Uneingeschränkter Zugang

Secret Image Enhanced Sharing Using Visual Cryptography


Zitieren

1. Jeyanthi, N., N. C. S. N. Iyengar. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. – International Journal of Network Security, Vol. 14, 2012, No 5, pp. 257-269.Search in Google Scholar

2. Wu, H. C., C. C. Chang. Sharing Visual Multi-Secrets Using Circle Share. – Computer Standards & Interfaces, Vol. 28, 2005, No 1, pp. 123-135.10.1016/j.csi.2004.12.006Search in Google Scholar

3. Shyu, S. J., S. Y. Huang, Y. K. Lee, R. Z. Wang, K. Chen. Sharing Multiple Secrets in Visual Cryptography. – Pattern Recognition, Vol. 40, 2007, No 12, pp. 3633-3651.10.1016/j.patcog.2007.03.012Open DOISearch in Google Scholar

4. Sardana, A. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Berlin, Heidelberg, Springer, July 2011, pp. 233-243.10.1007/978-3-642-22726-4_25Search in Google Scholar

5. Naor, M., A. Shamir. Visual Cryptography. – In: Proc. of Advance in Cryptology (EUROCRYPT’94), Lecture Notes in Computer Science, Springer-Verlag, Vol. 950, 1995, pp. 1-12.10.1007/BFb0053419Search in Google Scholar

6. Mandal, S. N., S. Dutta, R. Sarkar. Block Based Symmetry Key Visual Cryptography. – International Journal of Computer Network and Information Security, Vol. 4, No 9, pp. 10-19.10.5815/ijcnis.2012.09.02Search in Google Scholar

7. Thandeeswaran, R., S. Subhashini, N. Jeyanthi, M. A. Saleem Durai. Secured Multi-Cloud Virtual Infrastructure with Improved Performance. – Cybernetics and Information Technologies, Vol. 12, 2012, No 2, pp. 11-22.10.2478/cait-2012-0009Open DOISearch in Google Scholar

8. Lin, Chang-Chou, Wen-Hsiang Tsai. Visual Cryptography for Gray-Level Images by Dithering Techniques. – Pattern Recognition Letters, Vol. 24, 2003, No 7, pp. 349-358.10.1016/S0167-8655(02)00259-3Search in Google Scholar

9. Mondal, U. K., S. N. Mandal, J. P. Choudhury, J. K. Mandal. A New Approach to Cryptography. – In: Proc. of International Conference Systematics, Cybernatics & Informatics (ICSCI’08), 2008, pp. 1-12.Search in Google Scholar

10. Hou, Young-Chang. Visual Cryptography for Color Images. – Pattern Recognition, Vol. 36, 2003, No 7, pp. 1619-1629.10.1016/S0031-3203(02)00258-3Search in Google Scholar

11. Jeyanthi, N., N. C. S. N. Iyengar. Escape-On-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005Search in Google Scholar

12. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. – Pattern Recognition Letter, Vol. 25, 2004, No 4, pp. 481-494.10.1016/j.patrec.2003.12.011Open DOISearch in Google Scholar

13. Jaafar, A., A. Samsudin. A Survey of Black and White Visual Cryptography Model. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2012, No 15, pp. 237-249.10.4156/jdcta.vol6.issue15.28Search in Google Scholar

14. Jeyanthi, N., P. C. Mogan Kumar. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Open DOISearch in Google Scholar

15. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3Search in Google Scholar

16. Lee, Kai-Hui, Pei-Ling Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. – IEEE Transaction on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611Search in Google Scholar

17. Jaya. Securing Cloud Data and Cheque Truncation System with Visual Cryptography. – International Journal of Computer Applications, Vol. 70, 2013, No 2, pp. 16-21.10.5120/11934-7721Search in Google Scholar

18. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdfSearch in Google Scholar

19. https://arxiv.org/pdf/1512.01701Search in Google Scholar

20. http://securitylabs.websense.com/content/Blogs/3402.aspxSearch in Google Scholar

21. Boldyreva, A., V. Goyal, V. Kumar. Identity-Based Encryption with Efficient Revocation. – In: Proc. of 15th ACM Conference on Computer and Communications Security, 2008, pp. 417-426.10.1145/1455770.1455823Search in Google Scholar

22. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002Search in Google Scholar

23. Boneh, D., B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. – Theory of Cryptography, Springer, 2007, pp. 535-554.10.1007/978-3-540-70936-7_29Open DOISearch in Google Scholar

24. Katz, J., A. Sahai, B. Waters. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.– In: Lecture Notes in Computer Science, Vol. 4965, Springer, EUROCRYPT, 2008, pp. 146-162.Search in Google Scholar

25. Jaya, A. Sardana. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Heidelberg, Springer, 2011, pp. 233-243.10.1007/978-3-642-22726-4_25Search in Google Scholar

26. Yang, Ching-Nung Tse-Shih Chen. Size-Adjustable Visual Secret Sharing Schemes. – IEICE Transactions on Fundamental of Electronics, Communication and Computer Science, Vol. 88, 2005, No 9, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471Search in Google Scholar

27. Yang, Ching-Nung, Tse-Shih Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. – IEICE Transactions on Electronics, Communication and Computer Science, Vol. 89, 2006, No 2, pp. 620-625.10.1093/ietfec/e89-a.2.620Search in Google Scholar

28. Yang, Ching-Nung, Tse-Shih Chen. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. – International Journal of Pattern Recognition and Artificial Intelligence, Vol. 21, 2007, No 5, pp. 879-898.10.1142/S0218001407005740Open DOISearch in Google Scholar

29. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography to Protect Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

30. Brindha, K., N. Jeyanthi. DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage. – International Journal of Soft Computing, Vol. 11, 2016, No 6, pp. 374-381.Search in Google Scholar

eISSN:
1314-4081
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik