scispace - formally typeset
Book ChapterDOI

Secret Information Sharing Using Extended Color Visual Cryptography

Reads0
Chats0
TLDR
Generations of shares, where slight changes are performed accordingly, are implemented using XNOR operation, where alteration of the shares formed is not possible, and this gives a great perception of security issue being solved.
Abstract
Digitization of personal data is resulting in nefarious activities encircling them which in return perpetually call for immediate implementation of data security method, cryptography being one of them wherein sender can securely transmit the data over a secure platform. Sender can encrypt the data by encoding the text in an image, and receiver on another part can decode the message by collecting the respective shares. Generations of shares, where slight changes are performed accordingly, are implemented using XNOR operation. Until and unless all the shares are received by the receiver, the secret cannot be decoded, which provides an immense scope of security. Also alteration of the shares formed is not possible, and this gives a great perception of security issue being solved.

read more

References
More filters

Visual Cryptography

Moni Naor, +1 more
TL;DR: In this paper, a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations, is proposed, which is called k-out-of-n secret sharing.
Proceedings ArticleDOI

Limitations of Quantum & the Versatility of Classical Cryptography: A Comparative Study

TL;DR: This paper discusses in detail about the versatility of classical cryptography which ensures it an infinite future and the various limitations of quantum cryptography which detains it from becoming the ‘ultimate solution’ and emphasis on the various advantages that classical cryptography holds over quantum cryptography.
Proceedings ArticleDOI

Extended visual cryptography for color images using coding tables

TL;DR: This paper proposes a new VC scheme for color images that makes use of Jarvis error filter, a key table and specialized tables for coding, thereby reducing the suspicion of data encryption.
Proceedings ArticleDOI

Non-expanded visual cryptography scheme with authentication

TL;DR: This study combined the non-expanded scheme with the extra ability of hiding confidential data to prevent the detection of information.
Proceedings Article

A secured key-based digital text passing system through color image pixels

TL;DR: This paper is going to propose a framework for embed text string into digital color images and the text that is embedded is perceptually invisible to Human Visual System (HVS).