Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps  

Abstract

Visual Cryptography is a cryptographic technique which can hide the visual data (images, pictures, text etc.) and which can be decrypted without a computer but in a tedious way. The best-known techniques that visual cryptography has are encrypting the images by breaking those images into n shares. Each n-1 share will not reveal the actual image but decrypting the n shares will give the actual information of the image. We can also make the image zoom and find out the information in it but we can hide this information through these techniques of visual cryptography. Even Watermarking is one of the beautiful techniques which protect the copyright ownership of a digital image. According to the proposed method, the watermark pattern does not have to be embedded into the original image directly, which makes it harder to detect or recover from the marked image in an illegal way. It can be retrieved from the marked image without making comparison with the original image. However, their concepts are different but their main purpose is of hiding the original information. For visual cryptography, a set of share binary images is used to protect the content of the hidden image. The hidden image can only be revealed when enough share images are obtained. For watermarking, the hidden image is usually embedded in a single halftone image while preserving the quality of the watermarked halftone image. Hence, visual cryptography requires no understanding and, because security is effectively in the hands of the end user, he or she has a feeling of control, which promotes trust.  

Authors and Affiliations

C. Veerabhadra Rao , G. Gayatri

Keywords

Related Articles

Optimize Space Search Using FCC_STF Algorithm in Fuzzy Co-Clustering through Search Engine  

Fuzzy co-clustering can be improved if we handle two main problem first is outlier and second curse of dimensionality .outlier problem can be reduce by implementing page replacement algorithm like FIFO, LRU or prio...

Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET

In this paper we investigate and implementing trust based route selection in mobile wireless ad hoc networks. A system that stores and updates trust values for nodes encountered in mobile ad hoc networks. Since a rout...

Enforcing Multi-user Security Policies in Cloud Computing

The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...

Disambiguation of User Queries in Search Engines 

With the increasing number of user queries to search engine. it has become necessary to study the area of Information Retrieval. User always expects to get the most appropriate and relevant results to the query. Bu...

Download PDF file
  • EP ID EP93607
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

C. Veerabhadra Rao, G. Gayatri (2012). Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(9), 119-122. https://europub.co.uk/articles/-A-93607