A Survey on Random Grid based Cryptography Schemes
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
A random grid based non-expanded Visual cryptography scheme used to generate meaningful as well as meaningless shares. First, analyze the distribution of pixels on the share image and stack image. A probability allocation method is introduced which is capable of producing the better visual quality in share image and stack image. With this method, it not only hide the secret image by using different cover images, but also visual quality of images is improve as needed. The important part is improvement of contrast of both secret and stack images to their theoretical maximum. This method is superior to past methods for visual secret sharing.
Authors and Affiliations
Ankita Bhimrao Patkure| Computer Department ZES’s Dnyanganga College of Engineering and research, Narhe, pune-411041 ankitapatkure@rediffmail.com, Prof. Nikita J. Kulkarni| Computer Department ZES’s Dnyanganga College of Engineering and research, Narhe, pune-411041, nikita.kulkarni@zealeducation.com
Cfd Analysis To Predict Heat Transfer Performance Of Louver Fin Radiator With Water/Eg & Al2o3 Nano Fluid
In this paper study of heat transfer in louver fin radiator and nanofluids mixing with base fluid (water+EG) has enhanced. The fins of radiator setup were made with louvers by turbulence of air flowing over it and co...
Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
publish–subscribe is a messaging pattern where senders of messages, called publishers, do not program the messages to be sent directly to specific receivers, called subscribers. provisioning of basic security mechan...
A Distributed Solution For Npv In Mobile Adhoc Networks To Verify The Position Of Communication Neighbours
A distributed solution for NPV any node in a mobile ad hoc network to verify the position of its communication neighbours without depending on a priori trustworthy nodes. In absence of a priori trusted nodes the disc...
Two Efficient Outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient Outsourced Verifying Protocol
Attribute-based signature (ABS) facilitates revelry to mark a message with fine-grained access control over make out information. Particularly, in an ABS system, users get hold of their attribute private keys from an...
Consideration And Evolution of Real Time Operating Systems: RTOS
This context deliberates the literature evolution of RTOS (Real Time Operating Systems) and its contributions to the embedded world. RTOS is is an operating system (OS) intended to serve real-time application process...