A Review of Color Visual Cryptographic Schemes

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced networking and applications 2012-03, Vol.3 (5), p.1379
Hauptverfasser: Makhijani, Richa K, Panjwani, Lavina D
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 5
container_start_page 1379
container_title International journal of advanced networking and applications
container_volume 3
creator Makhijani, Richa K
Panjwani, Lavina D
description Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1016295531</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2670178591</sourcerecordid><originalsourceid>FETCH-proquest_journals_10162955313</originalsourceid><addsrcrecordid>eNpjYuA0sDQ31TUwsjBigbMtDTgYeIuLswyAwMzcwMLSkJNBz1EhKLUsM7VcIT9NwTk_J79IISyzuDQxR8G5qLKgJD-9KLEgIzNZITg5IzU3tZiHgTUtMac4lRdKczMou7mGOHvoFhTlF5amFpfEZ-WXFuUBpeINDQzNjCxNTY0NjYlTBQD89DO6</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1016295531</pqid></control><display><type>article</type><title>A Review of Color Visual Cryptographic Schemes</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Makhijani, Richa K ; Panjwani, Lavina D</creator><creatorcontrib>Makhijani, Richa K ; Panjwani, Lavina D</creatorcontrib><description>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</description><identifier>ISSN: 0975-0290</identifier><identifier>EISSN: 0975-0282</identifier><language>eng</language><publisher>Eswar Publications</publisher><ispartof>International journal of advanced networking and applications, 2012-03, Vol.3 (5), p.1379</ispartof><rights>Copyright Eswar Publications Mar/Apr 2012</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Makhijani, Richa K</creatorcontrib><creatorcontrib>Panjwani, Lavina D</creatorcontrib><title>A Review of Color Visual Cryptographic Schemes</title><title>International journal of advanced networking and applications</title><description>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</description><issn>0975-0290</issn><issn>0975-0282</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpjYuA0sDQ31TUwsjBigbMtDTgYeIuLswyAwMzcwMLSkJNBz1EhKLUsM7VcIT9NwTk_J79IISyzuDQxR8G5qLKgJD-9KLEgIzNZITg5IzU3tZiHgTUtMac4lRdKczMou7mGOHvoFhTlF5amFpfEZ-WXFuUBpeINDQzNjCxNTY0NjYlTBQD89DO6</recordid><startdate>20120301</startdate><enddate>20120301</enddate><creator>Makhijani, Richa K</creator><creator>Panjwani, Lavina D</creator><general>Eswar Publications</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120301</creationdate><title>A Review of Color Visual Cryptographic Schemes</title><author>Makhijani, Richa K ; Panjwani, Lavina D</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_10162955313</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Makhijani, Richa K</creatorcontrib><creatorcontrib>Panjwani, Lavina D</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Makhijani, Richa K</au><au>Panjwani, Lavina D</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Review of Color Visual Cryptographic Schemes</atitle><jtitle>International journal of advanced networking and applications</jtitle><date>2012-03-01</date><risdate>2012</risdate><volume>3</volume><issue>5</issue><spage>1379</spage><pages>1379-</pages><issn>0975-0290</issn><eissn>0975-0282</eissn><abstract>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</abstract><pub>Eswar Publications</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-0290
ispartof International journal of advanced networking and applications, 2012-03, Vol.3 (5), p.1379
issn 0975-0290
0975-0282
language eng
recordid cdi_proquest_journals_1016295531
source EZB-FREE-00999 freely available EZB journals
title A Review of Color Visual Cryptographic Schemes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T15%3A09%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Review%20of%20Color%20Visual%20Cryptographic%20Schemes&rft.jtitle=International%20journal%20of%20advanced%20networking%20and%20applications&rft.au=Makhijani,%20Richa%20K&rft.date=2012-03-01&rft.volume=3&rft.issue=5&rft.spage=1379&rft.pages=1379-&rft.issn=0975-0290&rft.eissn=0975-0282&rft_id=info:doi/&rft_dat=%3Cproquest%3E2670178591%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1016295531&rft_id=info:pmid/&rfr_iscdi=true