A Quality Maintain Visual Cryptography Scheme
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
Visual cryptography is a cryptographic scheme that focuses on solving the problem of secret sharing of data which hides in images. The multi-secret visual cryptography (MVC) scheme is capable of sharing multiple secret images. Like this, the tagged visual cryptography (TVC) scheme hides tag images in randomly selected shares. But these cryptography schemes creates distortions in the shares at the time of encoding. Due to this, occurs a reduction in the quality of image at the time of decoding. So, this scheme introduces an extended TVC called Lossless tagged visual cryptography (LTVC) scheme where the encoding will not affect the quality of the rebuilt secret image, i.e., the decoder can rebuild exactly the identical image. Here also introduces a probabilistic LTVC (P-LTVC) to overcome the security issues.
A Review on Genotype Environment Interaction and its Stability Measures
Genotype× Environment Interaction (GEI) is a common phenomenon in genetics as it results in inconsistent performance between the genotype across environments. When interaction occurs, factor present in environment, as we...
A New Model of Permutation the Pieces of Nucleotides in DNA Sequences Using the Action of Dihedral Group and Graph Theory
In this paper, we give a new model of genetic algorithm using the action of largest subgroup of dihedral Group D_n, n=3^m, m is natural number, m grater than equal 2, bipartite graph, and a markov basis for (n^2-3n)/3×...
Assessment of Service Quality in Public Banks of NCR
Service quality of late has emerged as the major attractant to many banks as a competitive differentiator. This study deals with service quality gaps in public banks as after nationalisation of several commercial banks c...
Improvement in Wide Area Interconnected Network System Using Synchronized Phasor Measurement Unit
This paper proposes a new adaptive phasor measurement unit (PMU) based protection scheme for wide area interconnected transmission lines network. This method uses positive sequence voltage and current phasors at both end...
Face Recognition in a Group Photograph using Haar Wavelet Coefficients and ED vector
Accurate and faster face identification task has always been the prominent task of any biometric based personnel identification system. However, due to high dimensional space of facial images, the computation tedious and...