A Survey on Embedded Extended Visual Cryptography Scheme
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 10
Abstract
For the safeguard of digital contents from being intercepted by unauthorised parties is a very serious issue in information security.Visual cryptography is the art of securing information by concealing the secret image into number of shares and these shares are distributed to intended recipients. This paper defines how to implement the embedded extended visual cryptography scheme and the experiment results like PSNR, UQI , pixel expansion is smaller, better visual quality of shares and enhancement in security reveals that this EVCS scheme is competitive when compared with other EVCSs.
Authors and Affiliations
Navjot Kaur
HEAT TRANSFER ENHANCEMENT IN PLATES BY NATURAL CONVECTION WITH AND WITHOUT VERTICAL CONFINING WALLS
Natural Convection flow in a vertical channel with internal objects is encountered in several technological applications of particular interest of heat dissipation from electronic circuits, refrigerators, heat exc...
Peristaltic Transport of a Conducting Jeffrey Fluid in a Vertical Annulus
This paper is aimed to study the effects of heat transfer and magnetic field on the peristaltic flow of a Jeffrey fluid in a vertical annulus with zero Reynolds number and long wavelength approximations. The inner tube...
Classification of Intact Cashew Grading System with Fuzzy Logic
This paper proposed an intelligent fuzzy logic based computer vision system for classification of whole cashew kernels by assigning the grades. Proposed approach is divided into various phases. Image acquisition phase...
A STUDY ON INFLUENCE OF MASONRY INFILLS AND SHEAR WALL ON THE SEISMIC PERFORMANCE OF R.C FRAMED BUILDING
The study offerings the practice for seismic performance estimation of asymmetric reinforced concrete frame buildings through ground soft storey built on a perception of the capacity spectrum method. Previous recent sei...
[sup]REVIEW OF REMOVAL OF BLACK - HOLE ATTACK IN AODV ROUTING PROTOCOL OF MANET USING BHR[/sup]
A Mobile Ad - Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to sec...