RKO Technique for Color Visual Cryptography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.

Authors and Affiliations

Ms. Moushmee Kuri , Dr. Tanuja Sarode

Keywords

Related Articles

Balancing Load in Computational Grids: A New Approach

 The emergence of grid computing over the internet needs a hybrid load balancing algorithm which can take into account the various characteristics of the grid computing environment. Hence, this paper proposes a load...

 Efficient Data Gathering Mechanism using Mobile Collector in Wireless Sensor Networks

Abstract: In this paper, we proposed a new data-gathering mechanism for large-scale wireless sensor networks by introducing mobility into the network. A mobile data collector, for convenience called an M-collector in thi...

 Postgraduate Historical Research Format With Reference To Sudan and Nigerian Methods: A Comparative Perspective

  This study titled “Postgraduate Historical Research format with reference to Sudan and Nigerian Methods” A comparative perspective has been established to justify historical research procedures, examine the concep...

 A Survey Paper on Cluster Head Selection Techniques for MobileAd-Hoc Network

 Abstract: Wireless Technologies are very useful due to their use. Mobile Ad-hoc Network (MANET) hasbecome an essential technology in field of research In MANET, Clustering is an important research area, itoffers se...

 Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Network

 Wireless sensor networks are appealing to researchers due to their wide range of application in several fields such as military settings, critical infrastructure protection, target detection and tracking, envir...

Download PDF file
  • EP ID EP105126
  • DOI 0.9790/0661-162108993
  • Views 127
  • Downloads 0

How To Cite

Ms. Moushmee Kuri, Dr. Tanuja Sarode (2014).  RKO Technique for Color Visual Cryptography. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 89-93. https://europub.co.uk/articles/-A-105126