Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image

Authors and Affiliations

Prasanna Kumar H R , Niranjan N Chiplunkar

Keywords

Related Articles

 Web Data mining-A Research area in Web usage mining

 Data mining technology has emerged as a means for identifying patterns and trends from large quantities of data. The data mining technology normally adopts data integration method to generate data warehouse, on...

 Software Process Improvement: Influence Factors-Problem, Cause, Solution

 Abstract: Software Process Improvement (SPI) is a systematic approach and continuous improvement of software development organization’s ability to produce and deliver quality software with in time and budget constr...

 An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases

 Privacy Preserving Data Mining(PPDM) is a rising field of research in Data Mining and various approaches are being introduced by the researchers. One of the approaches is a sanitization process, that transform...

 Design & Development of an Advanced Database ManagementSystem Using Multiversion Concurrency Control Model for aMultiprogramming Environment

 Abstract: Multi Version Concurrency Control (MVCC) is a locking scheme commonly used by moderndatabase implementations to control fast, safe concurrent access to shared data. MVCC is designed to providethe followin...

Design and Development of Secure Electronic Voting System Using Radio Frequency Identification and Enhanced Least Significant Bit Audio Steganographic Technique

Abstract: Electronic decision making process has been adjudged as an alternative measure to address the flaws of ballot voting system for the delivery of free, fair, confident, credible and transparent elections. Electro...

Download PDF file
  • EP ID EP96399
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Prasanna Kumar H R, Niranjan N Chiplunkar (2016). Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 19-23. https://europub.co.uk/articles/-A-96399