Secured Picode: Using Visual Cryptography

Journal Title: GRD Journal for Engineering - Year 2018, Vol 3, Issue 0

Abstract

In this paper, we propose a new technology which combines the visual cryptography with a picture embedding pictode for the security of information. Hence the paper combines both the advantages of the modified visual cryptography and improved picture embedded 2D barcode. Actually, there are two methods used to introduce confidentiality and security when visual data are transmitted through unsecured channels: data hiding and visual cryptography. Data hiding usually tries to embed data in digital media and transmit it in an imperceptible way so that the confidential messages is send securely and with visual cryptography the original input is shared between a set of participants by a secret image holder. Visual cryptography is a method of protecting the image-based secrets that has a computation free decoding process. The scheme provides an efficient way to hide the natural image among different shares. The two-dimensional barcodes have been widely used as an interface to connect potential customers and advertisement contents. However, the appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement.

Authors and Affiliations

Tharani. R, Manjusha P M, Silpa S, Athira. S. Nair

Keywords

Related Articles

An Application for Forest Area Change Detection and Classification

Land use is forced by environmental factors such as soil characteristics, climate, topography, and vegetation. Image processing helps to identify the type of land, by displaying particular image of that area and that ima...

Foot Lever Operated Refrigerator Door Opener and Motor Operated Closure

Refrigerators are widely used devices today. From keeping the food fresh to chilling the drinks, and even to preserve blood, refrigerators serve all such purposes. But sometimes it becomes cumbersome to use household ref...

An Efficient VLSI Execution of Data Transmission Error Detection and Correction Based Bloom Filter

Channel coding is commonly incorporated to obtain sufficient reception quality in wireless mobile communications transceiver to counter channel degradation due to inter-symbol interference, multipath dispersion, and ther...

Data Quality Issues and Current Approaches to Data Cleaning Process In Data Warehousing

In this paper we have discussed the problems of data quality which are addressed during data cleaning phase. Data cleaning is one of the important processes during ETL. Data cleaning is especially required when integrati...

HISTORICAL DATA PROCESSING OF WIRELESS SENSOR NETWORKS DATA TO REDUCE OVERHEAD ON DATA TRAVERSAL (WSNRODT)

The basic architecture of Wireless Sensor Networks is usually a hybrid type where it is a combination of infrastructure oriented and infrastructure less networks. The Communication from sensor to sensor head takes place...

Download PDF file
  • EP ID EP295375
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

Tharani. R, Manjusha P M, Silpa S, Athira. S. Nair (2018). Secured Picode: Using Visual Cryptography. GRD Journal for Engineering, 3(0), 191-196. https://europub.co.uk/articles/-A-295375