International Journal of Soft Computing

Year: 2016
Volume: 11
Issue: 6
Page No. 374 - 381

DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage

Authors : K. Brindha and N. Jeyanthi

References

Blundo, C., A. de Santis and M. Naor, 2000. Visual cryptography for grey level images. Inform. Process. Lett., 75: 255-259.
CrossRef  |  Direct Link  |  

Chavan, P.V., D. Atique and D. Malik, 2014. Design and implementation of hierarchical visual cryptography with expansion less shares. Int. J. Network Secur. Appl., 6: 91-102.
Direct Link  |  

Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognit., 36: 1619-1629.
CrossRef  |  Direct Link  |  

Ito, R., H. Kuwakado and H. Tanaka, 1999. Image size invariant visual cryptography. IEICE Trans. Fundam., E82-A: 2172-2177.
Direct Link  |  

Jaafar, A. and A. Samsudin, 2012. A survey of black-and-white visual cryptography models. Int. J. Digital Content Technol. Appl., 6: 1-12.

Jaya, J., 2013. Securing cloud data and cheque truncation system with visual cryptography. Int. J. Comput. Appl., 70: 16-21.
CrossRef  |  Direct Link  |  

Lee, K.H. and P.L. Chiu, 2012. An extended visual cryptography algorithm for general access structures. IEEE Trans. Inform. Forensics Secur., 7: 219-229.
CrossRef  |  

Lin, C.C. and W.H. Tsai, 2003. Visual cryptography for gray-level images by dithering techniques. Pattern Recognit. Lett., 24: 349-358.
CrossRef  |  

Moni, N. and A. Shamir, 1995. Visual Cryptography Advances in Cryptology-Eurocrypt'94. Springer, Berlin, Germany,.

Nung, Y.A.N.G.C. and T.C.H.E.N. Shih, 2005. Size-adjustable visual secret sharing schemes. IEICE. Trans. Fundam. Electron. Commun. Comput. Sci., 88: 2471-2474.
Direct Link  |  

Nung, Y.A.N.G.C. and T.C.H.E.N. Shih, 2006. New size-reduced visual secret sharing schemes with half reduction of shadow size. IEICE. Trans. Fundam. Electron. Commun. Comput. Sci., 89: 620-625.
Direct Link  |  

Stallings, W., 2003. Cryptography and Network Security Principles and Practice. 3rd Edn., Prentice-Hall of India Pvt. Ltd., India.

Thien, C.C. and J.C. Lin, 2002. Secret image sharing. Comput. Graph., 26: 765-770.
CrossRef  |  Direct Link  |  

Wan, Z., J. Liu and R.H. Deng, 2012. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forensics Secur., 7: 743-754.
CrossRef  |  

Yang, C.N. and T.S. Chen, 2007. Extended visual secret sharing schemes: Improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell., 21: 879-898.
Direct Link  |  

Yang, C.N., 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett., 25: 481-494.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved