Implementation and Analysis of Various Visual Cryptographic Techniques for Sensitive Data Protection | IEEE Conference Publication | IEEE Xplore