A Review of Color Visual Cryptographic Schemes
Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that t...
Gespeichert in:
Veröffentlicht in: | International journal of advanced networking and applications 2012-03, Vol.3 (5), p.1379 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 5 |
container_start_page | 1379 |
container_title | International journal of advanced networking and applications |
container_volume | 3 |
creator | Makhijani, Richa K Panjwani, Lavina D |
description | Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT] |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1016295531</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2670178591</sourcerecordid><originalsourceid>FETCH-proquest_journals_10162955313</originalsourceid><addsrcrecordid>eNpjYuA0sDQ31TUwsjBigbMtDTgYeIuLswyAwMzcwMLSkJNBz1EhKLUsM7VcIT9NwTk_J79IISyzuDQxR8G5qLKgJD-9KLEgIzNZITg5IzU3tZiHgTUtMac4lRdKczMou7mGOHvoFhTlF5amFpfEZ-WXFuUBpeINDQzNjCxNTY0NjYlTBQD89DO6</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1016295531</pqid></control><display><type>article</type><title>A Review of Color Visual Cryptographic Schemes</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Makhijani, Richa K ; Panjwani, Lavina D</creator><creatorcontrib>Makhijani, Richa K ; Panjwani, Lavina D</creatorcontrib><description>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</description><identifier>ISSN: 0975-0290</identifier><identifier>EISSN: 0975-0282</identifier><language>eng</language><publisher>Eswar Publications</publisher><ispartof>International journal of advanced networking and applications, 2012-03, Vol.3 (5), p.1379</ispartof><rights>Copyright Eswar Publications Mar/Apr 2012</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Makhijani, Richa K</creatorcontrib><creatorcontrib>Panjwani, Lavina D</creatorcontrib><title>A Review of Color Visual Cryptographic Schemes</title><title>International journal of advanced networking and applications</title><description>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</description><issn>0975-0290</issn><issn>0975-0282</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNpjYuA0sDQ31TUwsjBigbMtDTgYeIuLswyAwMzcwMLSkJNBz1EhKLUsM7VcIT9NwTk_J79IISyzuDQxR8G5qLKgJD-9KLEgIzNZITg5IzU3tZiHgTUtMac4lRdKczMou7mGOHvoFhTlF5amFpfEZ-WXFuUBpeINDQzNjCxNTY0NjYlTBQD89DO6</recordid><startdate>20120301</startdate><enddate>20120301</enddate><creator>Makhijani, Richa K</creator><creator>Panjwani, Lavina D</creator><general>Eswar Publications</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120301</creationdate><title>A Review of Color Visual Cryptographic Schemes</title><author>Makhijani, Richa K ; Panjwani, Lavina D</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_10162955313</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Makhijani, Richa K</creatorcontrib><creatorcontrib>Panjwani, Lavina D</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Makhijani, Richa K</au><au>Panjwani, Lavina D</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Review of Color Visual Cryptographic Schemes</atitle><jtitle>International journal of advanced networking and applications</jtitle><date>2012-03-01</date><risdate>2012</risdate><volume>3</volume><issue>5</issue><spage>1379</spage><pages>1379-</pages><issn>0975-0290</issn><eissn>0975-0282</eissn><abstract>Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. It is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The technique was proposed by Naor and Shamir in 1994. This paper reviews two methods for visual cryptography of color images based on past studies in black-and-white visual cryptography, the halftone technology, and the color decomposition method. [PUBLICATION ABSTRACT]</abstract><pub>Eswar Publications</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-0290 |
ispartof | International journal of advanced networking and applications, 2012-03, Vol.3 (5), p.1379 |
issn | 0975-0290 0975-0282 |
language | eng |
recordid | cdi_proquest_journals_1016295531 |
source | EZB-FREE-00999 freely available EZB journals |
title | A Review of Color Visual Cryptographic Schemes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T15%3A09%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Review%20of%20Color%20Visual%20Cryptographic%20Schemes&rft.jtitle=International%20journal%20of%20advanced%20networking%20and%20applications&rft.au=Makhijani,%20Richa%20K&rft.date=2012-03-01&rft.volume=3&rft.issue=5&rft.spage=1379&rft.pages=1379-&rft.issn=0975-0290&rft.eissn=0975-0282&rft_id=info:doi/&rft_dat=%3Cproquest%3E2670178591%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1016295531&rft_id=info:pmid/&rfr_iscdi=true |