Analysis of the Various Types of Security Attacks on Visual Cryptography

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Security has become an inseparable issue in information technology is ruling the world. Now-a-days, the most popular issue is to provide the security of the private (confidential) data from the unauthorized access. Today every person is want to hide the information from the another person. But, another person is interested to access the unauthorized data (information) of another person. The visual cryptography is used to hide the secret information from the unauthorized person. Visual cryptography scheme is firstly introduced by the researchers.
Download Now

Find By Topic