RKO Technique for Color Visual Cryptography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.
Authors and Affiliations
Ms. Moushmee Kuri , Dr. Tanuja Sarode
Virtualization: A Sustainable Resource Management Strategy inComputing Practices
Abstract: Many computing practitioners are challenged with resource inefficiencies and insufficienciesemanating from poor management strategy. In order to reduce complexity and risk while improvingproductivity, pra...
Image Denoising with Wavelet Based Thresholding
Abstract: Image processing is a field that continues to grow, with new applications being developed at an ever increasing pace. Image Denoising is an important part of image processing and computer vision problems. The...
Survey on Routing Protocols for Under Water Sensor Networks
There are certain routing protocols in underwater sensor network. Providing efficient protocols for underwater sensor networks is a challenging factor. UNSW often uses acoustic channels instead of Radio channel...
Integration of Irreversible Gates in Reversible Circuits Using NCT Library
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter Based NEDA Technique
In this paper, we describe an efficient Xilinx Virtix4 discrete wavelet transform (DWT) using 9/7 filter based new efficient distributed arithmetic (NEDA) Technique. We demonstrate that NEDA is a very efficie...