A Novel Technique in Cryptography for Data Hiding i n Digital Images

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally, technology that uses images needs neither cryptography knowledge nor complex computation. For ensured concerns, it also assures that cyberpunks cannot perceive any idea about the image in which the information is hidden. The use of cryptography mainly targets binary images because by using the basic level of image i.e., using binary image (black & white) only we can the technique of cryptography; This piece of cryptogram proposes three sub sects for visual  cryptography(VC) based on binary i.e., black and white images of gray-level and color images. There are many methods such as halftone, Visual Cryptography, etc. Many of techniques use noise-like random pixels on shares to hide secret images

Authors and Affiliations

Sreepathi V B , Mr. IwinThanakumar S

Keywords

Related Articles

IPv4 Mobility Support

Mobile computing offers mobile users anytime, anywhere bi-directional reliable access to the Internet. Mobile IP as a network layer routing protocol has been designed by the IETF (Internet Engineering Task Force) to prov...

BPR: Evaluation of Existing Methodologies and Limitations

Many of known organizations had their business processes changed and reengineered in order to achieve their objectives, meet their customer’s expectations and attain competitive advantage. Thus, they were willing to adop...

Comparative Analysis of Edge Based Single Image Superresolution

Super-resolution image reconstruction provides an effective way to increase image resolution from a single or multiple low resolution images. There exists various single image super-resolution based on different assumpti...

Facial Image Noise Removal Via a Trained Dictionary

In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...

Download PDF file
  • EP ID EP157270
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Sreepathi V B, Mr. IwinThanakumar S (2013). A Novel Technique in Cryptography for Data Hiding i n Digital Images. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 199-203. https://europub.co.uk/articles/-A-157270