An overview of visual cryptography techniques

DR Ibrahim, JS Teh, R Abdullah - Multimedia Tools and Applications, 2021 - Springer
Visual cryptography is an encryption technique that decomposes secret images into multiple
shares. These shares are digitally or physically overlapped to recover the original image …

An optimal (k, n) visual secret sharing scheme for information security

ME Hodeish, L Bukauskas, VT Humbe - Procedia computer science, 2016 - Elsevier
Recently, based on the concept of Visual Secret Sharing (VSS) scheme proposed by Naor
and Shamir in 1994, many of schemes have been proposed to protect the security of binary …

A survey on key (s) and keyless image encryption techniques

KHS Ranjan, SSP Fathimath, G Aithal… - Cybernetics and …, 2017 - sciendo.com
As in recent years digital data transmission and image application have been increasing,
maintaining secure transmission of image is of high importance. Image Encryption is …

[PDF][PDF] Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares

JH Saturwar, DDN Chaudhari - Published in International … - pdfs.semanticscholar.org
With the growth in digital world, it is becoming more important to find a method to protect the
security of digital media. An image watermarking model based on visual secret sharing …

Multi-secret sharing visual cryptography scheme based on XOR algorithm

YY Ha, S Ji, WC He, Y Zhang - Applied Mechanics and Materials, 2014 - Trans Tech Publ
XOR algorithm can be used to improve the recovery effects of visual cryptography scheme.
In this paper, we present a multi-secret visual cryptography scheme by using the matrices of …

[PDF][PDF] Optimal Number Of Shares For Digital Water-marking Scheme Using Visual Cryptography

J Saturwar, DDN Chaudhari - … Journal of Scientific & Engineering Research - academia.edu
Distribution channels such as digital music downloads, video-on-demand, and multimedia
social networks pose new challenges to the design of content protection measures aimed at …

Performance Analysis of Visual Cryptography and Watermarking Algorithms

K Anish, CKS Dinesh, S Ranjit… - 2022 3rd …, 2022 - ieeexplore.ieee.org
Images are a common source of data transfer in numerous domains. They can be a source
for transferring confidential information across various mediums. As this practice has been …

[PDF][PDF] Sharing Secured Secret data by Binary Image using Visual Cryptography

AB Alde, VT Humbe - academia.edu
The Visual Cryptography Scheme (VCS) is a secure technique that encrypt the secrets into
an image by splitting image into a number of parts called shares. One of the distinct …

[PDF][PDF] A New XOR-Based Visual Cryptography Scheme for Authentic Remote Voting System

M Hodeish, V Humbe - 2017 - researchgate.net
The current technological era demands high security and verifiability, especially in the
Remote Voting System (RVS) through the Internet in order to resist the cheating case in …

[PDF][PDF] Revolutionizing Digital Entry Through Visual Cryptography, Steganography, And Multi-Factor Authentication

P Patel - Webology (ISSN: 1735-188X), 2020 - webology.org
This Researchintroduces a user-centric and robust solution for streamlining digital access.
This downloadable application seamlessly operates across various devices, eliminating the …