Open Access

Secured Document Sharing Using Visual Cryptography in Cloud Data Storage


Cite

1. Armbrust, M.. A. Fo x, R. Griffith, A. Joseph, R. Katz, A. Konwinsk i, G. Lee, D. Patterso n, A. Rabkin, I. Stoica, M. Zahari a. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report No UCB/EECS-2009-28, University of California at Berkley, USA, 10 February, 2009.Search in Google Scholar

2. Buyy a, R., C. S. Ye o, S. Venugopa l, J. Brober g, I. Brandi c. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. - In: Future Generation Computer Systems. Amsterdam, The Netherlands, Elsevier Science, 2009.Search in Google Scholar

3. Kaufma n, L. M. Data Security in the World of Cloud Computing. - IEEE Security and Privacy, Vol. 7, 2009, No 4, pp. 61-64.10.1109/MSP.2009.87Search in Google Scholar

4. Mell, P., T. Grance. Effectively and Securely Using the Cloud Computing Paradigm. NIST, Information Technology Laboratory, 2009.Search in Google Scholar

5. Naor, M., A. Shamir. Visual Cryptography. - In: Proc. of Advance in Cryptology- EUROCRYPT’94. - In: Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.Search in Google Scholar

6. Blundo, C., A. De Santis, D. R. Stinso n. On the Contrast in Visual Cryptography Schemes. - J. Cryptol.: J. Int. Assoc. Cryptol. Res., Vol. 12, 1999, No 4, pp. 261-289.10.1007/s001459900057Search in Google Scholar

7. Blundo, C., P. D’Arco, A. De Santis, D. R. Stinso n. Contrast Optimal Threshold Visual Cryptography Schemes. - SIAM J. Discrete Math., Vol. 16, 2003, No 2, pp. 224-261.10.1137/S0895480198336683Search in Google Scholar

8. Hofmeister, T., M. Krause, H. U. Simo n. Contrast-Optimalkout ofn Secret Sharing Schemes in Visual Cryptography. - Theoretical Computer Science., Vol. 240, Jun 2000, No 2, pp. 471-485.10.1016/S0304-3975(99)00243-1Search in Google Scholar

9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinso n. Visual Cryptography for General Access Structures. - Inf. Comput., Vol. 129, September 1996, No 2, pp. 86-106.10.1006/inco.1996.0076Search in Google Scholar

10. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. - Pattern Recognition Letter, Vol. 25, 2004, pp. 481-494.10.1016/j.patrec.2003.12.011Search in Google Scholar

11. Ho u, Y.-C. Visual Cryptography for Color Images. - Pattern Recognition, Vol. 36, 2003, pp. 1619-1629.10.1016/S0031-3203(02)00258-3Search in Google Scholar

12. Lee, K.-H., P.-L. Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. - IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611Search in Google Scholar

13. Chen, S.-K. A Visual Cryptography Based System for Sharing Multiple Secret Images. - In: ISCGAV’07. - In: Proc. of 7th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Signal Processing, Computational Geometry and Artificial Vision, Stevens Point, Wisconsin, USA, 2007, pp. 117-122.Search in Google Scholar

14. Feng, J.-B., H.-C. Wu, C.-S. Tsai, Y.-F. Chan g, Y.-P. Ch u. Visual Secret Sharing for Multiple Secrets. - Pattern Recognition, Vol. 41, 2008, Issue 12, pp. 3572-3581.10.1016/j.patcog.2008.05.031Search in Google Scholar

15. Yang, C.-N., T.-S. Chen. Size-Adjustable Visual Secret Sharing Schemes. - IEICE Transactions 88-A(9), 2005, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471Search in Google Scholar

16. Yang, C.-N., T.-S. Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. - IEICE Transactions 89-A(2), 2006, pp. 620-625.10.1093/ietfec/e89-a.2.620Search in Google Scholar

17. Yang, C.-N., T.-S. Chen. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. - IJPRAI, Vol. 21, 2007, No 5, pp. 879-898.10.1142/S0218001407005740Search in Google Scholar

18. Jaafar, A. M., A. Samsudin. A New Public-Key Encryption Scheme Based on Non- Expansion Visual Cryptography and Boolean Operation. - IJCSI International Journal of Computer Science Issues, Vol. 7, July 2010, Issue 4, No 2, pp. 1-10. Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology