SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS
STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS

ABSTRACT:

Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an
uncontrollable display quality problem for recovered images, and lacks a general approach to
construct visual secret sharing schemes (VSSs) for general access structures (GASs). We
propose herein a general and systematic approach to address these issues without sophisticated
codebook design. The approach can be used for binary secret images in non-computer-aided
decryption environments.

We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem
to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the
display quality of the recovered image is superior to that of previous studies.

More Related Content

Viewers also liked

In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksEcwaytech
 
Inteligent braking system
Inteligent braking systemInteligent braking system
Inteligent braking systemEcwaytech
 
Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015esidocvigan
 
Improved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power controlImproved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power controlEcwaytech
 
Transcript id edjansen
Transcript id edjansenTranscript id edjansen
Transcript id edjansenEdwin Jansen
 
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...Cummings
 
How To Read Their Thoughts
How To Read Their ThoughtsHow To Read Their Thoughts
How To Read Their ThoughtsGeorge Hutton
 
Movie poster research
Movie poster researchMovie poster research
Movie poster researchRoseBishay
 

Viewers also liked (10)

Usos tecnologico en nuestra vida cotidiana
Usos tecnologico en nuestra vida cotidianaUsos tecnologico en nuestra vida cotidiana
Usos tecnologico en nuestra vida cotidiana
 
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
 
Inteligent braking system
Inteligent braking systemInteligent braking system
Inteligent braking system
 
Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015
 
Improved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power controlImproved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power control
 
Transcript id edjansen
Transcript id edjansenTranscript id edjansen
Transcript id edjansen
 
my resume
my resumemy resume
my resume
 
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
 
How To Read Their Thoughts
How To Read Their ThoughtsHow To Read Their Thoughts
How To Read Their Thoughts
 
Movie poster research
Movie poster researchMovie poster research
Movie poster research
 

Similar to Image size invariant visual cryptography for general access structures subject to display quality constraints

Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Ecway Technologies
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoringEcwaytech
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple viewsEcwaytech
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...Ecwaytech
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsecwayprojects
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine systemEcwayt
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine systemecwayprojects
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine systemEcwaytech
 
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classificationEcwaytech
 
Java model-based analysis of wireless system architectures for real-time app...
Java  model-based analysis of wireless system architectures for real-time app...Java  model-based analysis of wireless system architectures for real-time app...
Java model-based analysis of wireless system architectures for real-time app...ecwayerode
 

Similar to Image size invariant visual cryptography for general access structures subject to display quality constraints (20)

Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
 
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
 
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
 
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
 
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
 
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classification
 
Java model-based analysis of wireless system architectures for real-time app...
Java  model-based analysis of wireless system architectures for real-time app...Java  model-based analysis of wireless system architectures for real-time app...
Java model-based analysis of wireless system architectures for real-time app...
 

Image size invariant visual cryptography for general access structures subject to display quality constraints

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS ABSTRACT: Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). We propose herein a general and systematic approach to address these issues without sophisticated codebook design. The approach can be used for binary secret images in non-computer-aided decryption environments. We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the display quality of the recovered image is superior to that of previous studies.