cryptography is a special type of encryption technique where visual information (Image, Text etc) gets encrypted in such a way that decryption can be performed by Human Visual System with a computation free decryption process. The beauty of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using H...
متن کاملCopyright Assurance Scheme for computerized Color Images Utilizing Key based Visual Cryptography Watermarking
With rapidly growing network, Internet has turned into an essential wellspring of transmitting confidential or secret data, for example, military data, money related records, and so forth. In such cases, strategies committed to ensure such kind of information are needed and they play an imperative role in providing confidential and secure transmission over network. Visual cryptography scheme is...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2011
ISSN: 0975-8887
DOI: 10.5120/2347-3069