Securing Digital Images Using visual Cryptography
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 12
Abstract
Visual cryptography technique allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. Security has become an inseparable issue as Information Technology is ruling the world now. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography can be applied for copy right for images, access control to user images ,visual authentication and identification any kind images of images like(normal or digital).Visual cryptography is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information (pictures, text, etc)to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking sufficient number of shares reveals the secret image. Shares are visually presented in transparencies.
Authors and Affiliations
Kirti P. Sahare
Outlier Detection and Analysis using Hybrid Approach for Mixed datasets
There are several approaches of outlier detection employed in many study areas amongst which distance based and density based outlier detection techniques have gathered most attention of researchers.So we are using hybri...
Physico-Chemical Characterization of Ground Water, Case Study of Okene, North Central Nigeria
Okene is fast becoming an urban city and the search for groundwater is ever on the increase. Peoples resulted to drilling of boreholes in order to supplement the earth dam that has served as the only source of water for...
A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering
Cloud is huge platform that provides various services its users such as, storage, management, maintain, searching, sorting of data etc. With this advantages data owner outsourced their data in cloud. Before outsourcing o...
Wireless Transmission of Power
This article gives you information about the wireless transmission of power (Witricity). This may look futuristic but this technology makes future free of chargers, wires, Cables etc, Like Wi-Fi zones there will be elect...
A Comparison Study of Non-Standard Analysis and Non-Archimedean Ultrametric Theory
Infinitesimal elements are mainly considered in non-standard analysis. Recently a new scale free analysis has been developed using the concept of relative infinitesimals, scale free infinitesimals and their corresponding...