"Randomized Visual Cryptography scheme for color images”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: In this paper, we propose a new color visual cryptography scheme which is based on modified visualcryptography. Visual Cryptography is based on cryptography where n images are encoded in a way that onlythe human visual system can decrypt the hidden message without any cryptographic computations when allshares are stacked together. In this scheme sender can share n-1 natural images and one secrete image ofvariable size with the server and it make the encryption with extraction of feature of natural images withoutaltering the contents of natural images. When the receiver identification is done that time server make thedecryption process and send the secrete image with transmitted by highly secure secret channel. Moreover, thisapproach avoids the pixel expansion problem and makes it possible to recover secret images without anydistortion.
Authors and Affiliations
Miss. Pallavi M. Sapate , Miss. Vanita D. Jadhav
Combined Cluster Based Ranking for Web Document Using Semantic Similarity
Multidocument summarization is a set of documents on the same topic, the output is a paragraph length summary. Since documents often cover a number of topic themes with each theme represented by a cluster o...
Challenges and Issues of Cluster Based Security in MANET
Abstract: Mobile ad-hoc networks are a specific kind of wireless networks that can be quickly deployed without pre- existing infrastructures. Even though there are various studies on cluster based security in MANET but t...
Balancing Load in Computational Grids: A New Approach
The emergence of grid computing over the internet needs a hybrid load balancing algorithm which can take into account the various characteristics of the grid computing environment. Hence, this paper proposes a load...
DELB: Differential Evolution BASED Load Balancing Technique for Load Balance in Cloud Computing
Cloud applications are often subject to unexpected events like flash crowds and hardware failures. Scholars addressed this matter on two various fronts: first, they presented replicas – application copies with same funct...
Using Data-Mining Technique for Census Analysis to Give GeoSpatial Distribution of Nigeria.
There are patterns buried within the mass of data in the various editions of population census figures in this country. These are patterns that will be impossible for humans working with bare eyes and hands, to u...