SECURE DOCUMENT SHARING IN ELEARNING WITH VISUAL CRYPTOGRAPHY
DOI:
https://doi.org/10.61841/hy1eyq26Keywords:
E-Learning, visual cryptography, annotation, encryptionAbstract
E-learning is a domain that facilitates learning through the internet using electronic devices. E-learning allows the students to learn whenever and wherever needed. Communication of materials between student and tutor is to be secured. This work introduces a novel concept of a visual cryptography-based method for secure communication in e-learning. The proposed work retrieves the secure document using standard encryption algorithm techniques The outcomes shows annotated way of e-learning content, paving way for secure transfer of materials, thereby providing student satisfaction and cost effectiveness.
Downloads
References
[1] Naor M.A. Shamir (1995), Visual Cryptography—In: Proc. Of Advance in Cryptography, EUROCRYPT ’94, In: Lecture Notes on Computer Science, Vol. 950, pp. 1–12.
[2] Ned Knock (2005), Media Richness or Naturalness? The Evolution of our Biological Communication Apparatus and its influence on our Behavior Towards E-Communication Tools, IEEE Transaction on professional Communication, Vol. 48, No. 2, pp. 117-130
[3] Panniyiokes Koutsabasis, Modestos Stavrakes, Thomas Spyrou, and John Darzentas (2011), Perceived impact of asynchronous e-learning after long-term use: Implications for design and development, Int. Journal of Human-Computer Interaction, Vol. 27, No. 2, pp. 191-213.
[4] Chirag Indravadanbhai Patel, Mahesh Gadhavi, and Atul Patel (2013), A Survey Paper in E-Learning-Based Management System (LMS), Int. Journal of Scientific and Engineering Research, Vol. 4, No. 6, pp. 171–176.
[5] Veeramanicham M R M, Mohana Priya M (2016), Research Paper on E-Learning Application Design Features: Using Cloud Computing and Software Engineering Approach, IEEE Conference on Information Communication and Embedded Systems, pp. 1–6.
[6] Signe Schake Nose Goard, Rikke Green (2015), The Effectiveness of E-Learning: An Explorative Review of the Defraction Methodologies and Factors to Promote E-Learning Effectiveness, The Electronic Journal of E-Learning, Vol. 13, Issue 4, pp. 278-290.
[7] Ren-Junn Hwang (2000), A Digital Image Copyright Protection Scheme Based on Visual Cryptography, Tamkang Journal of Science and Engineering, Vol. 3, No. 2, pp. 97-108.
[8] ParagChattenjee and Asoke Nath (2014), Massive Open Online Courses (MOOCs) in Education: A Case Study in Indian Contest and Vision of Abiquitous Learning, IEEE International Conference on MOOC Innovation And Tech in Education,
[9] Lakshmeeswari G. and Shubham Goel (2016), Anti-Phishing Frame: Work Applying Visual Cryptography Mechanism, Int. Journal of Current Engineering and Technology, Vol. 1, No. 6.
[10] Sejal V Gawande and Prasant R Deshmukh (2016), Secret Image Sharing Schemes: A Review, Int. Journal of Computer Science and Mobile Computing, Vol. 5, No. 2, pp. 150-153.
[11] Rajendra Prasad M., Lakshman Naik, Dr. Babuji V. (2013), Cloud Computing: Research Issue and Implication, Int. Journal of Cloud Computing and Services, Vol. 2, No. 2, pp. 134-140.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.