SlideShare a Scribd company logo
1 of 6
Download to read offline
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
INTERNATIONAL JOURNAL OF ELECTRONICS AND 
17 – 19, July 2014, Mysore, Karnataka, India 
COMMUNICATION ENGINEERING  TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 8, August (2014), pp. 194-199 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
www.jifactor.com 
194 
 
IJECET 
© I A E M E 
A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR 
MAINTAINING THE SECURITY OF VISUAL INFORMATION 
TRANSACTION 
Akshatha M M#1 Lokesh B#2 Nuthan A C#3 
#1Student, Dept. of ECE, SIT Mangalore 
#2Dept. of EEE, SIT Mangalore 
#3Research Scholar, Jain University 
ABSTRACT 
As the growth in the technology increases maintaining the security of visual information 
during its transaction has to be increased. Rapid growth in the techniques for doing so is also 
increasing. Internet has become most commonly used media for communication and hence text, 
voice, video, Images and many more are transmitted through Internet. These might include Military 
Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by 
safer means with enhanced security. In the process of Visual Cryptography a secret image is 
encrypted into shares which refuse to divulge information about the original secret image. In this 
paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to 
reduce the degradation of the resultant image is proposed by an extension from gray to color image. 
Pixel Index Method is discussed to improve the security for images. 
Keywords: Security, Visual Information, Visual Cryptography. 
I. INTRODUCTION 
Cryptography refers to the study of mathematical techniques and related aspects of 
information security like data confidentiality, data integrity and of data authentication. In the process 
of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information 
about the original secret image. Decryption is through a separate decryption algorithm. A basic 
model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the 
resultant image is twice the size of secret image. 
As the advent of electronic applications increases, providing the security for information in 
an open network environment is required. Encryption is a method of transforming original data,
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
called plain text or clear text into a form that appears to be random and unreadable which is called 
Cipher text. Plain text is either in the form that can be understood by a person (document) or by a 
computer (executable code). 
195 
 
Once it is transformed into Cipher text, neither human nor machine can properly process it 
until it is decrypted. This enables the transmission of confidential information over insecure channels 
without unauthorized disclosure. When data is stored on a computer it is protected by logical and 
physical access controls. When this same sensitive information is sent over a network, the 
information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual 
Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They 
proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares 
[3], revealing the secret image through Share Stacking. 
Fig. 1: Example of Visual Cryptography 
In figure 1 a secret image that has to be sent is divided into shares. When these two shares are 
stacked together and put into a Human Visual System the resultant image is revealed. In the visual 
secret sharing model [1], a secret picture must be shared among n participants. The picture is divided 
into n shares so that if m transparencies (shares) are placed together the picture is visible. When there 
are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of 
black and white pixels with each pixel being handled separately. 
II. RELATED WORK 
2.1 Basic (2, 2) Scheme 
The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an 
image from a share is impossible. Each share is printed in transparency. A share is a random noise. 
Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. 
The figure shows how a pixel in a image in divided into two sub pixels depending on whether the 
pixel is black or white. By doing so the width of the share increases. This is termed as Pixel 
Expansion.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
196 
 
Fig. 2: A (2,2) Visual Cryptography Scheme 
2.2 Pseudo Randomized Visual Cryptography Scheme 
Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random 
technique [10]. Each pixel is being handled separately. The input is a secret image and the output is 
the shares. Here there is no pixel expansion. The decoded image and the original secret image are of 
the same sizes. But the secret image which is decoded had a darker resolution than the original 
image. Preprocessing technique was used to overcome this problem [6]. 
Fig. 3: Pseudo Random Scheme 
III. PROPOSED WORK 
In this paper, the problem of pixel expansion is eliminated and also a method is proposed for 
color image usage and thus the degradation of the resultant image is reduced. Chaotic random 
number generation technique is used to provide much more security. Pixel index reversal is applied 
where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase 
the scrambling and thus there will be increase in the security. The secret image can be revealed by a 
decryption algorithm. A secret image is first split into R G B component and then the security 
techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB 
components. Each component is handled separately. Each pixel is decomposed using Bit Plane
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This 
result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered 
and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the 
Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the 
Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 
197 
 
Fig. 4: Block Diagram of the Cryptographic Technique 
3.1 Simulations and Results 
The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the 
gray image. 
Fig. 5: Results for gray image as input
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
198 
 
Fig. 6: Results for Color Image as input 
Fig. 7: Results for Color Image after applying the Security Methods 
Fig. 8: Complete Encrypted Result 
3.2 Comparison of the Algorithms 
Table. 1: Comparison of Algorithms 
Algorithm Pixel Security Quality 
Naor, 
Double Increase Poor 
Shamir 
(k, n) 
scheme 
Double Increase Poor 
Existing 
Method 
No 
Expansion 
Increase Increase 
Proposed 
Work 
No 
Expansion 
Increase Color 
Image 
In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was 
expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant 
image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the 
concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna 
Babu and team the problem of pixel expansion was eliminated and pixel reversal method was 
suggested [10]. The security also increased because of Chaotic Randomization. In the proposed 
technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The 
security increases due to Scan Pattern method and Chaotic Randomization. This technique is also 
applicable for color images and so the quality increases.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
199 
IV. CONCLUSION AND FUTURE WORK 
 
The security increases as the scrambling is more. The time consumption is also in terms of 
Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel 
expansion is also eliminated. Future work can include the application of this technique for bit map 
images. Some techniques can be made to improve the quality of resultant image and also to reduce 
the power consumption. 
V. REFERENCES 
1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, 
Massachusetts Institute of Technology, 1979. 
2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 
9–12, LNCS 950, Springer Verlag, 1994, 1–12. 
3. “What are Visual Secret Sharing Schemes”, General concept. 
4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual 
Cryptography for general access structure”, ICALP'96, Italy, 1996. 
5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 
1998, http://www.cl.cam.ac.uk/~fms27/vck/. 
6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, 
IEEE Transaction on image processing, vol.15, no.8, 2006. 
7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast 
visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 
8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 
9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. 
Theory of Cryptography Library, (96-07), 1996. 
10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray 
Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual 
Information Security”, IEEE, 2013. 
BIOGRAPHY 
Akshatha M M 
Completed her BE under Visvesvaraiah Technological University, Belgaum in 
Electronics and Communication Engineering. She completed her M. Tech degree, 
under the same university in VLSI and Embedded Systems. At present she is 
working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. 
Lokesh B 
Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, 
Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. 
Nuthan A C 
Completed his BE in Electronics and Communication Engineering and M. Tech in Digital 
Electronics under Visvesvaraiah Technological University. At present he is working as Assistant 
Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a 
research scholar under Jain University, Bangalore.

More Related Content

What's hot

Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 

What's hot (20)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 

Viewers also liked (7)

LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
LDPC
LDPCLDPC
LDPC
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction

Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 

Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction (20)

IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
F42022628
F42022628F42022628
F42022628
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
R04405103106
R04405103106R04405103106
R04405103106
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 

More from IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

A novel technique of visual cryptography for maintaining the security of visual information transaction

  • 1. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 INTERNATIONAL JOURNAL OF ELECTRONICS AND 17 – 19, July 2014, Mysore, Karnataka, India COMMUNICATION ENGINEERING TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 8, August (2014), pp. 194-199 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com 194 IJECET © I A E M E A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR MAINTAINING THE SECURITY OF VISUAL INFORMATION TRANSACTION Akshatha M M#1 Lokesh B#2 Nuthan A C#3 #1Student, Dept. of ECE, SIT Mangalore #2Dept. of EEE, SIT Mangalore #3Research Scholar, Jain University ABSTRACT As the growth in the technology increases maintaining the security of visual information during its transaction has to be increased. Rapid growth in the techniques for doing so is also increasing. Internet has become most commonly used media for communication and hence text, voice, video, Images and many more are transmitted through Internet. These might include Military Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by safer means with enhanced security. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. In this paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to reduce the degradation of the resultant image is proposed by an extension from gray to color image. Pixel Index Method is discussed to improve the security for images. Keywords: Security, Visual Information, Visual Cryptography. I. INTRODUCTION Cryptography refers to the study of mathematical techniques and related aspects of information security like data confidentiality, data integrity and of data authentication. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. Decryption is through a separate decryption algorithm. A basic model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the resultant image is twice the size of secret image. As the advent of electronic applications increases, providing the security for information in an open network environment is required. Encryption is a method of transforming original data,
  • 2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India called plain text or clear text into a form that appears to be random and unreadable which is called Cipher text. Plain text is either in the form that can be understood by a person (document) or by a computer (executable code). 195 Once it is transformed into Cipher text, neither human nor machine can properly process it until it is decrypted. This enables the transmission of confidential information over insecure channels without unauthorized disclosure. When data is stored on a computer it is protected by logical and physical access controls. When this same sensitive information is sent over a network, the information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares [3], revealing the secret image through Share Stacking. Fig. 1: Example of Visual Cryptography In figure 1 a secret image that has to be sent is divided into shares. When these two shares are stacked together and put into a Human Visual System the resultant image is revealed. In the visual secret sharing model [1], a secret picture must be shared among n participants. The picture is divided into n shares so that if m transparencies (shares) are placed together the picture is visible. When there are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of black and white pixels with each pixel being handled separately. II. RELATED WORK 2.1 Basic (2, 2) Scheme The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an image from a share is impossible. Each share is printed in transparency. A share is a random noise. Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. The figure shows how a pixel in a image in divided into two sub pixels depending on whether the pixel is black or white. By doing so the width of the share increases. This is termed as Pixel Expansion.
  • 3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 196 Fig. 2: A (2,2) Visual Cryptography Scheme 2.2 Pseudo Randomized Visual Cryptography Scheme Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random technique [10]. Each pixel is being handled separately. The input is a secret image and the output is the shares. Here there is no pixel expansion. The decoded image and the original secret image are of the same sizes. But the secret image which is decoded had a darker resolution than the original image. Preprocessing technique was used to overcome this problem [6]. Fig. 3: Pseudo Random Scheme III. PROPOSED WORK In this paper, the problem of pixel expansion is eliminated and also a method is proposed for color image usage and thus the degradation of the resultant image is reduced. Chaotic random number generation technique is used to provide much more security. Pixel index reversal is applied where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase the scrambling and thus there will be increase in the security. The secret image can be revealed by a decryption algorithm. A secret image is first split into R G B component and then the security techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB components. Each component is handled separately. Each pixel is decomposed using Bit Plane
  • 4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 197 Fig. 4: Block Diagram of the Cryptographic Technique 3.1 Simulations and Results The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the gray image. Fig. 5: Results for gray image as input
  • 5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 198 Fig. 6: Results for Color Image as input Fig. 7: Results for Color Image after applying the Security Methods Fig. 8: Complete Encrypted Result 3.2 Comparison of the Algorithms Table. 1: Comparison of Algorithms Algorithm Pixel Security Quality Naor, Double Increase Poor Shamir (k, n) scheme Double Increase Poor Existing Method No Expansion Increase Increase Proposed Work No Expansion Increase Color Image In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna Babu and team the problem of pixel expansion was eliminated and pixel reversal method was suggested [10]. The security also increased because of Chaotic Randomization. In the proposed technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The security increases due to Scan Pattern method and Chaotic Randomization. This technique is also applicable for color images and so the quality increases.
  • 6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 199 IV. CONCLUSION AND FUTURE WORK The security increases as the scrambling is more. The time consumption is also in terms of Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel expansion is also eliminated. Future work can include the application of this technique for bit map images. Some techniques can be made to improve the quality of resultant image and also to reduce the power consumption. V. REFERENCES 1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, Massachusetts Institute of Technology, 1979. 2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 9–12, LNCS 950, Springer Verlag, 1994, 1–12. 3. “What are Visual Secret Sharing Schemes”, General concept. 4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual Cryptography for general access structure”, ICALP'96, Italy, 1996. 5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 1998, http://www.cl.cam.ac.uk/~fms27/vck/. 6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, IEEE Transaction on image processing, vol.15, no.8, 2006. 7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. Theory of Cryptography Library, (96-07), 1996. 10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual Information Security”, IEEE, 2013. BIOGRAPHY Akshatha M M Completed her BE under Visvesvaraiah Technological University, Belgaum in Electronics and Communication Engineering. She completed her M. Tech degree, under the same university in VLSI and Embedded Systems. At present she is working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. Lokesh B Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. Nuthan A C Completed his BE in Electronics and Communication Engineering and M. Tech in Digital Electronics under Visvesvaraiah Technological University. At present he is working as Assistant Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a research scholar under Jain University, Bangalore.