Learn More
Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. However, the previous(More)
Reducing the pixel expansion and improving the display quality of recovered images are still major issues in visual cryptography schemes (VCSs), particularly for large <i>k</i> and <i>n</i>. Moreover, the development of a systematic and practical approach for threshold VCSs is a challenge. In this paper, a pixel-expansion-free threshold VCSs approach based(More)
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design.(More)
Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares. Hence, VSS schemes suffer from(More)
Visual cryptography schemes (VCSs) generate random and meaningless shares to share and protect secret images. Conventional VCSs suffer from a transmission risk problem because the noise-like shares will raise the suspicion of attackers and the attackers might intercept the transmission. Previous research has involved in hiding shared content in halftone(More)
Conventional cryptography is a method of transforming message into an unreadable format called as cipher text. This cipher text can easily be shared over the network without fear but anyone can get message easily by applying key on cipher text. Sharing and delivering secret images over the network is also known as a visual secret sharing (VSS) scheme.(More)
This paper introduces recursively hiding patient’s information using XOR based Recursive Visual Cryptography. The XOR based Visual Cryptography Scheme (VCS) encodes a secret image of data into several shares which are not understood by intruders individually. Here (2, 2) VCS is considered for paper. Its pixel expansion has more columns then original and(More)
  • Sandeep Singh Baghel, Ajay Goyal, +36 authors Sneha U. Bohra
  • 2016
Data integrity and confidentiality is major issue in internet based communication. For the integrity and confidently used various cryptography and stenography technique. The traditional message hiding technique faced a problem of intruder. The intruder easily decrypts the image and gets information. For the improvement of security strength used various key(More)