A Novel Technique in Cryptography for Data Hiding i n Digital Images
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally, technology that uses images needs neither cryptography knowledge nor complex computation. For ensured concerns, it also assures that cyberpunks cannot perceive any idea about the image in which the information is hidden. The use of cryptography mainly targets binary images because by using the basic level of image i.e., using binary image (black & white) only we can the technique of cryptography; This piece of cryptogram proposes three sub sects for visual cryptography(VC) based on binary i.e., black and white images of gray-level and color images. There are many methods such as halftone, Visual Cryptography, etc. Many of techniques use noise-like random pixels on shares to hide secret images
Authors and Affiliations
Sreepathi V B , Mr. IwinThanakumar S
A Survey of Preprocessing Method for Web Usage Mining Process
The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information...
A Comparative study Between Fuzzy Clustering Algorithm and Hard Clustering Algorithm
Data clustering is an important area of data mining. This is an unsupervised study where data of similar types are put into one cluster while data of another types are put into different cluster. Fuzzy C means is a very...
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...
Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks
Cognitive radio (CR) is a significant communication technology in which the unlicensed users use the maximum available bandwidth. When the spectrum is not used by the licensed primary user, the obtainable channels are al...
Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability
In this paper we provide a novel design and implementation of toplogy and orchestration specification for cloud applications to enable portability