Seminar report on visual cryptography for CSE students.

Seminar report on visual cryptography for CSE students.

Visual Cryptography Seminar Report for CSE Students

Introduction

Visual Cryptography is a special type of encryption technique that allows for the secure sharing of secrets amongst multiple parties. It is particularly useful in scenarios where sensitive information needs to be distributed among a group of people without the need for complex encryption algorithms or secure communication channels.

Problem Statement

In the field of Computer Science and Engineering, the traditional methods of encryption often involve complex algorithms that can be difficult to implement and can slow down the communication process. This poses a challenge when it comes to sharing secrets among multiple parties securely and efficiently.

Existing System

The existing systems in cryptography typically rely on algorithms such as AES, RSA, and DES which require complex key generation and management protocols. While these systems are highly secure, they can be cumbersome to implement and can slow down communication processes. Additionally, the sharing of encryption keys securely among multiple parties can be a challenge in itself.

Disadvantages

– Complex algorithms can be difficult to implement
– Slow communication processes
– Key generation and management can be cumbersome
– Sharing encryption keys securely among multiple parties can be challenging

Proposed System

The proposed system aims to address these challenges by implementing Visual Cryptography as a secure and efficient method for sharing secrets among multiple parties. Visual Cryptography involves the encryption of an image into multiple shares, where each share alone reveals no information about the original image.

Advantages

– Secure sharing of secrets among multiple parties
– Efficient and easy to implement
– No complex encryption algorithms required
– No need for secure communication channels
– Each share reveals no information about the original image

Features

– Encryption of images into multiple shares
– Each share reveals no information about the original image
– Secure sharing of secrets among multiple parties
– Easy to implement and efficient
– No need for complex encryption algorithms or secure communication channels

Conclusion

In conclusion, Visual Cryptography presents a unique and efficient method for sharing secrets among multiple parties in the field of Computer Science and Engineering. By encrypting images into multiple shares, this system eliminates the need for complex algorithms and secure communication channels, making it a valuable tool for secure communication and information sharing.