Learn More
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual cryptography scheme depends, such as(More)
—Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are(More)
In recent years, there has been a rapid growth on information technology for people to communicate on the Internet. Since Internet is public, anyone can easily read the information and perform successful transmissions without protection. In the present era of computers and fast communication, one needs to protect the communicated information from(More)
The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. New threats, risks and vulnerabilities emphasize the need of a strong authentication system. Automated methods based on physiological characteristics of user are widely used to identify and verify the user. Biometric is the technology(More)
This paper introduces recursively hiding patient’s information using XOR based Recursive Visual Cryptography. The XOR based Visual Cryptography Scheme (VCS) encodes a secret image of data into several shares which are not understood by intruders individually. Here (2, 2) VCS is considered for paper. Its pixel expansion has more columns then original and(More)
  • 1