[PDF][PDF] Analysis of visual cryptography, steganography schemes and its hybrid approach for security of images
M Pramanik, K Sharma - … Journal of Emerging Technology and Advanced …, 2014 - Citeseer
Data security has become a most important issue in data communication especially in the
field of Computer Network. The data can have many forms such as text, image, and sound …
field of Computer Network. The data can have many forms such as text, image, and sound …
Designing of encryption algorithm based on visual cryptography and linear feedback shift register
S Rani - Advanced Science Letters, 2018 - ingentaconnect.com
In this paper, an algorithm for encrypting image using the combination of visual cryptography
technique and linear feedback shift register is proposed. It is necessary to encrypt the …
technique and linear feedback shift register is proposed. It is necessary to encrypt the …
Securing Transactions in E-Commerce using Visual Cryptography and Steganography.
TV Narayana Rao, KY Reddy… - International Journal of …, 2017 - search.ebscohost.com
The Contemporary world has seen a tremendous usage of E-Commerce because of its
appliance. The Information confidentiality is one of the major requirements to the users of …
appliance. The Information confidentiality is one of the major requirements to the users of …
Robust Biometric System Using Liveness Detection and Visual Cryptography
Komal, C Kant - … of International Conference on Communication and …, 2021 - Springer
Though biometric is a secure authentication technique based on individual's traits, it is
vulnerable to various types of attacks. There are many techniques to secure the biometric …
vulnerable to various types of attacks. There are many techniques to secure the biometric …
A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems
Secure communication and Secure data transfer are one of the significant challenges in the
era of Internet. With the development in information technology, there arose a need for …
era of Internet. With the development in information technology, there arose a need for …