Embedded Extended Visual Cryptography

Cryptography is used for sharing the text securely. Equally visual cryptography is used to share the images securely. The secret image is distributed to the participants using visual cryptography. The participants without much cryptography knowledge can recover the secret image. The extended visual cryptography scheme that contains meaningful shares when compared to the traditional visual cryptography that has random shares. The embedded extended visual cryptography which has the best visual quality when compared to the traditional one.

[1]  Pradeep Krishnadoss,et al.  OCSA: Task Scheduling Algorithm in Cloud Computing Environment , 2018 .

[2]  Farzin Ahammed T,et al.  A master share (2, n) XOR based visual cryptography scheme by random grids , 2015, 2015 International Conference on Control Communication & Computing India (ICCC).

[3]  Marten van Dijk,et al.  Visual Crypto Displays Enabling Secure Communications , 2003, SPC.

[4]  T. Prem Jacob,et al.  CGSA scheduler: A multi-objective-based hybrid approach for task scheduling in cloud environment , 2018, Inf. Secur. J. A Glob. Perspect..

[5]  Dongdai Lin,et al.  Cheating prevention visual cryptography scheme using Latin square , 2017, IET Inf. Secur..

[6]  Rohit Srivastava,et al.  Hierarchical visual cryptography for grayscale image , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[7]  Tzungher Chen,et al.  Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol , 2006, Pattern Recognit..

[8]  Jeng-Shyang Pan,et al.  Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[9]  Du-Ming Tsai,et al.  An independent component analysis-based filter design for defect detection in low-contrast surface images , 2006, Pattern Recognit..

[10]  Annalisa De Bonis,et al.  Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..

[11]  S. Govindaraju,et al.  Visual Secret Sharing Schemes for Color Images Using Halftoning , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[12]  S. Srinivasan,et al.  An efficient programming rule extraction and detection of violations in software source code using neural networks , 2012, 2012 Fourth International Conference on Advanced Computing (ICoAC).

[13]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Rohit Srivastava,et al.  A new technique for color share generation using visual cryptography , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[15]  Aaditya Jain,et al.  Visual cryptography and image processing based approach for secure transactions in banking sector , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).

[16]  Sheshang D. Degadwala,et al.  A study of privacy preserving system based on progressive VCS and RST attacks , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).

[17]  Snehal Pawar Extended capabilities of feature-extraction for digital image sharing by diverse image media , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).