[PDF][PDF] Analysis of visual cryptography, steganography schemes and its hybrid approach for security of images

M Pramanik, K Sharma - … Journal of Emerging Technology and Advanced …, 2014 - Citeseer
Data security has become a most important issue in data communication especially in the
field of Computer Network. The data can have many forms such as text, image, and sound …

Designing of encryption algorithm based on visual cryptography and linear feedback shift register

S Rani - Advanced Science Letters, 2018 - ingentaconnect.com
In this paper, an algorithm for encrypting image using the combination of visual cryptography
technique and linear feedback shift register is proposed. It is necessary to encrypt the …

Securing Transactions in E-Commerce using Visual Cryptography and Steganography.

TV Narayana Rao, KY Reddy… - International Journal of …, 2017 - search.ebscohost.com
The Contemporary world has seen a tremendous usage of E-Commerce because of its
appliance. The Information confidentiality is one of the major requirements to the users of …

Robust Biometric System Using Liveness Detection and Visual Cryptography

Komal, C Kant - … of International Conference on Communication and …, 2021 - Springer
Though biometric is a secure authentication technique based on individual's traits, it is
vulnerable to various types of attacks. There are many techniques to secure the biometric …

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

K Prakasha, R Kalkur, V Acharya, B Muniyal… - Security in Computing …, 2019 - Springer
Secure communication and Secure data transfer are one of the significant challenges in the
era of Internet. With the development in information technology, there arose a need for …