Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme

R Gayathri, V Nagarajan - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
The Visual cryptography scheme (VCS) is a secure method that encrypts a secret image into
shares. The key idea behind the proposed approach deals with information hiding in image …

[PDF][PDF] A visual cryptographic technique to secure image shares

J Verma, V Khemchandani - International Journal of Engineering …, 2012 - academia.edu
The Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by
breaking it into shares. A distinctive property of VCS is that one can visually decode the …

Hiding secret message using visual cryptography in steganography

YK Meghrajani, HS Mazumdar - 2015 Annual IEEE India …, 2015 - ieeexplore.ieee.org
This paper presents two layered security for data hiding by combining steganography and
visual cryptography (VC). Classically, VC encrypts a secret image into noise like images …

Enhancement of security in visual cryptography system using cover image share embedded security algorithm (CISEA)

H Sharma, N Kumar, GK Jha - 2011 2nd International …, 2011 - ieeexplore.ieee.org
Visual Cryptography is an encryption technique used to hide visual information in such a
way that it can be decrypted by the human visual system, without using any decryption …

Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking

J Saturwar, DN Chaudhari - 2017 Second International …, 2017 - ieeexplore.ieee.org
In today's world of digital communication, as technology progresses, there is more and more
attention required on image security. Many visual cryptography algorithms have been …

[PDF][PDF] Key based visual cryptography scheme using novel secret sharing technique with steganography

P Bidgar, N Shahare - IOSR J. Electron. Commun. Eng.(IOSR-JECE), 2013 - academia.edu
With rapidly growing network, Internet has become a primary source of transmitting
confidential or secret data such as military information, financial documents, etc. In such …

A novel secret image hiding technique for secure transmission

S Manimurugan, S Al-Mutairi - Journal of Theoretical and Applied …, 2017 - ksascholar.dri.sa
To transmit secret data from source to destination is a challenging task because there is a
chance that intruders or third parties can hack the information at any moment. To address …

Cheating prevention in Visual Cryptography using steganographic scheme

B Jana, P Chowdhuri - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Visual Cryptography (VC) is a technique to encrypt a secret image into transparent shares
such that stacking a sufficient number of shares reveals the secret image without any …

Security enhanced random grid visual cryptography scheme using master share and embedding method

N Francis, T Monoth - International Journal of Information Technology, 2023 - Springer
Visual cryptography scheme is one of the main branches of secret sharing. The image is
converted into various shares and then recouped by overlapping the required number of …

[PDF][PDF] Visual cryptography scheme for color image using random number with enveloping by digital watermarking

S Kandar, A Maiti, BC Dhara - … Journal of Computer Science Issues (IJCSI), 2011 - Citeseer
Visual Cryptography is a special type of encryption technique to obscure image-based
secret information which can be decrypted by Human Visual System (HVS). This …