![]() ![]() In: 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science. Ĭhavan PV, Atique M, Malik L (2014) Signature based authentication using contrast enhanced hierarchical visual cryptography. International Journal of Information Privacy, Security and Integrity 2(2):159. IEEEĬhavan PV, Atique M (2015) Secured approach for authentication using threshold-based hierarchical visual cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE). Ĭhavan PV, Atique M (2012) Design of hierarchical visual cryptography. International Journal of Computer Trends and Technology 30(1):26–30. Ĭhaturvedi A, Bhat IJ (2015) Analysis of schemes proposed for improving the segment based visual cryptography. Ĭhao H-C, Fan T-Y (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Ĭhao HC, Fan TY (2017) Generating random grid-based visual secret sharing with multi-level encoding. International Journal of Multimedia Information Retrieval 8(4):195–215. WSI-2007-04, WSI Institute for computer scienceĬhanu OB, Neelima A (2018) A survey paper on secret image sharing schemes. īorchert B (2007) Segment-based Visual Cryptography. IEEEīonis AD, Santis AD (2004) Randomness in secret sharing and visual cryptography schemes. In: 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEEīlesswin AJ, Visalakshi P (2013) An improved grayscale visual secret sharing scheme for visual information security. In: 2018 Second INternational Conference on Electronics, Communication and Aerospace Technology (ICECA). (99)00127-9īhatnagar R, Kumar M (2018) Visual Cryptography: A literature survey. Īteniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Īteniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. IEEEĪskari N, Heys HM, Moloney CR (2014) Novel visual cryptography schemes without pixel expansion for halftone images. In: 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). Īskari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for halftone images. ![]() Īrumugam S, Lakshmanan R, Nagar AK (2012) On (k, n)∗-visual cryptography scheme. IEEEĪmitharaja R, Shaik A, Thanikaise V (2016) Data security through data hiding in images: A review. In: 2011 3rd International Conference on Electronics Computer Technology. Īlex NS, Anbarasi LJ (2011) Enhanced image secret sharing via error diffusion in halftone visual cryptography. IEEEĪl-Khalid RI, Al-Dallah RA, Al-Anani AM, Barham RM, Hajir SI (2017) A secure visual cryptography scheme using private key with invariant share sizes. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT). Ībraham AS, Nair LR, Deepa MS (2017) A novel method for evaluation of visual security of images. ![]() We conclude the paper with a discussion of these open problems and future research directions.Ī JB, Raj C, Sukumaran R, G SM (2019) Enhanced semantic visual secret sharing scheme for the secure image communication. Our findings indicate that existing problems such as pixel expansion, poor quality of recovered image quality, computational and memory complexities still exist, and a optimizing the trade-off between these requirements still requires further investigation. Over 40 visual cryptography schemes that have been proposed in the past two decades were analyzed and compared. Compared to prior work, we extend the number of comparison metrics to include signal-to-noise ratio and the type of shares. These schemes are then compared in terms of their features, performance metrics, advantages and disadvantages. We first provide an introduction to the various categories of visual cryptography techniques, including a discussion on recently proposed schemes. For more veteran researchers in the area, our paper provides the most up-to-date coverage of the state-of-the-art. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications. Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill different security requirements. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. Visual cryptography is an encryption technique that decomposes secret images into multiple shares. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |