scholarly journals A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications

IARJSET ◽  
2017 ◽  
Vol 4 (2) ◽  
pp. 1-5 ◽  
Author(s):  
Elham Shahab ◽  
Hadi Abdolrahimpour
2017 ◽  
Author(s):  
Elham Shahab ◽  
Hadi Abdolrahimpour

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.


2017 ◽  
Author(s):  
Elham Shahab ◽  
Hadi Abdolrahimpour

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.


2017 ◽  
Author(s):  
Elham Shahab ◽  
Hadi Abdolrahimpour

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.


2017 ◽  
Author(s):  
Elham Shahab ◽  
Hadi Abdolrahimpour

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the main input. The decryption way in this scenario is done through superimposing shares on top of each other to receive the input image. No computer participation is required, thus showing one of the distinguishing features of VC. It is claimed that VC is a unique technique in the sense that the encrypted message can be decrypted directly by the human visual system.


Author(s):  
Amreek Singh ◽  
Warren G. Foster ◽  
Anna Dykeman ◽  
David C. Villeneuve

Hexachlorobenzene (HCB) is a known toxicant that is found in the environment as a by-product during manufacture of certain pesticides. This chlorinated chemical has been isolated from many tissues including ovary. When administered in high doses, HCB causes degeneration of primordial germ cells and ovary surface epithelium in sub-human primates. A purpose of this experiment was to determine a no-effect dose of the chemical on the rat ovary. The study is part of a comprehensive investigation on the effects of the compound on the biochemical, hematological, and morphological parameters in the monkey and rat.


Author(s):  
Ekta Y

As IT sector is ruling the world now,confidentiality and security of information has become the most important inseparable aspect in information communication system. Keeping in view the same, a new approach called Visual Cryptography (VC) has been suggested by many researchers but there are some limitations with this scheme and cheating is one of the main problem among them. This paper intends to show the basis of cheating in VC in terms of cheating process, its detection methods and its prevention methods suggested by various researchers along with their merits and demerits. Finally, a good Cheating Immune Visual Cryptography Scheme (CIVCS) has been discussed which states the properties to be adopted by every Visual Cryptography scheme to make it immune to cheating attacks.


Sign in / Sign up

Export Citation Format

Share Document