Study of Various Visual Cryptography Schemes

@inproceedings{Poonam2015StudyOV,
  title={Study of Various Visual Cryptography Schemes},
  author={Poonam},
  year={2015}
}
  • Poonam
  • Published 2015
Security and Confidentiality is one of the most common aspects of information technology. The secure and effective protection of sensitive information is a primary concerns in any scientific, military, medical and commercial systems. This is achieved using different techniques for different types of information. Visual cryptography is one such technique that secures visual information, which is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
1 Citations
9 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-9 of 9 references

R.Z.[Ran-Zan], “Region Incrementing Visual Cryptography

  • Wang
  • SP Letters(16),
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…