|k-n Share Generation For Securing Color Images Using Visual Cryptography|
|Robin Renji Abraham, Jeena P Achenkunju, Aneena Thomas, Gouri R Sekhar, Rincy Roy Oommen|
|Cite This Article:|
k-n Share Generation For Securing Color Images Using Visual Cryptography, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 12 ,Page(s):339-343 ,May 2019 ,Available :IJIRT148085_PAPER.pdf
|Visual Cryptography, VCS, EVCS, Blowfish, RGB color image, Share Generation, Encryption.|
|Cryptography is a way through which information can be made invisible to the users by encrypting them. The visual cryptography permits user outlined pictures to be divided into multiple range of shares known as clear shares (Transparent Shares). A color image to be protected and a binary image used as key to write and re-write square measure taken as input. After applying the visual cryptographic technique, then solely the pictures square measures to be transmitted; As a result the hacker cannot perceive the distorted image and thus the digital communication become secured. The most notable feature of this approach that it will recover a secret image with none computation. It exploits the human sensory system to browse the key image from few overlapping shares. Thus overcomes the disadvantage of advanced computation needed within the ancient visual cryptography. Mainly this paper describes however color image cryptography and decipherment tired visual cryptography by generating multiple shares. Blowfish algorithmic rule is used for color image cryptography and decipherment in visual cryptography. The planned technique is additionally enforced in Matlab for RGB color pictures.|
|Unique Paper ID: 148085|
Publication Volume & Issue: Volume 5, Issue 12
Page(s): 339 - 343
|Article Preview & Download|
Experimental Study on Lightweight Fly Ash Aggregat...
Paper ID : IJIRT148696
CFD ANALYSIS ON WASTE HEAT RECOVERY UTILIZING THER...
Paper ID : IJIRT148692
AN INTRODUCTION TO SPHERICAL FUZZY TOPOLOGICAL SPA...
Paper ID : IJIRT148683
Auto secure: A Device with Emotion Detection Enabl...
Paper ID : IJIRT148682
A REVIEW: STRUCTURAL OPTIMIZATION OF RAILWAY SLEEP...
Paper ID : IJIRT148681