Securing and Secrete Image Sharing Using Visual Cryptography Scheme

Abstract

To verify identity of person his /her physical or behavioural characteristics can be use,this strategy is called as Biometrics. Preservation of privacy of digital biometric data such as iris,face images etc. which stored in central database becomes more essential. This paper introduced the new visual cryptographic technique that allows encryption of visual information such that decryption can perform using human visual system hence cryptography computation does not required any extra hardware and software. In visual cryptography secrete image is encrypted into number of shares which independently can not reveal information about original image. For getting information about original image all sheets must be available simultaneously.

Authors and Affiliations

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase

Keywords

Related Articles

A Review on Speech Emotion Recognition Using Machine Learning

This paper focuses on the development of a robust speech emotion recognition system using a combination of different speech features with feature optimization techniques and speech de-noising technique to acquire improve...

A Brief Study on Web Technology

Technology has advanced at a rapid and efficient pace in recent years. Web technology is one of the technologies that allow computers to communicate with one another by using markup languages and multimedia applications....

Study of Challenges, Impact and Solutions in Sustainable Project Management for Green Construction

In recent years, India has seen an explosion in the environmentally conscious construction industry. Despite the widespread call for greener buildings to reduce their environmental impact, studies evaluating their effect...

Analysis of Routing Tag and Fault Tolerance of Proposed Triangle Network in the Presence of Faults

Routing tag provides the algorithm to pass the data from source to destination in a network. In this paper Fault Tolerance of the proposed MIN Triangle has been analysed . All the path lengths available from source to de...

Seismic Protection with Base Isolation Method Using ETABS

Base isolation is one of the most promising alternatives among the structure control methods. In recent decades, base isolation has been seriously considered for civil structures, such as buildings and bridges, subjected...

Download PDF file
  • EP ID EP749010
  • DOI -
  • Views 34
  • Downloads 0

How To Cite

Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase (2015). Securing and Secrete Image Sharing Using Visual Cryptography Scheme. International Journal of Innovative Research in Computer Science and Technology, 3(1), -. https://europub.co.uk./articles/-A-749010