A novel method for secret image sharing Using nibble exchange
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
This paper proposes a new scheme for secret image sharing which shuffles and manipulates the nibbles (and hence the bytes) of the pixel values of the images. We have developed a new algorithm called LDRU (Left-Down-Right-Up) for the construction of shares. Using LDRU algorithm any type of (Binary, Gray scale or Color) secret images can be shared and reconstructed precisely in linear time.
Authors and Affiliations
Anirban Chakraborty, Subhendu Das
An Evaluation of Topology Effect on Tiny Service Discovery Protocol for Wireless Sensor Networks
In the literature of wireless sensor networks (WSNs), a well studied problem is that of achieving full sevice discovery within a region according to the topology model of coverage. A large waiting time of wireless sensor...
Evolution of Graphics-Development & Innovations
Graphics are now an integral part in many scientific, and entertainment fields. Radical discoveries and developments are still being made. Combinations of techniques and technology from different scientific fields are th...
IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37
The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching bec...
Implementation of the Basic System in the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol use...
Virtual Machine Selection Algorithm Based on User Requirements in Mobile Cloud Computing Environment
The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hie...