Securing visual cryptographic shares using public key encryption
K Kaur, V Khemchandani - 2013 3rd IEEE International …, 2013 - ieeexplore.ieee.org
The Visual Cryptography Scheme is a secure method that encrypts a secret document or
image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is …
image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is …
[PDF][PDF] An analysis of region growing image segmentation schemes
A Chaturvedi, R Khanna, V Kumar - International Journal of …, 2016 - researchgate.net
Region growing is a simple region-based image segmentation method. It is also classified
as a pixel-based image segmentation method since it involves the selection of initial seed …
as a pixel-based image segmentation method since it involves the selection of initial seed …
Segment Based Visual Cryptography for Key Distribution
SP Indrakanti, PS Avadhani - International Journal of …, 2012 - search.proquest.com
Security is playing a vital role in this era of information technology, it has become a
prerequisite in the digital world for maintaining the secrecy of the information. Many …
prerequisite in the digital world for maintaining the secrecy of the information. Many …
Random sequence based secret sharing of an encrypted color image
Secret sharing was first proposed by Shamir and Blakley individually. It refers to a method of
distributing secret information amongst a group of individuals say n, each of whom is …
distributing secret information amongst a group of individuals say n, each of whom is …
[PDF][PDF] Analysis of schemes proposed for improving the segment based visual cryptography
A Chaturvedi, IJ Bhat - International Journal of Computer Trends …, 2015 - researchgate.net
Segmentation based visual cryptography is segment based not pixel based and works on
symbols that may be shown as segment display, the two major technique proposed in this …
symbols that may be shown as segment display, the two major technique proposed in this …
Chaotic Based Enhanced Keyless Color Image Visual Cryptography System
M Krishna, MJ Ram - Journal of Innovation in Computer Science …, 2016 - indianjournals.com
Visual Cryptography is one of the techniques that can be used for securing image based
secrets. The scheme Visual Cryptography is used to encrypt a secret image or document by …
secrets. The scheme Visual Cryptography is used to encrypt a secret image or document by …
Cryptographic key issues and solutions for the bit sieve/pixel-sieve method
I Arpad - 2014 IEEE International Conference on Automation …, 2014 - ieeexplore.ieee.org
During the testing and analysis for robustness of pixel sieve and bit sieve cryptographic
methods few weaknesses emerged. Some of them are related to the cryptographic key itself …
methods few weaknesses emerged. Some of them are related to the cryptographic key itself …
[PDF][PDF] Secret Sharing and Authentication Using Visual Cryptography with RSA Algorithm
In this world of digitalization, almost every communication is done over the internet.
Therefore, any type of data like military maps is transmitted over the network and it creates a …
Therefore, any type of data like military maps is transmitted over the network and it creates a …
[PDF][PDF] Global Journal on Technology
The aim of this contribution is to provide teachers with appropriate tools that will facilitate the
translation of learning scenario into complete specification in view to its implementation on a …
translation of learning scenario into complete specification in view to its implementation on a …
[PDF][PDF] Performance Review of Image Encryption Methods
F Rozario, A Vibhute - researchgate.net
Images have found wisespread use in today's world from social networking, banking,
medical to military uses. Hence, to maintain confidentiality of these images, image …
medical to military uses. Hence, to maintain confidentiality of these images, image …