Have a personal or library account? Click to login
Secured Document Sharing Using Visual Cryptography in Cloud Data Storage Cover

Secured Document Sharing Using Visual Cryptography in Cloud Data Storage

By: K. Brindha and  N. Jeyanthi  
Open Access
|Nov 2015

References

  1. 1. Armbrust, M.. A. Fo x, R. Griffith, A. Joseph, R. Katz, A. Konwinsk i, G. Lee, D. Patterso n, A. Rabkin, I. Stoica, M. Zahari a. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report No UCB/EECS-2009-28, University of California at Berkley, USA, 10 February, 2009.
  2. 2. Buyy a, R., C. S. Ye o, S. Venugopa l, J. Brober g, I. Brandi c. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. - In: Future Generation Computer Systems. Amsterdam, The Netherlands, Elsevier Science, 2009.
  3. 3. Kaufma n, L. M. Data Security in the World of Cloud Computing. - IEEE Security and Privacy, Vol. 7, 2009, No 4, pp. 61-64.10.1109/MSP.2009.87
  4. 4. Mell, P., T. Grance. Effectively and Securely Using the Cloud Computing Paradigm. NIST, Information Technology Laboratory, 2009.
  5. 5. Naor, M., A. Shamir. Visual Cryptography. - In: Proc. of Advance in Cryptology- EUROCRYPT’94. - In: Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.
  6. 6. Blundo, C., A. De Santis, D. R. Stinso n. On the Contrast in Visual Cryptography Schemes. - J. Cryptol.: J. Int. Assoc. Cryptol. Res., Vol. 12, 1999, No 4, pp. 261-289.10.1007/s001459900057
  7. 7. Blundo, C., P. D’Arco, A. De Santis, D. R. Stinso n. Contrast Optimal Threshold Visual Cryptography Schemes. - SIAM J. Discrete Math., Vol. 16, 2003, No 2, pp. 224-261.10.1137/S0895480198336683
  8. 8. Hofmeister, T., M. Krause, H. U. Simo n. Contrast-Optimalkout ofn Secret Sharing Schemes in Visual Cryptography. - Theoretical Computer Science., Vol. 240, Jun 2000, No 2, pp. 471-485.10.1016/S0304-3975(99)00243-1
  9. 9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinso n. Visual Cryptography for General Access Structures. - Inf. Comput., Vol. 129, September 1996, No 2, pp. 86-106.10.1006/inco.1996.0076
  10. 10. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. - Pattern Recognition Letter, Vol. 25, 2004, pp. 481-494.10.1016/j.patrec.2003.12.011
  11. 11. Ho u, Y.-C. Visual Cryptography for Color Images. - Pattern Recognition, Vol. 36, 2003, pp. 1619-1629.10.1016/S0031-3203(02)00258-3
  12. 12. Lee, K.-H., P.-L. Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. - IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611
  13. 13. Chen, S.-K. A Visual Cryptography Based System for Sharing Multiple Secret Images. - In: ISCGAV’07. - In: Proc. of 7th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Signal Processing, Computational Geometry and Artificial Vision, Stevens Point, Wisconsin, USA, 2007, pp. 117-122.
  14. 14. Feng, J.-B., H.-C. Wu, C.-S. Tsai, Y.-F. Chan g, Y.-P. Ch u. Visual Secret Sharing for Multiple Secrets. - Pattern Recognition, Vol. 41, 2008, Issue 12, pp. 3572-3581.10.1016/j.patcog.2008.05.031
  15. 15. Yang, C.-N., T.-S. Chen. Size-Adjustable Visual Secret Sharing Schemes. - IEICE Transactions 88-A(9), 2005, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471
  16. 16. Yang, C.-N., T.-S. Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. - IEICE Transactions 89-A(2), 2006, pp. 620-625.10.1093/ietfec/e89-a.2.620
  17. 17. Yang, C.-N., T.-S. Chen. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. - IJPRAI, Vol. 21, 2007, No 5, pp. 879-898.10.1142/S0218001407005740
  18. 18. Jaafar, A. M., A. Samsudin. A New Public-Key Encryption Scheme Based on Non- Expansion Visual Cryptography and Boolean Operation. - IJCSI International Journal of Computer Science Issues, Vol. 7, July 2010, Issue 4, No 2, pp. 1-10.
DOI: https://doi.org/10.1515/cait-2015-0058 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 111 - 123
Published on: Nov 26, 2015
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2015 K. Brindha, N. Jeyanthi, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.