A Comprehensive View on Encryption Techniques of Visual Cryptography

نویسندگان

  • Ashish Sharma
  • Devesh Kumar Srivastava
  • Chin-Chen Chang
چکیده

Visual Cryptography plays an important role in area of information security. It is a technique of cryptography to secure the visual information by encrypting them into cipher text. At user’s end human visual system is used for decryption. For this there is no need of any computer aid. Performance of Visual Cryptography scheme depends on the several measures these are generated share is meaningful or meaningless, computational complexity, accuracy, security pixel expansion, number of secret images. This paper explores a study and performance analysis of the various schemes of visual cryptography on the basis of number of secret images, image format, type of shares generated and pixel expansion. KeywordsSecurity, Computational complexity, Pixel Expansion, Contrast, Accuracy, Visual Cryptography Scheme (VCS)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

A Probabilistic Model of Visual Cryptography Using Halftoned Technique for Color Image

Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). This is the benefit of the visual secret sharing scheme. The encryption technique requires a cryptographic computati...

متن کامل

Visual Cryptography Techniques-A survey & Comparison

Image Processing is a technique of processing the images such that the visibility of images is clear to user. Some times in image processing security is an important concern and also used for the hiding of information in images. Visual cryptography is a special technique of encryption for the information hiding in images such that the image is visible only applying correct key to the image for ...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014