ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY

Visual secret sharing is a technique in the science of visual cryptography, which is the emerging field in recent techno world for exchanging images safely. Despite each technology has its own strength and weakness too. This paper aimed to discuss, what are all the security application using visual...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced research in computer science 2017-09, Vol.8 (8), p.646-648
1. Verfasser: Priya, R. Shanmuga
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 648
container_issue 8
container_start_page 646
container_title International journal of advanced research in computer science
container_volume 8
creator Priya, R. Shanmuga
description Visual secret sharing is a technique in the science of visual cryptography, which is the emerging field in recent techno world for exchanging images safely. Despite each technology has its own strength and weakness too. This paper aimed to discuss, what are all the security application using visual secret sharing (VSS) available for recent emerging trends and its characteristics. It is quite tough task and this mission may help the researchers to develop information sharing effectively. VSS originally proposed by Moni Naor and Adi Shamir in 1994 and it was still developing and updated by the researchers for the recent trends. In VSS process an image was split into number of slices and shared to receiver. N images decrypt the original image and single share reveals nothing information, mostly this technique used in biometric process. Efficiency of this technique is how it is implemented in real world applications. This journal elaborates the applications which was used VSS for sharing images safely.
doi_str_mv 10.26483/ijarcs.v8i8.4861
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2406988086</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2406988086</sourcerecordid><originalsourceid>FETCH-LOGICAL-c706-edd78a596665bde62c74f414dda43cbfe7098d548e287e7efe2fd598908499cf3</originalsourceid><addsrcrecordid>eNpNkFFLwzAUhYMoOOZ-gG8FnzvTNk1uHsPotkBZR9MKewpdk8CGupk4wX9v63zwvNzD4XAufAg9JnieUgLZ8-HY-T7Mv-AAcwI0uUETzBmNc8rZ7T9_j2YhHPGgjHNK8AQJsRHlTkkVVctIbLelXIhGVhsVtUpuVtGLVK0oI1Us6qKJ1FrUY7qs6jFqa9nsHtCd616Dnf3dKWqWRbNYx2W1GsbKuGeYxtYYBl3OKaX53lia9ow4khBjOpL1e2cZ5mByAjYFZpl1NnUm58AxEM57l03R03X27E8fFxs-9fF08e_DR50STDkABjq0kmur96cQvHX67A9vnf_WCda_rPSVlR5Z6ZFV9gPPolir</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2406988086</pqid></control><display><type>article</type><title>ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Priya, R. Shanmuga</creator><creatorcontrib>Priya, R. Shanmuga ; Tamil University, Thanjavur, Tamilnadu, India</creatorcontrib><description>Visual secret sharing is a technique in the science of visual cryptography, which is the emerging field in recent techno world for exchanging images safely. Despite each technology has its own strength and weakness too. This paper aimed to discuss, what are all the security application using visual secret sharing (VSS) available for recent emerging trends and its characteristics. It is quite tough task and this mission may help the researchers to develop information sharing effectively. VSS originally proposed by Moni Naor and Adi Shamir in 1994 and it was still developing and updated by the researchers for the recent trends. In VSS process an image was split into number of slices and shared to receiver. N images decrypt the original image and single share reveals nothing information, mostly this technique used in biometric process. Efficiency of this technique is how it is implemented in real world applications. This journal elaborates the applications which was used VSS for sharing images safely.</description><identifier>ISSN: 0976-5697</identifier><identifier>EISSN: 0976-5697</identifier><identifier>DOI: 10.26483/ijarcs.v8i8.4861</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Cryptography ; Researchers ; Trends</subject><ispartof>International journal of advanced research in computer science, 2017-09, Vol.8 (8), p.646-648</ispartof><rights>Sep 2017. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Priya, R. Shanmuga</creatorcontrib><creatorcontrib>Tamil University, Thanjavur, Tamilnadu, India</creatorcontrib><title>ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY</title><title>International journal of advanced research in computer science</title><description>Visual secret sharing is a technique in the science of visual cryptography, which is the emerging field in recent techno world for exchanging images safely. Despite each technology has its own strength and weakness too. This paper aimed to discuss, what are all the security application using visual secret sharing (VSS) available for recent emerging trends and its characteristics. It is quite tough task and this mission may help the researchers to develop information sharing effectively. VSS originally proposed by Moni Naor and Adi Shamir in 1994 and it was still developing and updated by the researchers for the recent trends. In VSS process an image was split into number of slices and shared to receiver. N images decrypt the original image and single share reveals nothing information, mostly this technique used in biometric process. Efficiency of this technique is how it is implemented in real world applications. This journal elaborates the applications which was used VSS for sharing images safely.</description><subject>Cryptography</subject><subject>Researchers</subject><subject>Trends</subject><issn>0976-5697</issn><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkFFLwzAUhYMoOOZ-gG8FnzvTNk1uHsPotkBZR9MKewpdk8CGupk4wX9v63zwvNzD4XAufAg9JnieUgLZ8-HY-T7Mv-AAcwI0uUETzBmNc8rZ7T9_j2YhHPGgjHNK8AQJsRHlTkkVVctIbLelXIhGVhsVtUpuVtGLVK0oI1Us6qKJ1FrUY7qs6jFqa9nsHtCd616Dnf3dKWqWRbNYx2W1GsbKuGeYxtYYBl3OKaX53lia9ow4khBjOpL1e2cZ5mByAjYFZpl1NnUm58AxEM57l03R03X27E8fFxs-9fF08e_DR50STDkABjq0kmur96cQvHX67A9vnf_WCda_rPSVlR5Z6ZFV9gPPolir</recordid><startdate>20170901</startdate><enddate>20170901</enddate><creator>Priya, R. Shanmuga</creator><general>International Journal of Advanced Research in Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170901</creationdate><title>ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY</title><author>Priya, R. Shanmuga</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c706-edd78a596665bde62c74f414dda43cbfe7098d548e287e7efe2fd598908499cf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Cryptography</topic><topic>Researchers</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Priya, R. Shanmuga</creatorcontrib><creatorcontrib>Tamil University, Thanjavur, Tamilnadu, India</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Priya, R. Shanmuga</au><aucorp>Tamil University, Thanjavur, Tamilnadu, India</aucorp><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2017-09-01</date><risdate>2017</risdate><volume>8</volume><issue>8</issue><spage>646</spage><epage>648</epage><pages>646-648</pages><issn>0976-5697</issn><eissn>0976-5697</eissn><abstract>Visual secret sharing is a technique in the science of visual cryptography, which is the emerging field in recent techno world for exchanging images safely. Despite each technology has its own strength and weakness too. This paper aimed to discuss, what are all the security application using visual secret sharing (VSS) available for recent emerging trends and its characteristics. It is quite tough task and this mission may help the researchers to develop information sharing effectively. VSS originally proposed by Moni Naor and Adi Shamir in 1994 and it was still developing and updated by the researchers for the recent trends. In VSS process an image was split into number of slices and shared to receiver. N images decrypt the original image and single share reveals nothing information, mostly this technique used in biometric process. Efficiency of this technique is how it is implemented in real world applications. This journal elaborates the applications which was used VSS for sharing images safely.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><doi>10.26483/ijarcs.v8i8.4861</doi><tpages>3</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0976-5697
ispartof International journal of advanced research in computer science, 2017-09, Vol.8 (8), p.646-648
issn 0976-5697
0976-5697
language eng
recordid cdi_proquest_journals_2406988086
source EZB-FREE-00999 freely available EZB journals
subjects Cryptography
Researchers
Trends
title ANALYSIS OF APPLICATIONS USING VISUAL SECRET SHARING FOR SECURITY
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T16%3A52%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ANALYSIS%20OF%20APPLICATIONS%20USING%20VISUAL%20SECRET%20SHARING%20FOR%20SECURITY&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Priya,%20R.%20Shanmuga&rft.aucorp=Tamil%20University,%20Thanjavur,%20Tamilnadu,%20India&rft.date=2017-09-01&rft.volume=8&rft.issue=8&rft.spage=646&rft.epage=648&rft.pages=646-648&rft.issn=0976-5697&rft.eissn=0976-5697&rft_id=info:doi/10.26483/ijarcs.v8i8.4861&rft_dat=%3Cproquest_cross%3E2406988086%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2406988086&rft_id=info:pmid/&rfr_iscdi=true