scholarly journals Secret sharing scheme Circular Visual Cryptography for Color Images

Author(s):  
Sudhir Parmar ◽  
Sheshang D. Degadwala

Data security is the most significant part of the innovative work territory, government, industry, association, and so forth. As of late, cybercrime or related hacking issue increments to an ever-increasing extent. So high security is required to verify the data as well as the picture. Visual Cryptography Scheme (VCS) is one of the procedures to verify the data utilizing straightforward calculation while in some other security method complex calculation was utilized. VCS has a straightforward encryption calculation which is secure data changing over into the various offers and for the unscrambling procedure don't require any kind of gadgets or any mind-boggling decoding calculation. The unscrambling procedure is finished utilizing the Human Visual Scheme (HVS). Round Random Grid offers are superior to the rectangular offers since usefulness is expanded by secure various data in the roundabout irregular network to give the secrecy. In the proposed plan, mystery sharing plan is that mystery data is separated into different importance full and negligible offers and is additionally recouped by superimposing handling and it is seen by HVS. In this Research, we depict each technique for VCS and introduced its relative investigation utilizing points of interest and hindrances.

Author(s):  
ASHWATHIMESANGLA AO

Visual cryptography is a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as Visual Cryptography Scheme (VCS). In this paper secret image is divided into shares (printed on transparencies), and each share holds some information. At the receiver this shares are merged to obtain the secret information which is revealed without any complex computation. The proposed algorithm is for color host image, divided into three color planes Red, Green, Blue and merged with secret image which is binarized and divided into shares. The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image.


Today organizations face a challenge while recruiting candidates, who provide forged mark sheets in order to get a job. To prevent wrong hiring a detailed and thorough approach is needed to verify the authentication of both the candidate and the marks obtained by him/her. There are so many modern cryptographic protocols available which can be used for authenticating individual’s academic achievement certificates. Visual Cryptography is a simple and secure way to allow the secret sharing of images without any cryptographic computations or the use of encryption or decryption keys. The novelty of the visual secret sharing scheme is in its decryption process where human visual system (HVS) is employed for decryption of secret shares. In this paper we have discussed (3, 3) visual cryptography scheme which can be used to generate shares and distributes them among three parties, i.e. the Job Seeker, Certificate Issuance Authority and the Organization conducting Job interview. Secret message can be decrypted only if all the three shares are available. Every certificate carries a unique number which is encrypted using visual cryptography and without handshaking of all the parties it is impossible to decrypt, thus ensuring full proof authentication.


2019 ◽  
Author(s):  
Dr. Sheshang Degadwala ◽  
Dhairya Vyas ◽  
Arpana Mahajan

Author(s):  
Ekta Y

As IT sector is ruling the world now,confidentiality and security of information has become the most important inseparable aspect in information communication system. Keeping in view the same, a new approach called Visual Cryptography (VC) has been suggested by many researchers but there are some limitations with this scheme and cheating is one of the main problem among them. This paper intends to show the basis of cheating in VC in terms of cheating process, its detection methods and its prevention methods suggested by various researchers along with their merits and demerits. Finally, a good Cheating Immune Visual Cryptography Scheme (CIVCS) has been discussed which states the properties to be adopted by every Visual Cryptography scheme to make it immune to cheating attacks.


2003 ◽  
Vol 13 (6) ◽  
pp. 457-463
Author(s):  
Daoshun Wang ◽  
Ping Luo ◽  
Lu Yang ◽  
Dongxu Qi ◽  
Yiqi Dai

Sign in / Sign up

Export Citation Format

Share Document