Applying Visual Cryptography to Decrypt Data Using Human Senses

D Rajput, SK Singh, S Kumar, D Manro… - Innovations in Modern …, 2024 - igi-global.com
In the era of cryptographic advancement, integrating human workflow with technology is a
natural progression. Traditionally, cryptographic advancements have focused on …

A novel and highly secure encryption methodology using a combination of AES and visual cryptography

SR Rupanagudi, VG Bhat, R Anushree… - … on Advances in …, 2016 - ieeexplore.ieee.org
With the ever increasing human dependency on The Internet for performing various activities
such as banking, shopping or transferring money, there equally exists a need for safe and …

Authentication-Based Hybrid Approach Using RSA for Data Security in the Cloud

P Jain, A Jain, JK Jain - Handbook of Research on Driving …, 2023 - igi-global.com
Cloud computing is one of the important components of today's tech-savvy society. It creates
a new paradigm for information exchange without investing in new infrastructure or licensing …

An Improved Server Validation Scheme for Multi-server Infrastructure

H Monga, N Girdhar - National Academy Science Letters, 2020 - Springer
An improved server validation scheme for a multi-server infrastructure has been introduced.
In this scheme, each member involved in communication has to prove its validation before …

Phishing site detection and blacklisting using EVCS, steganography based on android application

A Shaji, M Stephen, S Sadanandan… - … on Intelligent Data …, 2019 - Springer
Online shopping allows consumers to buy goods or services over the Internet. As the
popularity of online shopping increases, Debit or Credit card fraud and personal information …

The Socio‐Behavioral Cipher Technique

H Bhatia, R Johari, K Gupta - Design and Analysis of Security …, 2020 - Wiley Online Library
The primitive and the traditional symmetric key cryptographic systems made use of a limited
number of input keys with single encryption function for securing the data before the data …

Cryptography: A Review

S Vasanthi, MH Surekha, GN Vachana… - … -systems and Signal …, 2017 - pices-journal.com
In today's Internet world security plays a very important role in securing data. After noticing
constant reports of data theft and hacking, enhancing security of the data has become …

[引用][C] A Review on GUI development of Visual Cryptography Scheme for User Authentication

C Kumari, M Mishra, DAKS Yamini Chouhan…