A Presumption Mold of Visual Cryptography Design with Dynamic Groups
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5
Abstract
Visual cryptography is a secret sharing scheme where an image is encoded into transparencies. The Secret information can be revealed from the encoded image only when the correct set of images is given as an input and if the input is not matching then the secret information cannot be revealed. We will introduce a scheme which will dynamically add a user to specific group and then based on the information being shared that group related users can retrieve the information. To cut down the overhead of generating and distributing transparencies in user changes, this paper implements a Visual Cryptography scheme. The proposed scheme not provides security to the data but also takes care of discrepancies an extended VC scheme based on basis matrices and a presumption mold is proposed. Apart from the Visual Cryptography scheme we also show the image processing i.e. sending the information for communication along with the image in fact text being written on the image.
Authors and Affiliations
Sudhakar Badikala , Gowthami Janapatla
Powder Milk Rn222 Exhalation Rate Measurements in Different Kinds
The application of CR-39 SSNTD technique to the determination of radioactive contaminants in different kinds of milk can be very useful. Radon concentrations in animal milk samples collected from different countries were...
Big Data : Overview
Big data is data that exceeds the processing capacity of traditional databases. The data is too big to be processed by a single machine. New and innovative methods are required to process and store such large volumes of...
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...
Survey on Security Issues and Solutions in Cloud Computing
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Clou...
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...