Securing visual cryptographic shares using public key encryption

K Kaur, V Khemchandani - 2013 3rd IEEE International …, 2013 - ieeexplore.ieee.org
The Visual Cryptography Scheme is a secure method that encrypts a secret document or
image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is …

[PDF][PDF] An analysis of region growing image segmentation schemes

A Chaturvedi, R Khanna, V Kumar - International Journal of …, 2016 - researchgate.net
Region growing is a simple region-based image segmentation method. It is also classified
as a pixel-based image segmentation method since it involves the selection of initial seed …

Segment Based Visual Cryptography for Key Distribution

SP Indrakanti, PS Avadhani - International Journal of …, 2012 - search.proquest.com
Security is playing a vital role in this era of information technology, it has become a
prerequisite in the digital world for maintaining the secrecy of the information. Many …

Random sequence based secret sharing of an encrypted color image

S Kandar, BC Dhara - 2012 1st International Conference on …, 2012 - ieeexplore.ieee.org
Secret sharing was first proposed by Shamir and Blakley individually. It refers to a method of
distributing secret information amongst a group of individuals say n, each of whom is …

[PDF][PDF] Analysis of schemes proposed for improving the segment based visual cryptography

A Chaturvedi, IJ Bhat - International Journal of Computer Trends …, 2015 - researchgate.net
Segmentation based visual cryptography is segment based not pixel based and works on
symbols that may be shown as segment display, the two major technique proposed in this …

Chaotic Based Enhanced Keyless Color Image Visual Cryptography System

M Krishna, MJ Ram - Journal of Innovation in Computer Science …, 2016 - indianjournals.com
Visual Cryptography is one of the techniques that can be used for securing image based
secrets. The scheme Visual Cryptography is used to encrypt a secret image or document by …

Cryptographic key issues and solutions for the bit sieve/pixel-sieve method

I Arpad - 2014 IEEE International Conference on Automation …, 2014 - ieeexplore.ieee.org
During the testing and analysis for robustness of pixel sieve and bit sieve cryptographic
methods few weaknesses emerged. Some of them are related to the cryptographic key itself …

[PDF][PDF] Secret Sharing and Authentication Using Visual Cryptography with RSA Algorithm

S Kaur, A Kaur, P Kumari - researchgate.net
In this world of digitalization, almost every communication is done over the internet.
Therefore, any type of data like military maps is transmitted over the network and it creates a …

[PDF][PDF] Global Journal on Technology

B Riad, H Mourad, G Noureddine - academia.edu
The aim of this contribution is to provide teachers with appropriate tools that will facilitate the
translation of learning scenario into complete specification in view to its implementation on a …

[PDF][PDF] Performance Review of Image Encryption Methods

F Rozario, A Vibhute - researchgate.net
Images have found wisespread use in today's world from social networking, banking,
medical to military uses. Hence, to maintain confidentiality of these images, image …