Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image
Authors and Affiliations
Prasanna Kumar H R , Niranjan N Chiplunkar
Web Data mining-A Research area in Web usage mining
Data mining technology has emerged as a means for identifying patterns and trends from large quantities of data. The data mining technology normally adopts data integration method to generate data warehouse, on...
Software Process Improvement: Influence Factors-Problem, Cause, Solution
Abstract: Software Process Improvement (SPI) is a systematic approach and continuous improvement of software development organization’s ability to produce and deliver quality software with in time and budget constr...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases
Privacy Preserving Data Mining(PPDM) is a rising field of research in Data Mining and various approaches are being introduced by the researchers. One of the approaches is a sanitization process, that transform...
Design & Development of an Advanced Database ManagementSystem Using Multiversion Concurrency Control Model for aMultiprogramming Environment
Abstract: Multi Version Concurrency Control (MVCC) is a locking scheme commonly used by moderndatabase implementations to control fast, safe concurrent access to shared data. MVCC is designed to providethe followin...
Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique
Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electro...