R Poriye, SS Tyagi - International Journal of Research Studies in …, 2014 - Citeseer
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual …
JP Kumar, PN Rao, N koppula - … for IoT Applications: Proceedings of EAIT …, 2022 - Springer
Visual cryptography is the most secure form for exchanging the information. The implementation is done through image files. Image data sharing is a way which is used to …
S Chougule, PJ Sapna - 2018 3rd IEEE International …, 2018 - ieeexplore.ieee.org
In visual cryptography, a binary secret image is encoded to produce shares. To increase the security of secret image, it is encoded along with the cover images to obtain shares by …
Informations are being transferred through open channels and the security of those informations has been prime concerns. Apart from many conventional cryptographic …
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual …