Loading

Appositeness and usage of Visual Cryptography: An Exploration
M. Raghupathi1, G. Geetha Sai Sruthi2
1M. Raghupathi, Assistant Professor, Department of Computer Science and Engineering, Malla Reddy Engineering College For Women, Hyderabad (Telangana), India.
2G. Geetha Sai Sruthi, Assistant Professor, Department of Computer Science and Engineering, Malla Reddy Engineering College For Women, Hyderabad (Telangana), India.
Manuscript received on 01 November 2019 | Revised Manuscript received on 13 November 2019 | Manuscript Published on 22 November 2019 | PP: 1867-1872 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F13580986S319/19©BEIESP | DOI: 10.35940/ijeat.F1358.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Visual cryptography is a cryptographic strategy which enables visual data to be scrambled so that unscrambling turns into a mechanical activity that does not require a PC. In this paper, we expect to think about the extraordinary application zones of Visual Cryptography. Visual Cryptography is a wide zone of research utilized in information stowing away, anchoring pictures, shading imaging, media and other such fields. Visual Cryptography comes in the field of information stowing away utilized in cybercrime, record positions and so on. This paper centers around the application zones of visual cryptography from four distinctive research papers/diaries which talk about the most critical application regions of visual cryptography.
Keywords: Visual Cryptography Information Application.
Scope of the Article: Visual Analytics