RKO Technique for Color Visual Cryptography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algorithms using keys, and the later approach involves dividing the image into random shares without the use of keys. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share. The original secret image can be recovered from the two shares simply by Xoring the two shares without any loss of image quality.
Authors and Affiliations
Ms. Moushmee Kuri , Dr. Tanuja Sarode
Photo Polymerization of Host-Guest Complexes of Β- Cyclodextrin / Butyl Acrylate in Aqueous Solution, Kinetics And Mechanism
Abstract: The Photo polymerization of β-cyclodextrin host–guest complexes of Butyl acrylate sensitized by Fluoroscein sodium in homogeneous aqueous medium has been studied. The polymerization was carried out in presence...
A Proposed Framework for Managing Technical People in Software Projects
Abstract: The human is the most significant success factor in any organization, or project. The main purpose of this research is to introduce a proposed framework for enhancing the technical team management in Informatio...
Qualitative Study on the efficiency of Load balancing algorithmsin Cloud Environment
Abstract: Load balancing in cloud is different from the typical architecture of load balancing techniques. Thisopens up new opportunities and challenges. Resource management is the use of available processors in th...
Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques
Abstract: Mobile Ad hoc networks are increasingly popular these days as they function without major requirements of state of the art infrastructure and the fact that they can function without the need for a centr...
Protection of Direct and Indirect Discrimination using Prevention Methods
Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated &nbs...