0% found this document useful (0 votes)
202 views2 pages

Future Scopes of Visual Cryptography

The document discusses future scopes of visual cryptography, including implementing multi-level visual secret sharing to reduce pixel expansion and increase target image quality, supporting additional image formats like 2D, 3D, BMP, PNG and GIF to improve security, and using visual cryptography to securely store biometric information like iris scans, fingerprints and faces for military and confidential applications. It also notes the system is designed to be flexible and modular to accommodate future enhancements.

Uploaded by

Apex ishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
202 views2 pages

Future Scopes of Visual Cryptography

The document discusses future scopes of visual cryptography, including implementing multi-level visual secret sharing to reduce pixel expansion and increase target image quality, supporting additional image formats like 2D, 3D, BMP, PNG and GIF to improve security, and using visual cryptography to securely store biometric information like iris scans, fingerprints and faces for military and confidential applications. It also notes the system is designed to be flexible and modular to accommodate future enhancements.

Uploaded by

Apex ishu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

FUTURE SCOPES OF VISUAL CRYPTOGRAPHY:

We can improve
result by removing
digital noise(gray-
shades).
 With some
minor changes, we
can implement
visual cryptography
on The future work will cover the Multi level visual secret sharing technique, how
the pixel expansion rate will be reduced and in what way high quality target
image will be obtained which indeed increases the storage requirements for
sheets and the target image.
 It will support 2D, 3D, .bmp, .png and .gif etc. formatted images. Thus, the
system’s security will also be improved by hiding multiple secrets in same
number of share images and reduces the size of sheets and share image.
 It can be used for all of the security related institutions like military, offices,
confidential laboratories. It will work for the multiple systems and multiple
cover images. It will work for more databases for more security.
 It also works on the central database for biometric information (like face,
fingerprints, and iris).
 In this work, the basic VCS is used to secure iris ciphers and fingerprint images
and the Embedded extended VCS for gray scale images is used to secure face
images.
 It can be used for all of the security related institutions like military, offices,
confidential laboratories. It will work for the multiple systems and multiple cover
images. It will work for more databases for more security
 The growth of any organization leads to enhancements, in future the system can
be enhanced according to requirements. Visual Cryptography for biometric
privacy is designed and developed flexibly according to the current requirements
of the user The requirements may increase in future and the system can be easily
modified accordingly as the system has been modularized. The system is
developed in such way that any future developments can be included.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy