A Novel Technique in Cryptography for Data Hiding i n Digital Images

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally, technology that uses images needs neither cryptography knowledge nor complex computation. For ensured concerns, it also assures that cyberpunks cannot perceive any idea about the image in which the information is hidden. The use of cryptography mainly targets binary images because by using the basic level of image i.e., using binary image (black & white) only we can the technique of cryptography; This piece of cryptogram proposes three sub sects for visual  cryptography(VC) based on binary i.e., black and white images of gray-level and color images. There are many methods such as halftone, Visual Cryptography, etc. Many of techniques use noise-like random pixels on shares to hide secret images

Authors and Affiliations

Sreepathi V B , Mr. IwinThanakumar S

Keywords

Related Articles

Load-Balancing Multipath Switching System with Flow Slice

Load balancing plays a pivotal role in core routers as they need to handle multiple requests at a time. To achieve load balancing Multipath Switching Systems (MPS) are widely used. One of the challenging issues in buildi...

Query Based Expert Search Based on Relevance Class and Web Page Quality Ranking

Expert search is mostly used in the areas of academic groups, organizations. The general expert search problem which is observed is searching experts on the web where lot of web pages and experts names are considered. It...

Integrating Security and Usability at Requirement Specification Process

To construct any software, Requirement process is the common knowledge in most development organization. For any development of process security requirement is rarely supported. Over the years, researcher and developers...

Control Algorithm for Adaptive Front Light Systems

During the night driving, the reaction time of a human driver go into a compromise due to inadequate peripheral vision or lack of color and depth perception. The conventional headlamps of any automotive vehicle are insuf...

RW-Homeomorphism in Topological Spaces

A bijection f:(X,)→(Y, σ) is called regular weakly homeomorphism if f and f[sup]-1[/sup] are rw-continuous. Also we introduce new class of maps namely rw-homeomorphism. This class of maps is closed under composition of...

Download PDF file
  • EP ID EP157270
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Sreepathi V B, Mr. IwinThanakumar S (2013). A Novel Technique in Cryptography for Data Hiding i n Digital Images. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 199-203. https://europub.co.uk/articles/-A-157270