Study of Various Visual Cryptography Schemes

  title={Study of Various Visual Cryptography Schemes},
  • Poonam
  • Published 2015
Security and Confidentiality is one of the most common aspects of information technology. The secure and effective protection of sensitive information is a primary concerns in any scientific, military, medical and commercial systems. This is achieved using different techniques for different types of information. Visual cryptography is one such technique that secures visual information, which is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
1 Citations
9 References
Similar Papers


Publications citing this paper.


Publications referenced by this paper.
Showing 1-9 of 9 references

R.Z.[Ran-Zan], “Region Incrementing Visual Cryptography

  • Wang
  • SP Letters(16),
  • 2009
1 Excerpt

Similar Papers

Loading similar papers…