Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image
Authors and Affiliations
Prasanna Kumar H R , Niranjan N Chiplunkar
Secure Authentication System Using Video Surveillance
Biometric person recognition for secure access to restricted data/services using PC with internet connection. To study, an application PC to be used as a biometric capturing device that captures the video and &n...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (VANETs)
Vehicular communication is considered to be a backbone for many critical safety applications. In order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and ...
Design and Implementation of Thresholding Algorithm based on MFR for Retinal Fundus Images
Abstract: In this paper, the entropy of maximum filter response (MFR) is applied followed by normalization and thresholding for retinal fundus image is used. The performance of our proposed method has been assessed on 23...
An Efficient Strategy to Reduce and To Restrict Malicious Attacks on the Web with Web Sense
Abstract: As the growth of Information Technology and Communication has led to vivid change, people can connect with each other globally at anywhere and in anytime through search engines. These search engines has also tr...
An Effective Keyword Search over Encrypted Data In Cloudenvironment
As Cloud Computing ends up pervasive, touchy data are as a rule progressively unified into the cloud. For the insurance of information protection, delicate information must be scrambled before outsourcing, which makes co...