About
8
Publications
832
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
18
Citations
Introduction
Current institution
Additional affiliations
January 2010 - November 2015
Publications
Publications (8)
Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the Extended Visual Cryptography scheme (EVCS). However, the previous approaches involving the EVCS for general access...
Multi-attribute data, needed to be clustered may have different consequences of attributes on clustering criteria. In this paper, a new soft clustering technique is proposed in which similarity measures between data points and impact of each attribute is calculated using grey relational analysis. Algorithm provides the flexibility to choose signifi...
Visual cryptography scheme is a method to transmit the secret image securely in which one secret image is shared using n numbers of random looking shares and secret image can be revealed by superimposing k out of n transparencies with human visual system. Visual cryptography has proved that security can be attained with simple encryption schemes. I...
Questions
Question (1)