Secured Picode: Using Visual Cryptography

Journal Title: GRD Journal for Engineering - Year 2018, Vol 3, Issue 0

Abstract

In this paper, we propose a new technology which combines the visual cryptography with a picture embedding pictode for the security of information. Hence the paper combines both the advantages of the modified visual cryptography and improved picture embedded 2D barcode. Actually, there are two methods used to introduce confidentiality and security when visual data are transmitted through unsecured channels: data hiding and visual cryptography. Data hiding usually tries to embed data in digital media and transmit it in an imperceptible way so that the confidential messages is send securely and with visual cryptography the original input is shared between a set of participants by a secret image holder. Visual cryptography is a method of protecting the image-based secrets that has a computation free decoding process. The scheme provides an efficient way to hide the natural image among different shares. The two-dimensional barcodes have been widely used as an interface to connect potential customers and advertisement contents. However, the appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement.

Authors and Affiliations

Tharani. R, Manjusha P M, Silpa S, Athira. S. Nair

Keywords

Related Articles

Virtualization Security

The recent form of change in working on resources and platform introduced the term virtualization. Virtualization comes with its own merits and challenges. As it hides physical characteristics of the resources and the co...

Numerical Optimisation of Heat Transfer using Pulsating Jet Array with Phase Shift

The advancement in science had led to highly complicated electronic devices and at the same time the size of such devices is getting reduced day by day. The amount of heat generated by these devices is increasing in par...

SURVEY ON TRACKING OF DEMENTIA PATIENTS BASED ON DIVERSE METHODS

One of the common problems face by elderly people is Dementia, and the people affected by this Disease is escalating as compared to the past. People suffering from Dementia and Alzheimer’s face many challenges in their d...

Mapping of XML Document and Relational Database (Using Structural Queries)

Now a day's, XML files are most vital facet of code trade. As a core normal, XML provides a solid foundation around that different standards could grow. Making DTD’s is possibly what the creators of XML had in mind after...

An Application for Forest Area Change Detection and Classification

Land use is forced by environmental factors such as soil characteristics, climate, topography, and vegetation. Image processing helps to identify the type of land, by displaying particular image of that area and that ima...

Download PDF file
  • EP ID EP295375
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Tharani. R, Manjusha P M, Silpa S, Athira. S. Nair (2018). Secured Picode: Using Visual Cryptography. GRD Journal for Engineering, 3(0), 191-196. https://europub.co.uk/articles/-A-295375