EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 2
Abstract
Visual cryptography is a secret information sharing technique which shares the information in the form of images. It generates noise-like random pixels on share images to hide secret information which on overlay decrypt the information. This technique is known as conventional visual secret sharing schemes. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. While removing the extra cover image it produces extra noise or degrades the hidden image quality. So we propose a new image watermarking technique in this Visual Cryptography Algorithm that places a small image on the noisy image pair at the bottom right corner. So that the cover images need not be removed and it doesn't degrade  resolution of the secret image.
Authors and Affiliations
Dilip Kumar Kotthapalli, Dr. V. R. Anitha
A Comparison of Filtering Techniques for Image Quality Improvement in Computed Tomography
Computed Tomography (CT) is an important and most common modality in medical imaging. In CT examinations there is trade off between radiation dose and image quality. If radiation dose is decreased, the noise will unavoid...
Parametric Study of Silicon Based Optical Leaky-Wave Antenna
Parametric study is presented for 1550 nm CMOS compatible optical leaky wave antenna. The antenna is designed with Si3N4 waveguide perturbed periodically with silicon. The silicon perturbations are used to transform the...
A Bootstrap Aggregating Technique on Link-Based Cluster Ensemble Approach for Categorical Data Clustering
Although attempts have been made to solve the problem of clustering categorical data via cluster ensembles, with the results being competitive to conventional algorithms, it is observed that these techniques unfortunatel...
THE IMPORTANCE OF NORMALIZATION METHODS FOR MINING MEDICAL DATA
Over the past decades, the field of medical informatics has been growing rapidly and has drawn the attention of many researchers. The digitization of different medical information, including medical history records, rese...
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE
Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...