A Presumption Mold of Visual Cryptography Design with Dynamic Groups
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5
Abstract
Visual cryptography is a secret sharing scheme where an image is encoded into transparencies. The Secret information can be revealed from the encoded image only when the correct set of images is given as an input and if the input is not matching then the secret information cannot be revealed. We will introduce a scheme which will dynamically add a user to specific group and then based on the information being shared that group related users can retrieve the information. To cut down the overhead of generating and distributing transparencies in user changes, this paper implements a Visual Cryptography scheme. The proposed scheme not provides security to the data but also takes care of discrepancies an extended VC scheme based on basis matrices and a presumption mold is proposed. Apart from the Visual Cryptography scheme we also show the image processing i.e. sending the information for communication along with the image in fact text being written on the image.
Authors and Affiliations
Sudhakar Badikala , Gowthami Janapatla
Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm
Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages...
ACO, Its Modification and Variants
Ant colony optimization (ACO) is a P based metaheuristic algorithm which has been proven as a successful technique and applied to a number of combinatorial optimization problems and is also applied to the Traveling sales...
A Review on Impersonation Attack in Mobile Ad-Hoc Network
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration....
Reducing Binding update in NEMO Supported PMIPV6
Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol,designed to keep track of individual mobile node’s mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to suppor...
Analysis on the Performance of Wireless Protocols
In this paper by concentrating on various wireless technologies like Bluetooth (802.15.1),Ultra wide band (802.15.3) ,ZigBee (802.15.4) and Wi-Fi(802.11),their performance was analyzed based on the are a of coverage and...