2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514382
|View full text |Cite
|
Sign up to set email alerts
|

Securing Visual Cryptographic shares using Public Key Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Kaur and Khemchandani [18] presented a method for encrypting the shares generated using (2, 2) visual cryptography scheme. For encryption, they have used public key encryption-based RSA algorithm so as to obtain enhanced security of secret document.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kaur and Khemchandani [18] presented a method for encrypting the shares generated using (2, 2) visual cryptography scheme. For encryption, they have used public key encryption-based RSA algorithm so as to obtain enhanced security of secret document.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a few instances, the data transmitted using this form were also targeted at the attackers end. The public key encryption for the created image shares is embedded to render the method robust [7]. With time, the importance and relevance of video streaming data decreases, and this decline is also rightly proportional to the reliability of the multi-media data.…”
Section: A Literature Aspects Of Data Provenancementioning
confidence: 99%
“…The results of the proposed encryption algorithm will be analyzed by comparing with other existing encryption algorithms. The main aim of author is to expose the idea of implementing the Advanced Encryption algorithm using fuzzy logic [7].…”
Section: No Pixel Expansion 3 No Secret Keys Involved In Their Propmentioning
confidence: 99%