Accès libre

Secret Image Enhanced Sharing Using Visual Cryptography

À propos de cet article

Citez

1. Jeyanthi, N., N. C. S. N. Iyengar. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. – International Journal of Network Security, Vol. 14, 2012, No 5, pp. 257-269.Search in Google Scholar

2. Wu, H. C., C. C. Chang. Sharing Visual Multi-Secrets Using Circle Share. – Computer Standards & Interfaces, Vol. 28, 2005, No 1, pp. 123-135.10.1016/j.csi.2004.12.006Search in Google Scholar

3. Shyu, S. J., S. Y. Huang, Y. K. Lee, R. Z. Wang, K. Chen. Sharing Multiple Secrets in Visual Cryptography. – Pattern Recognition, Vol. 40, 2007, No 12, pp. 3633-3651.10.1016/j.patcog.2007.03.012Open DOISearch in Google Scholar

4. Sardana, A. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Berlin, Heidelberg, Springer, July 2011, pp. 233-243.10.1007/978-3-642-22726-4_25Search in Google Scholar

5. Naor, M., A. Shamir. Visual Cryptography. – In: Proc. of Advance in Cryptology (EUROCRYPT’94), Lecture Notes in Computer Science, Springer-Verlag, Vol. 950, 1995, pp. 1-12.10.1007/BFb0053419Search in Google Scholar

6. Mandal, S. N., S. Dutta, R. Sarkar. Block Based Symmetry Key Visual Cryptography. – International Journal of Computer Network and Information Security, Vol. 4, No 9, pp. 10-19.10.5815/ijcnis.2012.09.02Search in Google Scholar

7. Thandeeswaran, R., S. Subhashini, N. Jeyanthi, M. A. Saleem Durai. Secured Multi-Cloud Virtual Infrastructure with Improved Performance. – Cybernetics and Information Technologies, Vol. 12, 2012, No 2, pp. 11-22.10.2478/cait-2012-0009Open DOISearch in Google Scholar

8. Lin, Chang-Chou, Wen-Hsiang Tsai. Visual Cryptography for Gray-Level Images by Dithering Techniques. – Pattern Recognition Letters, Vol. 24, 2003, No 7, pp. 349-358.10.1016/S0167-8655(02)00259-3Search in Google Scholar

9. Mondal, U. K., S. N. Mandal, J. P. Choudhury, J. K. Mandal. A New Approach to Cryptography. – In: Proc. of International Conference Systematics, Cybernatics & Informatics (ICSCI’08), 2008, pp. 1-12.Search in Google Scholar

10. Hou, Young-Chang. Visual Cryptography for Color Images. – Pattern Recognition, Vol. 36, 2003, No 7, pp. 1619-1629.10.1016/S0031-3203(02)00258-3Search in Google Scholar

11. Jeyanthi, N., N. C. S. N. Iyengar. Escape-On-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005Search in Google Scholar

12. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. – Pattern Recognition Letter, Vol. 25, 2004, No 4, pp. 481-494.10.1016/j.patrec.2003.12.011Open DOISearch in Google Scholar

13. Jaafar, A., A. Samsudin. A Survey of Black and White Visual Cryptography Model. – International Journal of Digital Content Technology and its Applications (JDCTA), Vol. 6, 2012, No 15, pp. 237-249.10.4156/jdcta.vol6.issue15.28Search in Google Scholar

14. Jeyanthi, N., P. C. Mogan Kumar. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Open DOISearch in Google Scholar

15. Blundo, C., A. De Santis, M. Naor. Visual Cryptography for Grey Level Images. – Information Processing Letters, Vol. 75, 2000, No 6, pp. 255-259.10.1016/S0020-0190(00)00108-3Search in Google Scholar

16. Lee, Kai-Hui, Pei-Ling Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. – IEEE Transaction on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611Search in Google Scholar

17. Jaya. Securing Cloud Data and Cheque Truncation System with Visual Cryptography. – International Journal of Computer Applications, Vol. 70, 2013, No 2, pp. 16-21.10.5120/11934-7721Search in Google Scholar

18. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdfSearch in Google Scholar

19. https://arxiv.org/pdf/1512.01701Search in Google Scholar

20. http://securitylabs.websense.com/content/Blogs/3402.aspxSearch in Google Scholar

21. Boldyreva, A., V. Goyal, V. Kumar. Identity-Based Encryption with Efficient Revocation. – In: Proc. of 15th ACM Conference on Computer and Communications Security, 2008, pp. 417-426.10.1145/1455770.1455823Search in Google Scholar

22. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002Search in Google Scholar

23. Boneh, D., B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. – Theory of Cryptography, Springer, 2007, pp. 535-554.10.1007/978-3-540-70936-7_29Open DOISearch in Google Scholar

24. Katz, J., A. Sahai, B. Waters. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.– In: Lecture Notes in Computer Science, Vol. 4965, Springer, EUROCRYPT, 2008, pp. 146-162.Search in Google Scholar

25. Jaya, A. Sardana. Multiple Secrets Sharing with Meaningful Shares. – In: International Conference on Advances in Computing and Communications, Heidelberg, Springer, 2011, pp. 233-243.10.1007/978-3-642-22726-4_25Search in Google Scholar

26. Yang, Ching-Nung Tse-Shih Chen. Size-Adjustable Visual Secret Sharing Schemes. – IEICE Transactions on Fundamental of Electronics, Communication and Computer Science, Vol. 88, 2005, No 9, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471Search in Google Scholar

27. Yang, Ching-Nung, Tse-Shih Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. – IEICE Transactions on Electronics, Communication and Computer Science, Vol. 89, 2006, No 2, pp. 620-625.10.1093/ietfec/e89-a.2.620Search in Google Scholar

28. Yang, Ching-Nung, Tse-Shih Chen. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. – International Journal of Pattern Recognition and Artificial Intelligence, Vol. 21, 2007, No 5, pp. 879-898.10.1142/S0218001407005740Open DOISearch in Google Scholar

29. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography to Protect Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

30. Brindha, K., N. Jeyanthi. DOVC: Data Obfuscation Visual Cryptography to Protect Cloud Storage. – International Journal of Soft Computing, Vol. 11, 2016, No 6, pp. 374-381.Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology