Loading

Research of High Speed and Energy Efficient Visual Cryptography Techniques
V.Arun1, Rajashekhar C Biradar2, V. Mahendra3

1V.Arun, Research Scholar, School of Electronics and Communication Engineering, Reva University, Bengaluru, Karnataka, India

2Rajashekhar C Biradar, Professor and Director, School of Electronics and Communication Engineering, REVA University, Bengaluru, Karnataka, India.

3V. Mahendra, Professor, Department of Electronics and Communication Engineering, MLR Institute of Technology, Hyderabad, Telangana, India

Manuscript received on 15 September 2019 | Revised Manuscript received on 23 September 2019 | Manuscript Published on 11 October 2019 | PP: 1000-1007 | Volume-8 Issue-11S September 2019 | Retrieval Number: K118409811S19/2019©BEIESP | DOI: 10.35940/ijitee.K1184.09811S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Visual cryptography is the most popular technique attracted various researchers to improve the security level while utilizing the images and videos as encryption key, instead of text which is easy to crack. Visual cryptography processes the multimedia information such as images, videos and audios in order to enhance the security of the multimedia data. Visual cryptography computes complex multimedia information which may leads to computational overhead when simple processing techniques and architectures were utilized. So, various researchers had taken over this challenge and trying to resolve while introducing the various high speed techniques and architectures which would make visual cryptography process highly secured and energy efficient. This article presents a literature review on various high speed architectures and visual cryptographic techniques which have been adopted for processing multimedia data. This review provides the survey of different visual cryptography techniques adopted to achieve better security and also discusses their advantages and limitations. The comparison has been made on different visual cryptography methods with respect to performance, level of security and PSNR.

Keywords: Visual cryptography, security, energy efficient, high speed architecture, accurate prediction outcome
Scope of the Article: Cryptography and Applied Mathematics