Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps  

Abstract

Visual Cryptography is a cryptographic technique which can hide the visual data (images, pictures, text etc.) and which can be decrypted without a computer but in a tedious way. The best-known techniques that visual cryptography has are encrypting the images by breaking those images into n shares. Each n-1 share will not reveal the actual image but decrypting the n shares will give the actual information of the image. We can also make the image zoom and find out the information in it but we can hide this information through these techniques of visual cryptography. Even Watermarking is one of the beautiful techniques which protect the copyright ownership of a digital image. According to the proposed method, the watermark pattern does not have to be embedded into the original image directly, which makes it harder to detect or recover from the marked image in an illegal way. It can be retrieved from the marked image without making comparison with the original image. However, their concepts are different but their main purpose is of hiding the original information. For visual cryptography, a set of share binary images is used to protect the content of the hidden image. The hidden image can only be revealed when enough share images are obtained. For watermarking, the hidden image is usually embedded in a single halftone image while preserving the quality of the watermarked halftone image. Hence, visual cryptography requires no understanding and, because security is effectively in the hands of the end user, he or she has a feeling of control, which promotes trust.  

Authors and Affiliations

C. Veerabhadra Rao , G. Gayatri

Keywords

Related Articles

Development and Verification of VHDL code for 16 bit ADC for FPGA based Beam Position Measurement Board  

FPGA based designed card provide several advantages over custom designed IC based cards such as reduced cost, reduction in components, reduction in size ,easily coded . It is flexible because its parameters can be...

A Study of Decision Support System (With reference to Indian Retail Industry) 

The retail sector was one of the first sectors to make significant investments in collecting and integrating customer data in data warehouses. Retailers have generally earned a significant return on their IT system...

FPGA Implementation of an Advanced Traffic Light Controller using Verilog HDL  

Traffic lights are the signaling devices used to manage traffic on multi-way road. These are positioned to control the competing flow of the traffic at the road intersections to avoid collisions. By displaying ligh...

Coordinated control ULTC power transformer with STATCOM for Voltage Control and Reactive Power Compensation 

The static synchronous compensator (STATCOM) is one type of FACTS devices which resembles in many respects a rotating synchronous condenser used for voltage control and reactive power compensation. The STATCOM...

Solving Three Dimensional Bin Packing Problem Using Elitism Based Genetic Algorithm  

The bin packing problem is a combinatorial NP-hard problem. In it, objects of different volumes must be packed into a finite number of bins of capacity V in a way that minimizes the number of bins used. Most of the...

Download PDF file
  • EP ID EP93607
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

C. Veerabhadra Rao, G. Gayatri (2012). Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(9), 119-122. https://europub.co.uk/articles/-A-93607