AbstractIn this fast world of networking, secure image transmission of data whether the image having some information or some text, is one of the area focus for security. Here we had tried to implement the proposed technique fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme. Using fuzzy logic makes encryption and decryption complex. The (2, 2) secret sharing scheme provides secured and confidential authentication. For image encryption AES algorithm is used for encryption and decryption. The implementation of encryption algorithms can be very complex when we are focusing on rule based share generation
Abstract- The requirement of secure transmission of data is important in our life. The transmission ...
Abstract—Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the nee...
Images play an important role in our lives. They are used in many applications. Therefore it is alwa...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
Security of data is imperative factor in data transmission through network. In this paper, we propos...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
The main objective of this study is to form a unique and economical steganographic technique for dig...
As the rapid development of Internet Technology, Security and Privacy of data being transmitted has ...
Abstract⎯A lossless image secret sharing using a simple Boolean operation is proposed. The concept o...
AbstractVerifiable Secret Image Sharing has become an important field of study in modern cryptograph...
AbstractIn this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in whi...
Digital image is a collection of the pixel with different intensity values, and each image is in the...
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts a...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
[[abstract]]Secret communication has long been an import issue in recent years. To protect a secret,...
Abstract- The requirement of secure transmission of data is important in our life. The transmission ...
Abstract—Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the nee...
Images play an important role in our lives. They are used in many applications. Therefore it is alwa...
AbstractIn this fast world of networking, secure image transmission of data whether the image having...
Security of data is imperative factor in data transmission through network. In this paper, we propos...
Sharing of information in a secured manner is extremely essential in this world of internet technolo...
The main objective of this study is to form a unique and economical steganographic technique for dig...
As the rapid development of Internet Technology, Security and Privacy of data being transmitted has ...
Abstract⎯A lossless image secret sharing using a simple Boolean operation is proposed. The concept o...
AbstractVerifiable Secret Image Sharing has become an important field of study in modern cryptograph...
AbstractIn this paper, a new (k,n) verifiable secret image sharing scheme (VSISS) is proposed in whi...
Digital image is a collection of the pixel with different intensity values, and each image is in the...
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts a...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
[[abstract]]Secret communication has long been an import issue in recent years. To protect a secret,...
Abstract- The requirement of secure transmission of data is important in our life. The transmission ...
Abstract—Secret sharing is a new alternative for outsourcing data in a secure way. It avoids the nee...
Images play an important role in our lives. They are used in many applications. Therefore it is alwa...