DOI Prefix : 10.9780 | Journal DOI : 10.9780/22307850
Scroll to Top

Volume : V, Issue : III, April - 2015

HYBRID SCHEME FOR SECRET SHARING USING SYMMETRIC KEY AND MULTI SECRET SHARING

Deepak Dhull, Rakhi Soni

DOI : 10.9780/22307850, By : Laxmi Book Publication

Abstract :

Visual cryptography technique encodes the information in such a way that decoding can be performed by human visual system without any intricate decoding process. It is a special encryption technique in which any text/secret which has to be encrypted is taken in the form of images. It slice image into randomly looking noise called shares, which when stacked together in any manner with proper alignment reveals out the secret. As visual cryptography, is a secure method for transmitting secret, but it has its cons also. If someone gets access to all shares, he/she can divulge secret easily. The proposed technique first encrypts the secret using a symmetric key and then divides the secret into shares. After overlapping of shares, secret is not appears, until the symmetric key is not known. This paper discusses multi secret sharing schemes in which m secrets can be implanted into m shares, hence reducing memory wastage and enhancing security.

Keywords :


Article :


Cite This Article :

Deepak Dhull, Rakhi Soni(2015). HYBRID SCHEME FOR SECRET SHARING USING SYMMETRIC KEY AND MULTI SECRET SHARING. Indian Streams Research Journal, Vol. V, Issue. III, DOI : 10.9780/22307850, http://isrj.org/UploadedData/6562.pdf

References :

  1. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  2. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  3. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  4. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  5. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  6. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  7. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  8. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  9. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  10. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  11. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  12. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  13. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  14. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  15. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  16. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  17. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  18. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  19. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  20. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  21. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  22. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  23. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  24. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  25. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  26. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  27. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  28. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  29. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  30. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  31. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  32. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  33. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  34. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  35. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  36. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  37. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  38. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  39. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  40. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  41. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  42. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  43. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  44. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  45. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  46. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  47. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  48. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  49. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  50. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  51. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  52. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  53. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  54. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  55. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  56. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  57. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  58. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  59. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  60. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  61. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  62. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  63. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  64. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  65. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  66. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  67. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  68. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  69. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  70. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  71. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  72. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  73. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  74. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  75. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  76. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  77. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  78. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  79. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  80. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  81. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  82. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  83. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  84. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  85. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  86. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  87. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  88. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  89. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  90. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  91. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  92. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  93. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  94. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  95. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  96. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  97. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  98. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  99. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  100. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  101. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  102. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  103. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  104. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  105. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  106. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  107. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  108. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  109. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  110. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  111. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  112. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  113. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  114. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  115. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  116. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  117. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  118. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  119. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  120. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  121. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  122. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  123. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  124. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  125. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  126. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  127. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  128. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  129. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  130. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  131. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  132. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  133. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  134. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  135. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  136. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  137. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  138. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  139. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  140. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  141. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  142. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  143. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  144. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  145. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  146. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  147. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  148. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  149. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  150. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  151. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  152. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  153. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  154. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  155. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  156. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  157. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  158. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  159. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  160. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  161. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  162. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  163. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  164. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  165. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  166. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  167. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  168. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  169. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  170. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  171. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  172. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  173. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  174. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  175. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  176. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  177. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  178. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  179. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  180. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  181. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  182. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  183. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  184. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  185. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  186. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  187. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  188. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  189. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  190. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  191. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  192. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  193. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  194. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  195. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  196. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  197. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  198. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  199. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  200. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  201. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  202. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  203. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  204. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  205. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  206. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  207. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  208. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  209. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  210. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  211. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  212. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  213. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  214. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  215. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  216. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  217. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  218. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  219. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  220. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  221. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  222. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  223. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  224. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  225. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  226. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  227. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  228. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  229. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  230. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  231. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  232. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  233. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  234. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  235. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  236. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  237. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  238. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  239. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  240. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  241. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  242. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  243. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  244. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  245. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  246. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  247. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  248. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  249. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  250. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  251. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  252. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  253. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  254. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  255. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  256. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  257. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  258. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  259. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  260. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  261. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  262. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  263. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  264. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  265. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  266. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  267. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  268. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  269. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  270. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  271. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  272. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  273. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  274. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  275. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  276. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  277. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  278. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  279. Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
  280. Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
  281. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  282. Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
  283. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  284. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  285. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  286. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  287. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  288. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  289. Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
  290. Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
  291. Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
  292. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
  293. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
  294. Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
  295. B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.

Article Post Production

    No data exists for the row/column.
Creative Commons License
Indian Streams Research Journal by Laxmi Book Publication is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at http://oldisrj.lbp.world/Default.aspx.
Permissions beyond the scope of this license may be available at http://oldisrj.lbp.world/Default.aspx
Copyright © 2014 Indian Streams Research Journal. All rights reserved
Looking for information? Browse our FAQs, tour our sitemap, or contact ISRJ
Read our Privacy Policy Statement and Plagairism Policy. Use of this site signifies your agreement to the Terms of Use