Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Survey on Visual Secret Sharing Scheme


Affiliations
1 Bharathiar University, Coimbatore, Tamil Nadu, India
2 Department of Computer Science, Government Arts College, Affiliated to Bharathiar University, Udumalpet, Tirupur, Tamil Nadu, India
3 St. Joseph's College, India
     

   Subscribe/Renew Journal


The formatting requirements for Visual cryptographic technique is used for secure communication, various secrets and multimedia information are transmitted over the internet and suitable techniques are required to prevent form the illegal usage of information. This paper provides the survey of various visual cryptographic schemes based on their performance. This paper focuses on various threshold schemes like N, (2, N),(3,N), (K,K) and (K,N). In order to improve the security issue over the communication channel meaningful shares are used. The visual cryptography for binary pictures is also discussed. Other performance measures such as pixel expansion, contrast, accuracy is discussed in this paper.


Keywords

Cryptography, Visual Cryptography, Visual Secret Sharing, Pixel Expansion, Contrast and Encoding.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 241

PDF Views: 1




  • A Survey on Visual Secret Sharing Scheme

Abstract Views: 241  |  PDF Views: 1

Authors

V. Maria Antoniate Martin
Bharathiar University, Coimbatore, Tamil Nadu, India
K. David
Department of Computer Science, Government Arts College, Affiliated to Bharathiar University, Udumalpet, Tirupur, Tamil Nadu, India
P. Mesiya
St. Joseph's College, India

Abstract


The formatting requirements for Visual cryptographic technique is used for secure communication, various secrets and multimedia information are transmitted over the internet and suitable techniques are required to prevent form the illegal usage of information. This paper provides the survey of various visual cryptographic schemes based on their performance. This paper focuses on various threshold schemes like N, (2, N),(3,N), (K,K) and (K,N). In order to improve the security issue over the communication channel meaningful shares are used. The visual cryptography for binary pictures is also discussed. Other performance measures such as pixel expansion, contrast, accuracy is discussed in this paper.


Keywords


Cryptography, Visual Cryptography, Visual Secret Sharing, Pixel Expansion, Contrast and Encoding.