Implementation and Analysis of Various Visual Cryptographic Techniques for Sensitive Data Protection
TL;DR: This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data like defense data.
Abstract: With the advancement of technology, more and more personal data are digitized, leading to increasing vulnerabilities in data. Protection of this data is a paramount importance for today’s era. Visual cryptography is the cryptographic technique in which various forms of visual data like pictures, texts, etc. are encrypted such that they cannot be directly read and need to be visually decrypted for use. Sensitive data like defense data involves diverse content types and different formats of data related to criminology, military, aeronautics, communications and space flights. Communicating the crucial data safely is a topic of vital concern for government. This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data.
...read more
References
616 citations
"Implementation and Analysis of Vari..." refers background in this paper
...[13] In Halftone Visual Cryptography Scheme, each of the n shares of the image contributes a secret binary pixel which gets encoded into an array of sub-pixels, called the halftone cell....
[...]
384 citations
"Implementation and Analysis of Vari..." refers methods in this paper
...[14] Visual Cryptography Scheme for Grey images allows grey level images to be converted into binary image and then existing visual cryptography schemes are used to create image shares....
[...]
261 citations
"Implementation and Analysis of Vari..." refers background in this paper
...[15] Visual Cryptography Scheme for Colour images divides pixels into sub pixels with exactly one colored region and other black in color....
[...]
214 citations
"Implementation and Analysis of Vari..." refers background in this paper
...The random shares A and B can be seen by performing XOR on the two secret shares and the other secret image can be generated by 90 degree anti-clockwise rotation of A [17]....
[...]
176 citations
"Implementation and Analysis of Vari..." refers background in this paper
...[18] Progressive Visual Cryptography Scheme starts recovery process as soon as it gets shares and improves quality of the generated decrypted image....
[...]