Extended visual cryptography techniques for true color images

K Dhiman, SS Kasana - Computers & Electrical Engineering, 2018 - Elsevier
In this work, two extended visual cryptography techniques for sharing color images are
proposed. Three meaningful shares are generated in both techniques using a block size of …

A novel approach for circular random grid with share authentication

S Gurung, B Chhetri, MK Ghose - … International Conference on …, 2015 - ieeexplore.ieee.org
Secrecy, Integrity and Authenticity are the major trust areas whenever information is
subjected to third party intervention who can gain data access from vulnerable links in the …

Binary Image Random Grid (2, n)-Visual Cryptography Scheme

DS Degadwala, D Vyas, A Mahajan - Proceedings of International …, 2019 - papers.ssrn.com
Majority of the data security ensures scientific systems. What's more related viewpoints on
furnish for confidentiality, information security, substance Con-firmation Furthermore …

[PDF][PDF] Secret sharing scheme Circular Visual Cryptography for Color Images

S Parmar, SD Degadwala - 2019 - academia.edu
Data security is the most significant part of the innovative work territory, government,
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …

[PDF][PDF] Secure Image Encryption based on a Cube

S Gurung, PS Matharoo, MK Ghose - International Journal of Signal …, 2016 - academia.edu
With the explosive growth of internet and the fast communication techniques available in
recent years, the security and confidentiality of the sensitive data has become of supreme …

[PDF][PDF] Survey of Multiple Information Hiding Techniques using Visual Cryptography

B Chhetri, S Gurung, MK Ghose - Image (108X121), 2015 - academia.edu
Information now a day‟ s seems to have become abundant and the secure transmission
and visualization of it has been a challenge. The major security concerns are of …