Cryptography Project Report Visual Cryptography

In this paper Visual Cryptography is going to be reviewed and summarized by first giving an overview of it, then how it works, its applications, modern uses, pros and cons and its summary and future according to referenced research. Furthermore; this paper represents a thorough literature review of Visual Cryptography along with its many aspects and up to date research so far in this field.

See Full PDF See Full PDF

Related Papers

IJSRD - International Journal for Scientific Research & Development

Cryptography is a technique used for encryption of data (pictures, text, etc.) which involves key to decrypt the data encrypted which can only be done by desired recipient. It depends on type of key used to decrypt it that is private or public key. It was created for security purpose, but the key used in this can act as a major loophole sometimes. To overcome this, there is a technique called visual cryptography which does not use key. It can only be decrypted by human eye. In this paper proposed information is about visual cryptography methods and schemes.

Download Free PDF View PDF

Download Free PDF View PDF

Image cryptography is emerging field of the research. There are various techniques has been established for cryptography. The many encryption techniques have been used for hide the visual information (pictures, text, etc.) in images. The main idea of encryption is possibility of decryption by the human vision if the correct key image is used is known as visual cryptography. In this paper, different research has been discussed for Visual Cryptography.

Download Free PDF View PDF

Download Free PDF View PDF

International Journal of Computer Applications

Download Free PDF View PDF

International Journal of Engineering Research and Technology (IJERT)

https://www.ijert.org/a-brief-introduction-of-visual-cryptography https://www.ijert.org/research/a-brief-introduction-of-visual-cryptography-IJERTV3IS030818.pdf Visual cryptography is a cryptographic method for securing images. In visual cryptography images are divided into n-number of shares which provide security for the images and stacking or overlapping of these shares reveal the original secret image. Initially, it was developed for binary images. Different schemes are used to generate shares for secret images. Later in visual cryptography many advance methods are came into exist, those are extended visual cryptography, Visual cryptography for color images i.e. grey and RGB/CMY images. These methods are meant only for revealing the whole secret image. For revealing images part-wise which means region by region image, Region Incrementing Visual cryptography method is developed.

Download Free PDF View PDF

Visual cryptography is an encryption technique which is used to hide information of an image in multiple secret shares. These shares make the secrecy levels. For n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode(n+1) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by superimposing any three shares, information upto second level could be seen. In similar way, for revealing whole information all the (n+1) shares are superimposed. In this paper, we are comparing many visual cryptography algorithms. Traditional visual cryptography Algorithms were based on permutation whereas modern approach are based on random column selection. In Proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography.

Download Free PDF View PDF

Cryptography is study of transforming information in order to make it secure from unintended recipients or use. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts visual information (picture, printed text, handwritten notes) such that decryption can be performed using human visual system. The idea is to convert this visual information into an image and encypher this image into n different shares (known as sheets). The deciphering only requires selecting some shares out of n shares. The intent of this review paper is to contribute the readers an overview of the basic visual cryptography scheme constructions as well as continued work in the area. In inclusion, we also review some applications that take advantage of such secure system.

Download Free PDF View PDF

— In recent period of time security of the transmitted data is most critical problem, as network technology is greatly advanced and heaps of information is transmitted via net. Visual cryptography strategy is one of the most secure technique for privacy auspices, that allow the encryption of secret image or data by transferring it into the secure percentage and such a strategy is able to recover the secret image or data. This behavior makes visual cryptography especially useful for the low computation load requirement. In this paper, we are providing the information regarding information security by using Visual Cryptography scheme by making use of exclusive new technique of splitting of images along with their pixels rotation with the help of generated random number. We also have made an attempt to overcome some of the disadvantages of preexisting techniques of encryption and decryption. Finally, successful transmission of the message from transmitting end to receiving end without any interception was done. Most importantly, it is very difficult to hack by use of any professional hacking techniques as the message is encrypted twice. Hence the data is highly secured under transmission path.

Download Free PDF View PDF

ryptography is study of transforming information in order to make it secure from unintended recipients. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts any information [picture, printed text, etc] such that decryption can be performed using human visual system. The goal of this survey paper is to give the readers an overview of the basic visual cryptography schemes constructions, as well as the new techniques derived from VCS. We also review some applications that take advantage of such secure schemes.

Download Free PDF View PDF