A Novel Visual Cryptographic Algorithm for Color Images Using Matrix Transpose Technique
Abstract
Keywords
Full Text:
PDFReferences
Sara Tedmomi and Nijad Al-Najdami, “Lossless Image Cryptography Algorithm based on Discrete Cosine Transform”, The international Arab Journal of Information Technology, Vol. 9, No. 5, 2012.
Namrate Joshi and Vishal Sharma, “A Review New Methodology for Visual Cryptography in Color Image Based on Cyclic Shift Pixel Method”, International Journal of Engineering Research and Technology (IJERT), Vol. 1, No. 6, 2012.
Ayan Banerjee and Sreya Banerjee, “A Robust Visual Cryptography Technique for Photographic Grayscale Image using Block Optimization and Blind Invisible WaterMarking”, International Journal of Computer Theroy and Enginnering, Vol. 4, No. 2, 2012.
Lavanya Bandamneni, V. Venkatra Rao, “Color Extended Visual Cryptography Using Error Diffusion for High Visual Quality Shares”, International Journal of Electronics and Computer Science Engineering, Vol. 1, No. 3, pp. 1176-1182, 2012.
S. Bosu Babu and S. S. P. Kumar, “Enhanced Color Visual Cryptography”, JRACST – Engineering Science and Technolgoy: An International Journal (ESTIJ), Vol. 2, No. 5, 2012.
Tripta Deendayal and Ch.Sunitha , “Enhanced Visual Cryptography Using color Error diffusion and Digital Watermarking”, International Journal Computer Technology & Applications, Vol. 3, Issue.1, 261-264, 2012.
N. Madhumidha and S. Chandramathi, “Visual Cryptography for Color Image Using Color Error Diffusion”, Bonfring International Journal of Advances in Image Processing, Vol. 2, Issue 1, Part 2, 2012.
Sesha Pallavi Indrakanti, P. S. Aradhani, “Permutation based Image Encryption Technique”, International Journals of Computer Applications, Vol. 28, No. 8, 2011.
M. Agnihotra Sharma and M. Chinna RaoVisual, “Cryptography Authentication for Data Matrix Codes”, International Journal of Computer Science and Telecommunication, Vol. 2, No. 8, pp. 58-62, 2011.
Shyamalendu Kandar and Bibhas Chandra Dhara, “k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence”, International Journal of Computer Applications, Vol 25– No.11, 2011.
M. Arun Kumar and K Jhon singh, “Novel Secure Technique Using Visual Cryptography and Advance AES for Images”, International Journal of Knowledge Management and e-learning, Vol. 3, No. 1, pp. 29-34, 2011.
Nagaraj V. Dharwadkar, B. B. Amberker, Sushil Raj Joshi, “Visual Cryptography for Color Image Using Color Error Diffusion”, ICGSI – GVIP Journal, Vol. 10, No. 1, 2010.
Kiran Kumari, Shalini Bhatia, “Multi-Pixel Visual Cryptography for Color Images with Meaningful Shares”, International Journal of Engineering Science and Technology, Vol. 2, No. 6, pp. 2398-2407, 2010.
Musheer Ahmad and M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journals of Computer Science and Engineering, Vol. 2, No. 1, pp. 46-50, 2009.
C. Dongming, Z. zhiliang and Y. Guangming, "An Improved Image Encryption Algorithm Based on Chaos", IEEE International Conference for Young Computer Scientists, pp. 2792-2796, 2008.
Mizuho Nakajima and Yasushi Yamaguchi, “Extended Visual Cryptography”, ICCSI Journal, Vol 2 Issue 2, 2008.
Zhi Zhou, Gonzalo R. Arce, Giovanni Dicrescenzo, “Halftone Visual Cryptography”, IEEE Transaction on Image Processing, Vol. 15, No. 8, 2006.
N. K. Pareek, V. Patidar, K. K. Sud, “Image encryption using chaotic logistic map.” Image and Vision Computing, Vol. 24, No. 9, pp. 926–934, 2006.
Young-Chang Hou, “Visual Cryptography for Color Images”, Pattern Recognition, The Journal of the Pattern Recognition Society, Vol. 36, pp. 1619-1629, 2003.
Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformed Algorithm”, IAENG International Journal of Computer Science, Vol. 35, No. 1, 2003.
Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson. “Extended capabilities for visual cryptography”, Theoretical Computer Science, Vol. 250, No 1-2, pp. 143–161,Jan 6, 2001.
M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt, pp. 1–12, 1994.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.