scispace - formally typeset
Proceedings ArticleDOI

Implementation and Analysis of Various Visual Cryptographic Techniques for Sensitive Data Protection

TLDR
This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data like defense data.
Abstract
With the advancement of technology, more and more personal data are digitized, leading to increasing vulnerabilities in data. Protection of this data is a paramount importance for today’s era. Visual cryptography is the cryptographic technique in which various forms of visual data like pictures, texts, etc. are encrypted such that they cannot be directly read and need to be visually decrypted for use. Sensitive data like defense data involves diverse content types and different formats of data related to criminology, military, aeronautics, communications and space flights. Communicating the crucial data safely is a topic of vital concern for government. This paper intends to analyze the various cryptographic techniques and explore appropriate visual cryptographic solution for securing the sensitive data.

read more

References
More filters
Proceedings ArticleDOI

Security enhancement in image steganography using neural networks and visual cryptography

TL;DR: In order to enhance security mechanism, visual cryptography and image steganography are used together and Neural networks are concerned with identifying the best locations in host image in order to embed the secret data thus improving the image quality.
Journal ArticleDOI

Random grid based color visual cryptography scheme for black and white secret images with general access structures

TL;DR: The concept of random grid is extended to color pixel domain, and the XOR operation for color pixels is defined, and a scheme for RG-CBW-VCS which implements the GAS is introduced.
Proceedings ArticleDOI

Robust Watermarking of Image in the Transform Domain Using Edge Detection

TL;DR: The present work exploits this characteristic of the Human Visual system to embed a robust and imperceptible watermark in transform domain using edge detection and demonstrates the robustness of scheme against common image processing operations like cropping, low pass filter, noise and lossy JPEG compression with various quality index factor.
Journal ArticleDOI

A Visual Cryptographic Encryption Technique for Securing Medical Images

TL;DR: A visual cryptographic technique for encrypting of medical images before transmission or storage of them that will make such images inaccessible by unauthorized personnel and also ensures confidentiality is presented.
Journal ArticleDOI

Improved schemes for visual secret sharing based on random grids

TL;DR: Two improved schemes are proposed, namely RG-based VSS for general access structure (GAS) with improved contrast and extended RG- based VSS with improved access structure, both of which can achieve better contrast than previous schemes.