Back close

OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images

Publication Type : Conference Paper

Publisher : Springer

Source : Advances in Intelligent Systems and Computing ((AISC,volume 683))

Url : https://link.springer.com/chapter/10.1007/978-3-319-68385-0_26

Campus : Coimbatore

Center : TIFAC CORE in Cyber Security

Department : TIFAC-CORE in Cyber Security

Year : 2017

Abstract : In visual cryptography, random shares are generated from a binary secret image whereas in extended visual cryptography, meaningful shares are generated using the scheme. There are lots of constructions in visual cryptography and extended visual cryptography for both general and special access structures. Here in this paper, we are proposing an extended visual cryptographic scheme with improved contrast and less pixel expansion for the special access structures (t, k, n) and where each participant hold single meaningful image as share. The cover images used for creating shares in the proposed schemes are complementary in nature.

Cite this Research Publication : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images, ISTA 2017, Advances in Intelligent Systems and Computing, Springer.

Admissions Apply Now