A secured approach for sharing critical data on halftone image Using advance visual cryptography

Abstract

Visual cryptography is a secret sharing scheme which uses images divided as shares such that, when the shares are created, a hidden secret image is attached. In extended visual cryptography, the share images are developed that contain meaningful cover images. For processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the released image is the same as for the original halftone secret image. The remaining scheme maintains the perfect security of the original extended visual cryptography approach.

Authors and Affiliations

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane

Keywords

Related Articles

Hindering Data Theft Attacks Using Fog Computing

Cloud Computing enables multiple users to share common computing resources, and to access and store their personal and business information A major amount of professional and personal data is stored on cloud.Cloud stora...

A Study on Employees’ Perception about Corporate Social Responsibility (CSR) in Nag Yang Shoes (P) Ltd

As globalization accelerates and large corporations serve as global providers, these corporations have progressively recognized the benefits of providing Corporate Social Responsibility (CSR) programs in their various l...

Behavior Study of Fly-Ash Based Bricks and Analysis of R.C Frame Infill Using ETABS

In many green building materials fly ash brick also included. Fly ash bricks can be suitably used in masonry like clay bricks. The manufacture of fly ash bricks will be more economical if the manufacturing unit is neare...

Analysis of Different Types of Domino Logic: A Review

Power and area will remain the main constraints in the designing of VLSI circuits. Dynamic CMOS logic circuits are broadly designed for high performance circuits due to their high speed. Conversely, the demerit of dynam...

The Review on the Color Edge Detection based on the Ant Colony Optimization

Picture edge is the most rudimentary element of picture. the sting is that the arrangement of components that has step change in pixel dark cost. Picture edge reflects the greater part of the picture information. In thi...

Download PDF file
  • EP ID EP19340
  • DOI -
  • Views 226
  • Downloads 4

How To Cite

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane (2015). A secured approach for sharing critical data on halftone image Using advance visual cryptography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(1), -. https://europub.co.uk/articles/-A-19340