This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
A Review on Data Hididng using Steganography & Visual Cryptography
Authors
  Ms. Megha B. Goel,  Mr. M. S. Chaudhari,  Mrs. Shweta A. Gode
Abstract
Steganography is the art & science of hiding data in the images. From thousands of year, our ancestors have invented various ways to pass information in hidden form from one place to another place. For eg. Papyrus scroll, cryptex, invisible ink, tattooing, pencil marks on handwritten characters etc. Cryptography is a technique which converts the data or simple text into an unreadable form. Visual cryptography schemes hide the secret image into two or more images which are called shares. It is different from the traditional cryptography, because for decrypting the secret image, it does not need any complex computation. The secret image can be decrypted or recovered when all the shares are stacked together. The advantage of visual cryptography is that if any one captures a share then single share would not reveal anything about the data. In this paper, we discuss about various visual cryptographic schemes based on share generated is meaningful or meaningless, type of secret images (either binary or color) and number of secret images (either single or multiple) encrypted by the various visual cryptography scheme. Also this paper proposed a new way for hiding data in images by combining steganography & visual cryptography.
Keywords- Steganography, Cryptography, Visual cryptography, Shares
Publication Details
Unique Identification Number - IJEDR1401117Page Number(s) - 647-652Pubished in - Volume 2 | Issue 1 | March 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Ms. Megha B. Goel,  Mr. M. S. Chaudhari,  Mrs. Shweta A. Gode,   "A Review on Data Hididng using Steganography & Visual Cryptography", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 1, pp.647-652, March 2014, Available at :http://www.ijedr.org/papers/IJEDR1401117.pdf
Article Preview
|
|
||||||
|