A secured approach for sharing critical data on halftone image Using advance visual cryptography

Abstract

Visual cryptography is a secret sharing scheme which uses images divided as shares such that, when the shares are created, a hidden secret image is attached. In extended visual cryptography, the share images are developed that contain meaningful cover images. For processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the released image is the same as for the original halftone secret image. The remaining scheme maintains the perfect security of the original extended visual cryptography approach.

Authors and Affiliations

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane

Keywords

Related Articles

Methods for Character Identification in Movies: A Review

Now a day’s character Identification from films is a very challenging task due to the huge variation in the appearance of each & every character. It will lead significant research interests and may have many interesting...

Multiple Cell Errors Detection and Correction for OLS codes

Error correction codes (ECCs) are commonly used to protect memories against errors. The proposed method we are we are detect the one or more errors and to correct single bit error. Among ECCs, orthogonal latin squares (...

Parametric Study on Tubed Steel Reinforced Concrete Columns under Axial Loading

The decades have seen outstanding advances in the use of composite steel-concrete structural systems in the construction of buildings. Concrete-steel composite structure is defined as construction in which both steel an...

Analysis of Casting Defects using Casting Simulation Technique and Using Design of Experiment: A Review

Computer simulation of casting process has emerged as a powerful tool for achieving quality assurance without time consuming trials. Software packages for simulating the solidification of molten metal in the mould enabl...

Video Processing Based Smart Helmet

As the statistics suggest the number of people using two wheeler as a mode of their transportation is increasing day by day. And in turn this increase in no. of two wheelers also has led to the increase in no. of accide...

Download PDF file
  • EP ID EP19340
  • DOI -
  • Views 273
  • Downloads 4

How To Cite

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane (2015). A secured approach for sharing critical data on halftone image Using advance visual cryptography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(1), -. https://europub.co.uk/articles/-A-19340