Extended visual cryptography techniques for true color images
K Dhiman, SS Kasana - Computers & Electrical Engineering, 2018 - Elsevier
In this work, two extended visual cryptography techniques for sharing color images are
proposed. Three meaningful shares are generated in both techniques using a block size of …
proposed. Three meaningful shares are generated in both techniques using a block size of …
A novel approach for circular random grid with share authentication
Secrecy, Integrity and Authenticity are the major trust areas whenever information is
subjected to third party intervention who can gain data access from vulnerable links in the …
subjected to third party intervention who can gain data access from vulnerable links in the …
Binary Image Random Grid (2, n)-Visual Cryptography Scheme
Majority of the data security ensures scientific systems. What's more related viewpoints on
furnish for confidentiality, information security, substance Con-firmation Furthermore …
furnish for confidentiality, information security, substance Con-firmation Furthermore …
[PDF][PDF] Secret sharing scheme Circular Visual Cryptography for Color Images
S Parmar, SD Degadwala - 2019 - academia.edu
Data security is the most significant part of the innovative work territory, government,
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …
[PDF][PDF] Secure Image Encryption based on a Cube
With the explosive growth of internet and the fast communication techniques available in
recent years, the security and confidentiality of the sensitive data has become of supreme …
recent years, the security and confidentiality of the sensitive data has become of supreme …
[PDF][PDF] Survey of Multiple Information Hiding Techniques using Visual Cryptography
Information now a day‟ s seems to have become abundant and the secure transmission
and visualization of it has been a challenge. The major security concerns are of …
and visualization of it has been a challenge. The major security concerns are of …