RKO Technique for Color Visual Cryptography

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.

Authors and Affiliations

Ms. Moushmee Kuri , Dr. Tanuja Sarode

Keywords

Related Articles

Various Methods for Object Tracking- A Review

Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...

Web Usability Recommendation Model: An Approach to Enhance Web Usability

Abstract: The success of any business mainly e- business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web...

 Evaluating Total Cost of Ownership for University EnterpriseResource Planning: Case of Maseno University

 Abstract: Higher learning institutions (HEI) are investing in IT to attain operational excellence. Organizationslooking to reduce technology costs typically look for ways to reduce the Total Cost of Ownership (TCO)...

 Improving search time for contentment based image retrieval via,  LSH, MTRee, and EMD bounds

 Comparison of images requires a distance metric that is sensitive to the spatial location of objects and features. The Earth Mover’s Distance was introduced in Computer Vision to better approach human perceptua...

Blueprint on Comparison of WSN Protocols

Abstract: A sensor network is a group of specialized devices that converts energy of one form into another that also designed to monitor and record condition at places of different areas. Commonly monitored parameters ar...

Download PDF file
  • EP ID EP105126
  • DOI 0.9790/0661-162108993
  • Views 128
  • Downloads 0

How To Cite

Ms. Moushmee Kuri, Dr. Tanuja Sarode (2014).  RKO Technique for Color Visual Cryptography. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 89-93. https://europub.co.uk/articles/-A-105126