|k-n Share Generation For Securing Color Images Using Visual Cryptography|
|Robin Renji Abraham, Jeena P Achenkunju, Aneena Thomas, Gouri R Sekhar, Rincy Roy Oommen|
|Cite This Article:|
k-n Share Generation For Securing Color Images Using Visual Cryptography, International Journal of Innovative Research in Technology(www.ijirt.org) ,ISSN: 2349-6002 ,Volume 5 ,Issue 12 ,Page(s):339-343 ,May 2019 ,Available :IJIRT148085_PAPER.pdf
|Visual Cryptography, VCS, EVCS, Blowfish, RGB color image, Share Generation, Encryption.|
|Cryptography is a way through which information can be made invisible to the users by encrypting them. The visual cryptography permits user outlined pictures to be divided into multiple range of shares known as clear shares (Transparent Shares). A color image to be protected and a binary image used as key to write and re-write square measure taken as input. After applying the visual cryptographic technique, then solely the pictures square measures to be transmitted; As a result the hacker cannot perceive the distorted image and thus the digital communication become secured. The most notable feature of this approach that it will recover a secret image with none computation. It exploits the human sensory system to browse the key image from few overlapping shares. Thus overcomes the disadvantage of advanced computation needed within the ancient visual cryptography. Mainly this paper describes however color image cryptography and decipherment tired visual cryptography by generating multiple shares. Blowfish algorithmic rule is used for color image cryptography and decipherment in visual cryptography. The planned technique is additionally enforced in Matlab for RGB color pictures.|
|Unique Paper ID: 148085|
Publication Volume & Issue: Volume 5, Issue 12
Page(s): 339 - 343
|Article Preview & Download|
Comprehensive Analysis of Energy Aware Clustering ...
Paper ID : IJIRT148784
Performance Analysis of Solar Water Heater Evacuat...
Paper ID : IJIRT148783
A Practical Guide to live a Great Life in 2020 & b...
Paper ID : IJIRT148781
PERFORMANCE ANALYSIS OF LOAD BALANCING ALGORITHM I...
Paper ID : IJIRT148779
Review on various Face Artefact Detection mechanis...
Paper ID : IJIRT148778