{"title":"视觉密码方案的广泛回顾","authors":"J. Ramya, B. Parvathavarthini","doi":"10.1109/ICCICCT.2014.6992960","DOIUrl":null,"url":null,"abstract":"Visual Cryptography is a special kind of cryptographic technique in which the decryption can perform by the human visual capability. In general, for some critical security issue the visual cryptography scheme is used, for example to identify the difference in human and machine. Similarly some other applications also use the visual cryptography schemes like scanning and printing, captcha etc. Hence the researchers developed many methods and techniques for the visual cryptography schemes. This paper is intended to study the various visual cryptography schemes and also to analysis the performance on the basis of expansion of pixel, number of secret images, image format and type of share generated. In addition we present a concise description about the instructions for future research.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"27 1","pages":"223-228"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"An extensive review on visual cryptography schemes\",\"authors\":\"J. Ramya, B. Parvathavarthini\",\"doi\":\"10.1109/ICCICCT.2014.6992960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Visual Cryptography is a special kind of cryptographic technique in which the decryption can perform by the human visual capability. In general, for some critical security issue the visual cryptography scheme is used, for example to identify the difference in human and machine. Similarly some other applications also use the visual cryptography schemes like scanning and printing, captcha etc. Hence the researchers developed many methods and techniques for the visual cryptography schemes. This paper is intended to study the various visual cryptography schemes and also to analysis the performance on the basis of expansion of pixel, number of secret images, image format and type of share generated. In addition we present a concise description about the instructions for future research.\",\"PeriodicalId\":6615,\"journal\":{\"name\":\"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)\",\"volume\":\"27 1\",\"pages\":\"223-228\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCICCT.2014.6992960\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICCT.2014.6992960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An extensive review on visual cryptography schemes
Visual Cryptography is a special kind of cryptographic technique in which the decryption can perform by the human visual capability. In general, for some critical security issue the visual cryptography scheme is used, for example to identify the difference in human and machine. Similarly some other applications also use the visual cryptography schemes like scanning and printing, captcha etc. Hence the researchers developed many methods and techniques for the visual cryptography schemes. This paper is intended to study the various visual cryptography schemes and also to analysis the performance on the basis of expansion of pixel, number of secret images, image format and type of share generated. In addition we present a concise description about the instructions for future research.