scispace - formally typeset
Proceedings ArticleDOI

Implementation and Analysis of Various Visual Cryptographic Techniques for Sensitive Data Protection

TLDR
This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data like defense data.
Abstract
With the advancement of technology, more and more personal data are digitized, leading to increasing vulnerabilities in data. Protection of this data is a paramount importance for today’s era. Visual cryptography is the cryptographic technique in which various forms of visual data like pictures, texts, etc. are encrypted such that they cannot be directly read and need to be visually decrypted for use. Sensitive data like defense data involves diverse content types and different formats of data related to criminology, military, aeronautics, communications and space flights. Communicating the crucial data safely is a topic of vital concern for government. This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data.

read more

References
More filters
Journal ArticleDOI

Visual Cryptography for General Access Structures

TL;DR: This paper examines graph-based access structures, i.e., access structures in which any qualified set of participants contains at least an edge of a given graph whose vertices represent the participants of the scheme, and provides a novel technique for realizing threshold visual cryptography schemes.
Journal ArticleDOI

Halftone visual cryptography

TL;DR: The proposed method utilizes the void and cluster algorithm to encode a secret binary image into n halftone shares (images) carrying significant visual information, and shows that the visual quality of the obtained halftones are observably better than that attained by any available visual cryptography method known to date.
Journal ArticleDOI

Visual cryptography for gray-level images by dithering techniques

TL;DR: A (k, n)-threshold visual cryptography scheme is proposed to encode a secret image into n shadow images, where any k or more of them can visually recover the secret image, but any k - 1 or fewer of them gain no information about it.
Journal ArticleDOI

Sharing multiple secrets in visual cryptography

TL;DR: This paper proposes a visual secret sharing scheme that encodes a set of x≥2 secrets into two circle shares such that none of any single share leaks the secrets and the x secrets can be obtained one by one by stacking the first share and the rotated second shares with x different rotation angles.
Proceedings Article

Extended visual cryptography for natural images

TL;DR: This paper presents a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures, which are reconstructed by printing the two output images onto transparencies and stacking them together.