EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 2
Abstract
Visual cryptography is a secret information sharing technique which shares the information in the form of images. It generates noise-like random pixels on share images to hide secret information which on overlay decrypt the information. This technique is known as conventional visual secret sharing schemes. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. While removing the extra cover image it produces extra noise or degrades the hidden image quality. So we propose a new image watermarking technique in this Visual Cryptography Algorithm that places a small image on the noisy image pair at the bottom right corner. So that the cover images need not be removed and it doesn't degrade  resolution of the secret image.
Authors and Affiliations
Dilip Kumar Kotthapalli, Dr. V. R. Anitha
Hand gesture recognition using average background and logical heuristic equations
This paper introduces a hand gesture recognition algorithm for Human Computer Interaction using real-time video streaming .The background subtraction technique is used to extract the ROI (Region Of Interest) of the hand....
Effect of oral injection of tramadol, sildenafil and combined of tramadol and sildenafil on serum testosterone level for Wistar breed male rats
Introduction:Testosterone is the main sexual hormone in human males, and has a pharmacological effect on the physiology of sexual function. It is known that suppression of testosterone in eugonadal adult males leads to r...
CREDIT BASED LOAD BALANCING IN CLOUD ENVIRONMENT: A REVIEW
In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet.But it has more critical issue like security, load management...
A Novel Chaos-Based Stream Cipher for Image Encryption
In this paper, we introduce a novel chaos-based image encryption scheme. We perform our scheme using both the binary form and decimal form of chaotic maps. We also use two chaotic maps; one generates the initial values o...
A Study of Training and Development at Private Educational Institutions- with special reference to Malwa Region- Punjab
This paper addresses the main issues of training and development for private sector particularly educational institutions. This Paper has been made to understand how training and development in private educational Instit...