In today’s information era information hiding becomes very much important as people transmits the information as innocent as credit card to online stores and as dangerous as terrorist plot to hijackers. The art of information hiding receive attention of the researchers. This paper provides a review of two methods – Visual Cryptography and Steganography for secure communication via a common communication channel.
%0 Journal Article
%1 M_2015
%A Tambe, Kavita M.
%A Patane, Ramling D.
%D 2015
%I Auricle Technologies, Pvt., Ltd.
%J International Journal on Recent and Innovation Trends in Computing and Communication
%K Cryptography Halftone Progressive Recursive Steganography Threshold Visual cryptography visual
%N 4
%P 1927--1930
%R 10.17762/ijritcc2321-8169.150437
%T Visual Cryptography and Steganography Methods Review
%U http://dx.doi.org/10.17762/ijritcc2321-8169.150437
%V 3
%X In today’s information era information hiding becomes very much important as people transmits the information as innocent as credit card to online stores and as dangerous as terrorist plot to hijackers. The art of information hiding receive attention of the researchers. This paper provides a review of two methods – Visual Cryptography and Steganography for secure communication via a common communication channel.
@article{M_2015,
abstract = {In today’s information era information hiding becomes very much important as people transmits the information as innocent as credit card to online stores and as dangerous as terrorist plot to hijackers. The art of information hiding receive attention of the researchers. This paper provides a review of two methods – Visual Cryptography and Steganography for secure communication via a common communication channel.},
added-at = {2015-08-21T07:21:24.000+0200},
author = {Tambe, Kavita M. and Patane, Ramling D.},
biburl = {https://www.bibsonomy.org/bibtex/2d706b305a51988f0f690d74a3b52b9b1/ijritcc},
doi = {10.17762/ijritcc2321-8169.150437},
interhash = {cac62f35aaa04de0066d22b06bf7ffc8},
intrahash = {d706b305a51988f0f690d74a3b52b9b1},
journal = {International Journal on Recent and Innovation Trends in Computing and Communication},
keywords = {Cryptography Halftone Progressive Recursive Steganography Threshold Visual cryptography visual},
month = {april},
number = 4,
pages = {1927--1930},
publisher = {Auricle Technologies, Pvt., Ltd.},
timestamp = {2015-08-21T07:21:24.000+0200},
title = {Visual Cryptography and Steganography Methods Review},
url = {http://dx.doi.org/10.17762/ijritcc2321-8169.150437},
volume = 3,
year = 2015
}