SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS
STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS

ABSTRACT:

Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an
uncontrollable display quality problem for recovered images, and lacks a general approach to
construct visual secret sharing schemes (VSSs) for general access structures (GASs). We
propose herein a general and systematic approach to address these issues without sophisticated
codebook design. The approach can be used for binary secret images in non-computer-aided
decryption environments.

We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem
to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the
display quality of the recovered image is superior to that of previous studies.

More Related Content

Viewers also liked

Industrial power management system
Industrial power management systemIndustrial power management system
Industrial power management system
Ecwayt
 
Integrated design of efficient & reliable motor drive and pfc using low cost ...
Integrated design of efficient & reliable motor drive and pfc using low cost ...Integrated design of efficient & reliable motor drive and pfc using low cost ...
Integrated design of efficient & reliable motor drive and pfc using low cost ...
Ecwayt
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
Ecwayt
 
Interactive segmentation for change detection in multispectral remote sensing...
Interactive segmentation for change detection in multispectral remote sensing...Interactive segmentation for change detection in multispectral remote sensing...
Interactive segmentation for change detection in multispectral remote sensing...
Ecwayt
 
Contoh Undangan peringatan maulid nabi muhammad saw 1434 h
Contoh Undangan peringatan maulid nabi muhammad saw 1434 hContoh Undangan peringatan maulid nabi muhammad saw 1434 h
Contoh Undangan peringatan maulid nabi muhammad saw 1434 h
Anwar Siregar
 
Hybrid frequency modulation for pwm-integrated resonant converters
Hybrid frequency modulation for pwm-integrated resonant convertersHybrid frequency modulation for pwm-integrated resonant converters
Hybrid frequency modulation for pwm-integrated resonant converters
Ecwayt
 
Intelligent technologies for self sustaining, rfid-based, rural e health systems
Intelligent technologies for self sustaining, rfid-based, rural e health systemsIntelligent technologies for self sustaining, rfid-based, rural e health systems
Intelligent technologies for self sustaining, rfid-based, rural e health systems
Ecwayt
 
Reglamento del aprendiz sena 2012
Reglamento del aprendiz sena 2012Reglamento del aprendiz sena 2012
Reglamento del aprendiz sena 2012
Paola Rodriguez
 

Viewers also liked (9)

Industrial power management system
Industrial power management systemIndustrial power management system
Industrial power management system
 
Integrated design of efficient & reliable motor drive and pfc using low cost ...
Integrated design of efficient & reliable motor drive and pfc using low cost ...Integrated design of efficient & reliable motor drive and pfc using low cost ...
Integrated design of efficient & reliable motor drive and pfc using low cost ...
 
Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...Importance of coherence protocols with network applications on multicore proc...
Importance of coherence protocols with network applications on multicore proc...
 
Interactive segmentation for change detection in multispectral remote sensing...
Interactive segmentation for change detection in multispectral remote sensing...Interactive segmentation for change detection in multispectral remote sensing...
Interactive segmentation for change detection in multispectral remote sensing...
 
Contoh Undangan peringatan maulid nabi muhammad saw 1434 h
Contoh Undangan peringatan maulid nabi muhammad saw 1434 hContoh Undangan peringatan maulid nabi muhammad saw 1434 h
Contoh Undangan peringatan maulid nabi muhammad saw 1434 h
 
Hybrid frequency modulation for pwm-integrated resonant converters
Hybrid frequency modulation for pwm-integrated resonant convertersHybrid frequency modulation for pwm-integrated resonant converters
Hybrid frequency modulation for pwm-integrated resonant converters
 
Intelligent technologies for self sustaining, rfid-based, rural e health systems
Intelligent technologies for self sustaining, rfid-based, rural e health systemsIntelligent technologies for self sustaining, rfid-based, rural e health systems
Intelligent technologies for self sustaining, rfid-based, rural e health systems
 
Отчет об исполнении бюджета за 9 месяцев 2015 года
Отчет об исполнении бюджета за 9 месяцев 2015 годаОтчет об исполнении бюджета за 9 месяцев 2015 года
Отчет об исполнении бюджета за 9 месяцев 2015 года
 
Reglamento del aprendiz sena 2012
Reglamento del aprendiz sena 2012Reglamento del aprendiz sena 2012
Reglamento del aprendiz sena 2012
 

Similar to Image size invariant visual cryptography for general access structures subject to display quality constraints

Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
Ecway Technologies
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoring
Ecwaytech
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Ecwaytech
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
Ecwaytech
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwayt
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwaytech
 
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classification
Ecwaytech
 
Java model-based analysis of wireless system architectures for real-time app...
Java  model-based analysis of wireless system architectures for real-time app...Java  model-based analysis of wireless system architectures for real-time app...
Java model-based analysis of wireless system architectures for real-time app...
ecwayerode
 

Similar to Image size invariant visual cryptography for general access structures subject to display quality constraints (20)

Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
 
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classification
 
Java model-based analysis of wireless system architectures for real-time app...
Java  model-based analysis of wireless system architectures for real-time app...Java  model-based analysis of wireless system architectures for real-time app...
Java model-based analysis of wireless system architectures for real-time app...
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
Ecwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
Ecwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
Ecwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Ecwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
Ecwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
Ecwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
Ecwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
Ecwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Ecwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
Ecwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
Ecwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
Ecwayt
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...
Ecwayt
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital password
Ecwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital password
 

Image size invariant visual cryptography for general access structures subject to display quality constraints

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS ABSTRACT: Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). We propose herein a general and systematic approach to address these issues without sophisticated codebook design. The approach can be used for binary secret images in non-computer-aided decryption environments. We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the display quality of the recovered image is superior to that of previous studies.