Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image
Authors and Affiliations
Prasanna Kumar H R , Niranjan N Chiplunkar
Evaluation of Bitmap Index Compression using Data Pump in Oracle Database
Abstract: Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. We review the existing technologies of Compression and introduce the bitmap index...
Role of Operational System Design in Data Warehouse Implementation: Identifying the Operational System Design Gaps and techniques to handle them
Abstract: Data warehouse designing process takes input from operational system of the organization. Quality of data warehousing solution depends on design of operational system. Often, operational system implementations...
Bluetooth Based Automatic Hotel Service System Using Python
This paper describes a Bluetooth based automatic hotel service system. This paper describes the protocol and provides the implementation details. Nowadays hotels are spending lot of money for the attendance, t...
Performance Analysis of Hybrid (supervised and unsupervised) method for multiclass data set
Abstract: Due to the increasing demand for multivariate data analysis from the various application the dimensionality reduction becomes an important task to represent the data in low dimensional space for the robus...
Penetrating Windows 8 with syringe utility
: Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...