Extending the Visual Cryptography Algorithm Without Removing Cover Images

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 4

Abstract

 Visual cryptography is a simple and powerful method which can provide high security for confidential information. This technique generate noiselike random pixels on share images to hide secret information which on overlay decrypt the information this technique is known as conventional visual secret sharing schemes. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. But while removing the extra cover image it produces extra noise or degrades the hidden image quality. Hence we are Extending the visual cryptography algorithm without removing cover images where it reduces pixel expansion problem and shares match duration.

Authors and Affiliations

Dr. V. R. Anitha, M. Tech, Ph. d 1 , Dilip kumar Kotthapalli

Keywords

Related Articles

 Reliable Link-Based Routing Protocol for Highly Dynamic Mobile Adhoc Networks

 Traditional topology-based MANET routing protocols use stateful routing which increases the processing, communication and memory overheads. The high mobility of nodes in MANETs makes it difficult to maintain a dete...

Design and Development of a Small Heat Exchanger as Auxiliary Cooling System for Domestic and Industrial Applications

The epileptic supply of power from the national grid in Nigeria has made many industries to engage Internal Combustion Engine generators as alternative to providing energy required for production. The excessive use of th...

Design and Implementation of Distributed Facebook Crawler Based on Interaction Simulation

The increasing use of Online Social Networks (OSNs) has attracted such wide attention of people that OSNs have become a hot topic. There are already many systems previously designed as Facebook crawler. But these systems...

 To Study and Analyze to foresee market Using Data Mining Technique

 In every field there is huge growth and demand in knowledge and information over the internet. The automation using data mining and predictive technologies are doing an advance amount of deals in the markets. Data...

 Efficient Appraisal of Cloud Computing Through Comprehensive Confrontation of Security Issues and Discrepancies Involved

 Cloud computing is a new computational paradigm that an innovative business model allows organizations to adopt without prior IT investments well. Despite the potential benefits derived from the cloud computing,...

Download PDF file
  • EP ID EP151416
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Dr. V. R. Anitha, M. Tech, Ph. d 1, Dilip kumar Kotthapalli (2013).  Extending the Visual Cryptography Algorithm Without Removing Cover Images. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 4(4), 1288-1291. https://europub.co.uk/articles/-A-151416