A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
David, K.
- A Survey on Visual Secret Sharing Scheme
Authors
1 Bharathiar University, Coimbatore, Tamil Nadu, IN
2 Department of Computer Science, Government Arts College, Affiliated to Bharathiar University, Udumalpet, Tirupur, Tamil Nadu, IN
3 St. Joseph's College, IN
Source
Software Engineering, Vol 8, No 4 (2016), Pagination: 91-96Abstract
The formatting requirements for Visual cryptographic technique is used for secure communication, various secrets and multimedia information are transmitted over the internet and suitable techniques are required to prevent form the illegal usage of information. This paper provides the survey of various visual cryptographic schemes based on their performance. This paper focuses on various threshold schemes like N, (2, N),(3,N), (K,K) and (K,N). In order to improve the security issue over the communication channel meaningful shares are used. The visual cryptography for binary pictures is also discussed. Other performance measures such as pixel expansion, contrast, accuracy is discussed in this paper.
Keywords
Cryptography, Visual Cryptography, Visual Secret Sharing, Pixel Expansion, Contrast and Encoding.- A Survey on Security Challenges in Cloud Computing
Authors
1 Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore, Tamil Nadu 641046, IN
2 Department of Computer Science, H.H. The Rajah’s College, Pudukkottai, TamilNadu, IN
3 Department of Computer Science, St. Joseph’s College, Trichy – 620 002, IN
Source
Software Engineering, Vol 9, No 4 (2017), Pagination: 78-82Abstract
Cloud computing is the today latest technology in the IT world. It is the interesting technology which provides the services and resources through the internet. These services are easy to access with pay per use. The services are maintained from the data centers where the data is stored the cloud providers such that Google, Amazon….etc. Number of users used the cloud platform to store their data, so that storage security is very important. Lack of security is the one of the major issue in the cloud environment. Resources are delivered to the client through the internet from the third party provider. Using third party to avoid the unauthorized access to store the data on cloud. In this paper we discuss what are the security problems and risks in the cloud, which helps to better security from the cloud environment.