A Three Way Visual Cryptography & its Application in biometric Security : A Review
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Visual cryptography provides secured digital transmission which is used only for one time. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images.
Authors and Affiliations
Mr. Praveen Chouksey, Mr. Reetesh. Rai
Evaluation of Critical Success Factor in Construction Industry
The maіn objectіve of project management іs to ascertaіn success of the construction project and identification of the paramount factors whіch play a vіtal role іn the prosperіty of the project. However, to identify the...
PC Monitoring using Android over Internet
Since there are much application available for remote monitoring between computer to computer but In this application we are doing remote monitoring between mobile phone and computer. Basically nowadays we see that in m...
slugMR Brain Image Segmentation Based on Principle Component Analysis and Self-Organizing Map
In this paper, a fully unsupervised segmentation of Magnetic Resonance (MR) brain image is presented, which is based on a competitive learning algorithm- Self Organizing Map (SOM). We tried to address the problem of se...
Implementation on Data Cleaning for RFID and WSN Integration
Today’s manufacturing environments are very dynamic and turbulent. Wireless Sensor Network (WSN) and Radio Frequency Identification (RFID) integration is a developing innovation which utilizes focal points of the both f...
slugCalculating Threshold Current Density and Output Power of Vertical Cavity Surface Emitting Laser
In this paper, threshold current density and output power of the vertical cavity surface emitting laser is analytically calculated as a function of different electrical and optical parameters, and their interdependency...