A secured approach for sharing critical data on halftone image Using advance visual cryptography

Abstract

Visual cryptography is a secret sharing scheme which uses images divided as shares such that, when the shares are created, a hidden secret image is attached. In extended visual cryptography, the share images are developed that contain meaningful cover images. For processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the released image is the same as for the original halftone secret image. The remaining scheme maintains the perfect security of the original extended visual cryptography approach.

Authors and Affiliations

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane

Keywords

Related Articles

Research of parameters of reliability of the management level of info communication networks with use of the equipment of the software defined networks

In this article deals the management level of infocommunication network, examines the parameters of reliability of each equipment. The statistical data MTBF and average recovery time of each component failures. Calculat...

How to Mitigate the Impact of Supply Chain Disruptions and Risks ?

In this dynamic environment, supply chain disruptions are increasing and leading to more pressures toward adapting and quickly responding in an agile way to that change. The purpose of this article is to explore how org...

Auxiliary Power Saving In Air Cooled Steam Condenser by Pumps (A Heat Exchanger Used In Steam Power Plant)

Water demand from thermal power plants, mainly for steam condensation (power plant cooling) can place a significant burden on limited local and regional freshwater supplies. An approach to reducing this cooling water de...

Design and simulation of robotic arm for loading and unloading of work piece on lathe machine by using workspace simulation software: A Review

Performing various industrial task with the help of robots is common in most of mass production industries. One of the task is loading and unloading of work piece like pallets, food items, metal sheets etc. Loading and...

Modular Cascaded H-Bridge Multilevel PV Inverter by Using Fuzzy Logic Controller with Distributed MPPT for Grid-Connected Applications

This paper presents a modular cascaded H-bridge multilevel photovoltaic (PV) inverter for single- or three-phase gridconnected applications. The modular cascaded multilevel topology helps to improve the efficiency and fl...

Download PDF file
  • EP ID EP19340
  • DOI -
  • Views 285
  • Downloads 4

How To Cite

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane (2015). A secured approach for sharing critical data on halftone image Using advance visual cryptography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(1), -. https://europub.co.uk/articles/-A-19340