A Survey on Visual Cryptography Schemes

Amal C, R. Joshua Samuel Raj


This paper provides an analysis of the emerging visual cryptography (VC) and related security method which can be applied to any of the visual cryptography method. The actual encrypted data embedded image is displayed if and only if the user overcomes the cued click point verification. Hacking is the main issue faced during sharing secrets in visual schemes. The cued click point method can solve the issue up to a limit. Cued click point is a technology where the user has to verify the click points as a security measure and only then the user is provided with the actual visual secret image.
Keywords: Visual Cryptography; Cued Click points; Stereograms.

Full Text:


Copyright (c) 2016 Amal C, R. Joshua Samuel Raj

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


EduPedia Publications Pvt Ltd, D-351, Prem Nagar-2, Suleman Nagar, Kirari, Nagloi, New Delhi PIN-Code 110086, India Through Phone Call us now: +919958037887 or +919557022047

All published Articles are Open Access at https://edupediapublications.org/journals/

Paper submission: editor@edupediapublications.com or edupediapublications@gmail.com

Editor-in-Chief       editor@edupediapublications.com

Mobile:                  +919557022047 & +919958037887

Websites   https://edupediapublications.org/journals/.

Journals Maintained and Hosted by

EduPedia Publications (P) Ltd in Association with Other Institutional Partners


Pen2Print and IJR are registered trademark of the Edupedia Publications Pvt Ltd.