(35.171.164.77)
[ij] [ij] [ij] 
Email id
 

Research Journal of Pharmacy and Technology
Year : 2016, Volume : 9, Issue : 12
First page : ( 2276) Last page : ( 2282)
Print ISSN : 0974-3618. Online ISSN : 0974-360X.
Article DOI : 10.5958/0974-360X.2016.00459.5

A comprehensive survey on visual cryptography techniques

Brindha K.*, Jeyanthi N.

School of Information Technology and Engineering, VIT University, Vellore-632014, Tamilnadu, India

*Corresponding Author E-mail: brindha.k@vit.ac.in, njeyanthi@vit.ac.in

Online published on 2 March, 2017.

Abstract

In the current scenario the secure transmission of information has become a prime challenging task. The major security issues are confidentiality, authentication, privacy and data integrity. In this concern various security schemes have been developed and Cryptography is one of the techniques which involves complex computations though it facilitates transferring the data in a concealed format and later obtaining the correct information. Hence the paramount need of the hour is a technique which provides total information security without any mathematical primitives. Visual Cryptography technique seems to be the most apt and the least complicated one which fulfils all the requirements of information security. This technique takes the information in the form of images, transfers them into various shares and reveals the same actual information by superimposing them. In this article, we discuss various latest visual cryptography techniques with their parameters and applications.

Top

Keywords

Confidentiality, Authentication, Data integrity, Cryptography, Visual Cryptography.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
812,264,361 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.