Securing Digital Images Using visual Cryptography
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 12
Abstract
Visual cryptography technique allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. Security has become an inseparable issue as Information Technology is ruling the world now. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography can be applied for copy right for images, access control to user images ,visual authentication and identification any kind images of images like(normal or digital).Visual cryptography is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information (pictures, text, etc)to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking sufficient number of shares reveals the secret image. Shares are visually presented in transparencies.
Authors and Affiliations
Kirti P. Sahare
Mechanical Behaviour of AZ31 Mg/Ti Composites
Metal matrix composites have emerged as a new class of advanced materials in aerospace and automotive applications. Magnesium matrix composite reinforced with titanium (Mg-Ti). The most important property of magnesium-ti...
Automatic College Bell Using Raspberry-Pi
The world over the decades has made considerable advancement in automation, au-tomation is employed in every sector whether it is home or industry. Here a new and inexpensive design is being presented. This design a trem...
Implementation of Soft Handover in “3G” using OPNET
Mobile applications for multimedia services such as video conferencing, file downloading and web browsing etc. over the network have high demands in terms of available network resources and Quality of Service (QoS) perfo...
Correction of Power Quality Issues in Distribution System Using DSTATCOM with SSULMS Control Algorithm
Power quality disturbances is the major concern in the distribution system, that leads to tripping and malfunction of sensitive equipments in distribution system. A Distribution Static Synchronous Compensator (DSTATCOM)...
Water Quality of Rajgir Hot Spring, Nalanda Bihar
The Rajgir hot spring sites located in Nalanda district of Bihar State. This spring is sulphur containing hot spring. The various parameters analyzed were Temperature, pH, Electrical Conductivity, Total Hardness, Total A...