A Quality Maintain Visual Cryptography Scheme
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
Visual cryptography is a cryptographic scheme that focuses on solving the problem of secret sharing of data which hides in images. The multi-secret visual cryptography (MVC) scheme is capable of sharing multiple secret images. Like this, the tagged visual cryptography (TVC) scheme hides tag images in randomly selected shares. But these cryptography schemes creates distortions in the shares at the time of encoding. Due to this, occurs a reduction in the quality of image at the time of decoding. So, this scheme introduces an extended TVC called Lossless tagged visual cryptography (LTVC) scheme where the encoding will not affect the quality of the rebuilt secret image, i.e., the decoder can rebuild exactly the identical image. Here also introduces a probabilistic LTVC (P-LTVC) to overcome the security issues.
A Comparison of Three Different Radiographic Techniques to Evaluate Their Reproducibility Concerning Periapical Structures – An Experimental Pilot Study
The assessment of periapical structures, inflammation and healing process state many questions concerning diagnostic, characteristics of healing and bone repair in apical stricture. The reproducibility of different x-ray...
Comparative Study Between Omental Plugging With Controlled Tube Duodenostomy for Management of Giant Duodenal Ulcer Perforation
Perforated peptic ulcer is common surgical emergency,the immediate definitive treatment operation for perforated peptic ulcer is neither safe. Giant duodenal ulcer is defined as perforation of size equal to or greater t...
Monitoring the Node due to the Effect of Packet Droppers and Modifiers in Wireless Sensor Network
Monitoring the Node due to the Effect of Packet Droppers and Modifiers in Wireless Sensor Network
An Optimal Approach to Load Balancing in Cloud Computing Based On Comparative Study and Analysis
Cloud Computing is the latest paradigm in the vast and rapidly expanding computing and Information Technology industry. Cloud computing refers to the practice of using a large number of remote servers that are connected...
Review of Trust based Methodologies in WSNs
In this research paper we have done objective study on latest trust based methodologies that are used in securing the WSN, the focuses in our current study have been on the aspect of energy and memory consumption due to...