Secure Visual Cryptography

Download Now
Provided by: International Journal Of Engineering And Computer Science
Topic: Security
Format: PDF
The existing system the dealer or sender takes a secret image and encodes into shares. After encoding this shares are sent to participants. The receiver collects the shares and stack to get decoded secret image. Here no verification is done so easy cheating is done. In this paper the authors proposed a system such that the dealer or sender takes one secret image and verification image. These two images are encoded into shares, after encoding sends one secret share and one verification share to the participants.
Download Now

Find By Topic