Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 9
Abstract
Visual Cryptography is a cryptographic technique which can hide the visual data (images, pictures, text etc.) and which can be decrypted without a computer but in a tedious way. The best-known techniques that visual cryptography has are encrypting the images by breaking those images into n shares. Each n-1 share will not reveal the actual image but decrypting the n shares will give the actual information of the image. We can also make the image zoom and find out the information in it but we can hide this information through these techniques of visual cryptography. Even Watermarking is one of the beautiful techniques which protect the copyright ownership of a digital image. According to the proposed method, the watermark pattern does not have to be embedded into the original image directly, which makes it harder to detect or recover from the marked image in an illegal way. It can be retrieved from the marked image without making comparison with the original image. However, their concepts are different but their main purpose is of hiding the original information. For visual cryptography, a set of share binary images is used to protect the content of the hidden image. The hidden image can only be revealed when enough share images are obtained. For watermarking, the hidden image is usually embedded in a single halftone image while preserving the quality of the watermarked halftone image. Hence, visual cryptography requires no understanding and, because security is effectively in the hands of the end user, he or she has a feeling of control, which promotes trust.
Authors and Affiliations
C. Veerabhadra Rao , G. Gayatri
A Countermeasure for Black Hole Attack in Mobile WiMAX Networks
Mobile WiMAX has drawn much attention due to its benefits. Nevertheless, security is a challenge and has to be ensured. The attacker may make use of parts of unencrypted management messages and acquire information about...
An Approach for Storage Security in Cloud Computing- A Survey
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...
Query Optimization: Finding the Optimal Execution Strategy
The query optimizer is the component of a database management system that attempts to determine the most efficient way to execute a query. The optimizer considers the possible query plans for a given input query, a...
Detection and Correction of Red Eye in Digital Photograph
Abstract—Red-eye effect often appears in photographs while taking pictures with flash. Flash light passing through pupil is reflected on the blood vessels, and arrives at a camera lens. This causes red-eyes in photogr...
Design of Wireless Monitor System Based On S3C2440 and GPRS
This Paper introduces a new type Wireless Monitoring System, which applied in Industrial Field. In the Proposed system, the main hardware includes the S3C2440 Microcontroller based on ARM9 core, and the software adop...