A Three Way Visual Cryptography & its Application in biometric Security : A Review

Abstract

Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images.

Authors and Affiliations

Mr. Praveen Chouksey, Mr. Reetesh. Rai

Keywords

Related Articles

Studies on Induction of Mutation in Fenugreek (Trigonella fonum-graecum)

Mutation means a sudden heritable change in the genetic material at the gene on chromosome level. Mutations are the tools used to study the nature and function of genes which are the building blocks and basis of plant g...

Power Control of Grid Connected Fuel Cell Based Generation System

This paper presents the power control of a polymer electrolyte membrane fuel cell (PEMFC) based grid connected system. Control scheme for inverter control to get the desired active and reactive power output from PEMFC i...

Computer Aided Shrimp Disease Diagnosis in Aquaculture

Shrimp aquaculture mainly constitutes major economic processes in the world. Automation of some processes in aquaculture is becoming important. There could be great benefit from automation. Shrimp disease diagnosis is a...

Germination Characters under Water Stress in Anatolian Black Pine Populations

Germination characters included germination percentage (GP%), germination speed (GS), germination period (GP), and germination value (GV) were investigated in seeds under 0 (control), -2.0, -4.0 and -6.0 water stresses...

Optimization of Cycle Time by Lean Manufacturing Techniques-Line Balancing Approach

With the importance of being competitive in today's market, many companies are adopting various methods to improve their productivity. One way to achieve this is to adopt lean manufacturing techniques. With the mind-set...

Download PDF file
  • EP ID EP20415
  • DOI -
  • Views 250
  • Downloads 4

How To Cite

Mr. Praveen Chouksey, Mr. Reetesh. Rai (2015). A Three Way Visual Cryptography & its Application in biometric Security : A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(5), -. https://europub.co.uk./articles/-A-20415