A Novel Technique in Cryptography for Data Hiding i n Digital Images

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally, technology that uses images needs neither cryptography knowledge nor complex computation. For ensured concerns, it also assures that cyberpunks cannot perceive any idea about the image in which the information is hidden. The use of cryptography mainly targets binary images because by using the basic level of image i.e., using binary image (black & white) only we can the technique of cryptography; This piece of cryptogram proposes three sub sects for visual  cryptography(VC) based on binary i.e., black and white images of gray-level and color images. There are many methods such as halftone, Visual Cryptography, etc. Many of techniques use noise-like random pixels on shares to hide secret images

Authors and Affiliations

Sreepathi V B , Mr. IwinThanakumar S

Keywords

Related Articles

Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks

Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...

Information Security and Risk Management for Banking System

Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...

A Literature Survey on Face Recognition Techniques

With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...

Lifetime Analysis Using Encoding Technique in Wireless Sensor Network

The significant challenge in Wireless Sensor network is to maximize the network lifetime through minimizing energy. The monitoring area close to the Sinknode forms a bottleneck zone because of large traffic- flow which l...

Optimizing Resource Allocation in IAAS Clouds

Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS)....

Download PDF file
  • EP ID EP157270
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Sreepathi V B, Mr. IwinThanakumar S (2013). A Novel Technique in Cryptography for Data Hiding i n Digital Images. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 199-203. https://europub.co.uk/articles/-A-157270