RKO Technique for Color Visual Cryptography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.

Authors and Affiliations

Ms. Moushmee Kuri , Dr. Tanuja Sarode

Keywords

Related Articles

 Virtualization: A Sustainable Resource Management Strategy inComputing Practices

 Abstract: Many computing practitioners are challenged with resource inefficiencies and insufficienciesemanating from poor management strategy. In order to reduce complexity and risk while improvingproductivity, pra...

Image Denoising with Wavelet Based Thresholding

Abstract: Image processing is a field that continues to grow, with new applications being developed at an ever increasing pace. Image Denoising is an important part of image processing and computer vision problems. The...

 Survey on Routing Protocols for Under Water Sensor Networks

 There are certain routing protocols in underwater sensor network. Providing efficient protocols for underwater sensor networks is a challenging factor. UNSW often uses acoustic channels instead of Radio channel...

 Integration of Irreversible Gates in Reversible Circuits Using NCT Library

 The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...

 High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter Based NEDA Technique

 In this paper, we describe an efficient Xilinx Virtix4 discrete wavelet transform (DWT) using 9/7 filter based new efficient distributed arithmetic (NEDA) Technique. We demonstrate that NEDA is a very efficie...

Download PDF file
  • EP ID EP105126
  • DOI 0.9790/0661-162108993
  • Views 73
  • Downloads 0

How To Cite

Ms. Moushmee Kuri, Dr. Tanuja Sarode (2014).  RKO Technique for Color Visual Cryptography. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 89-93. https://europub.co.uk/articles/-A-105126