Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 12 SI
Page No. 9419 - 9424

Extended Visual Cryptography For Color Images Using Sterilization Algorithm

Authors : Gopal D. Dalvi and D.G. Wakde

References

Dixit, S., D.K. Jain and A. Saxena, 2014. An approach for secret sharing using randomised visual secret sharing. Proceedings of the 2014 4th International Conference on Communication Systems and Network Technologies (CSNT), April 7-9, 2014, IEEE, Bhopal, India, ISBN:978-1-4799-3070-8, pp: 847-850.

Han, Y., W. He, H. Dong and J. Liu, 2012. A verifiable visual cryptography scheme based on XOR algorithm. Proceedings of the 2012 IEEE 14th International Conference on Communication Technology (ICCT), November 9-11, 2012, IEEE, Chengdu, China, ISBN:978-1-4673-2101-3, pp: 673-677.

Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognit., 36: 1619-1629.
CrossRef  |  Direct Link  |  

Kang, I., G.R. Arce and H.K. Lee, 2011. Color extended visual cryptography using error diffusion. IEEE. Trans. Image Process., 20: 132-145.
CrossRef  |  PubMed  |  Direct Link  |  

Kaur, K. and V. Khemchandani, 2013. Securing visual cryptographic shares using public key encryption. Proceedings of the 2013 IEEE 3rd International Conference on Advance Computing (IACC), February 22-23, 2013, IEEE, Ghaziabad, India, ISBN:978-1-4673-4529-3, pp: 1108-1113.

Linju, P.S. and S. Mathews, 2016. An efficient interception mechanism against cheating in visual cryptography with non pixel expansion of images. Intl. J. Sci. Technol. Res., 5: 102-106.
Direct Link  |  

Mande, A.U. and M.N. Tibdewal, 2013. Parameter evaluation and review of various error-diffusion half toning algorithms used in color visual cryptography. Intl. J. Eng. Innovative Technol., 2: 185-190.
Direct Link  |  

Naor, M. and A. Shamir, 1994. Visual cryptography. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, May 9-12, 1994, Springer, Perugia, Italy, pp: 1-12.

Shankar, K. and P. Eswaran, 2015. Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput. Sci., 70: 462-468.
Direct Link  |  

Thampi, S.M., 2008. Information hiding techniques: A tutorial review. BCs Thesis, LBS Engineering College, Kasaragod, India.

Verma, J. and D.V. Khemchandani, 2012. A visual cryptographic technique to secure image shares. Intl. J. Eng. Res. Appl., 2: 1121-1125.
Direct Link  |  

Wang, R.Z. and S.F. Hsu, 2011. Tagged visual cryptography. IEEE. Signal Process. Lett., 18: 627-630.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved