2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2017
DOI: 10.1109/iciiecs.2017.8275942
|View full text |Cite
|
Sign up to set email alerts
|

Implementation K out of N visual cryptography using K out of K scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…We have developed the (k, n) Visual scheme using K out of K scheme [10]. In the proposed model a maximum of four shares will be generated and minimum of two shares are required to decrypt the original image .The proposed system provides acknowledgement to the sender after the receiver has decrypted the image.…”
Section: Proposed Systemmentioning
confidence: 99%
“…We have developed the (k, n) Visual scheme using K out of K scheme [10]. In the proposed model a maximum of four shares will be generated and minimum of two shares are required to decrypt the original image .The proposed system provides acknowledgement to the sender after the receiver has decrypted the image.…”
Section: Proposed Systemmentioning
confidence: 99%