A novel and highly secure encryption methodology using a combination of AES and visual cryptography

SR Rupanagudi, VG Bhat, R Anushree… - … on Advances in …, 2016 - ieeexplore.ieee.org
With the ever increasing human dependency on The Internet for performing various activities
such as banking, shop** or transferring money, there equally exists a need for safe and …

Binary Image Random Grid (2, n)-Visual Cryptography Scheme

DS Degadwala, D Vyas, A Mahajan - Proceedings of International …, 2019 - papers.ssrn.com
Majority of the data security ensures scientific systems. What's more related viewpoints on
furnish for confidentiality, information security, substance Con-firmation Furthermore …

[PDF][PDF] Linux Cloud Lab: Establishing A Private Cloud

B Chhetri, A Sharma, N Thapa, B Mukhia - Journal of Multi Disciplinary … - jmdet.com
Cloud Computing and storage is the topic that is in the heart of every arena of Information
storage, computing and processing, on demand resource utilisation and many other. Cloud …

[PDF][PDF] Secret sharing scheme Circular Visual Cryptography for Color Images

S Parmar, SD Degadwala - 2019 - academia.edu
Data security is the most significant part of the innovative work territory, government,
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …

[PDF][PDF] Region Based Cryptography: A Study of Difference Between the. jpg Image and. png Image After Recombined RGB Images

IJ Bhat, R Mehra, AK Chaturvedi - 2019 - researchgate.net
Today is the age of information and technology. We cannot proceed even a single step
without it. We are fully dependent on information and technology. In this paper we will show …

[CITAS][C] Encrypting Binary and Gray-scale Images Using RandomCircular Visual Cryptography

BK Bhardwaj, T Singh, K Gupta, H Pandey, A Tiwari - RES MILITARIS, 2023