Volume : V, Issue : III, April - 2015 HYBRID SCHEME FOR SECRET SHARING USING SYMMETRIC KEY AND MULTI SECRET SHARINGDeepak Dhull, Rakhi Soni By : Laxmi Book Publication Abstract : Visual cryptography technique encodes the information in such a way that decoding can be performed by human visual system without any intricate decoding process. It is a special encryption technique in which any text/secret which has to be encrypted is taken in the form of images. It slice image into randomly looking noise called shares, which when stacked together in any manner with proper alignment reveals out the secret. As visual cryptography, is a secure method for transmitting secret, but it has its cons also. If someone gets access to all shares, he/she can divulge secret easily. The proposed technique first encrypts the secret using a symmetric key and then divides the secret into shares. After overlapping of shares, secret is not appears, until the symmetric key is not known. This paper discusses multi secret sharing schemes in which m secrets can be implanted into m shares, hence reducing memory wastage and enhancing security. Keywords : Article : Cite This Article : Deepak Dhull, Rakhi Soni(2015). HYBRID SCHEME FOR SECRET SHARING USING SYMMETRIC KEY AND MULTI SECRET SHARING. Indian Streams Research Journal, Vol. V, Issue. III, http://isrj.org/UploadedData/6562.pdf References : - Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
- Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme”, IEEE,2008, pp. 207–211.
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- Gary C. Kessler, “An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
- Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Design and Implementation of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
- Jonathan Weir, WeiQi Yan, ” Sharing Multiple Secrets Using Visual Cryptography” , IEEE Transactions on Information Theory, 2009
- M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
- B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
|
Article Post Production
No data exists for the row/column.
|