SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 182
A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY
Prashant B Swadas1
, Samip Patel2
,Dhruti Darji3
1
Professor, 3
Student, Computer department Birla vishwakarma Mahavidhylaya, Vallabh vidhyanagar,India
2
Professor, IT department Birla vishwakarma Mahavidhylaya, Vallabh vidhyanagar,India
Abstract
The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To
address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities.
Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used
to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret
without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images
distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent
various cryptography technique and research work done in this field.
Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Managing secret has been aproblem of importance from the
timehuman beings started to live together. Important things
and messages have been always there to be sealed and
confined from promising misuse or loss. Military and defense
secrets have been the subject matter for secret sharing in the
past as well as in the modern days. Secretsharing is a very hot
area of research in Computer Science in the recent past.
Digital media has replaced almost all forms ofcommunication
and information preservation and processing. Security in
digital media has been a matter of serious concern. Thishas
resulted in the development of encryption and cryptography.
Secret Sharing is an important tool in Security and
Cryptography.
1.1 Basic Model
Visual cryptography scheme was developed by Naor and
Shamir [1] in 1994. In this scheme two transparent images
called shares are developed. One of the shares is made of
random pixels in which black and white pixels are of equal
number. Second share is made according to first share. When
these two shares are superimposed, information is revealed.
Visual cryptography scheme eliminates complex computation
problem in decryption process, and the secret images can be
restored by stacking operation. This property makes visual
cryptography especially useful for the low computation load
requirement. The process of visual cryptography is shown in
below figure 1.
Fig 1 Flow of visual cryptography
As shown in above figure,we tack secret image.Then make
encryption process which is nothing but a share of
images.Then this share images mail or fax and at the receiver
side decryption process is made using just superimposing
images.which can be visualy visible by human vision system.
A (2, 2) visual cryptography scheme can be used to discuss
fundamental visual cryptography.
IJRET: International Journal of Research in Engineering and Technology
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @
Senders create two layers. Basically pixel expansion may be 2
4, 8 etc. we have taken pixel expansion 2.
pixel of our original image is replaced by 2 p
image.If the pixel is white the sender takes any row from the
last two rows of Figure 2 randomly and if the pixel is black,
the sender takes any row from the first two rows of Figure
randomly. By overlapping the two shares as shown in the
row of figure 2 randomly.
Fig. 2- Construction of (2, 2) VC Scheme [3]
For example, in below figure3 for encryption bvm.bmp
taken as input secret image Instead of sending secret image we
send two encrypted images and for decryption we just
superimpose two images, we will get result. All thought we
will not get clear image but we can visually visualize the
content.
Fig 3 two out of two VC scheme
The (2,2) visual cryptography extended to (k,n) and (k,k)
visual cryptography. In (k, n) visualcryptography scheme
allows dividing a secret into K number of shares. Then the
secret can be revealed from any N number of Shares among
K.and in (k, k) visual cryptography scheme secret
into K number of shares and for reconstruction of the secret,
all K shares are necessary. This scheme is not so popular
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319
__________________________________________________________________________________________
2014, Available @ http://www.ijret.org
ixel expansion may be 2,
ken pixel expansion 2. That means one
pixel of our original image is replaced by 2 pixels in share
the pixel is white the sender takes any row from the
and if the pixel is black,
the first two rows of Figure 2
the two shares as shown in the last
Construction of (2, 2) VC Scheme [3]
For example, in below figure3 for encryption bvm.bmp as
Instead of sending secret image we
send two encrypted images and for decryption we just
superimpose two images, we will get result. All thought we
will not get clear image but we can visually visualize the
out of two VC scheme
(2,2) visual cryptography extended to (k,n) and (k,k)
k, n) visualcryptography scheme
allows dividing a secret into K number of shares. Then the
secret can be revealed from any N number of Shares among
scheme secret is divided
into K number of shares and for reconstruction of the secret,
all K shares are necessary. This scheme is not so popular
because managing k number of shares is difficult task and it
also increases time complex
Visual cryptography is a method for fulfilling secret sharing
activities in the environments with insufficient computing
power. Secure image sharing techniques overcome the
traditional cryptographic approach, providing new solution
for the development of new and secure imaging applications.
2. VISUAL CRYPTOGRAPHY TECHNIQUES:
B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu
presentedmultiple secret
technique. Here they shared
share image .They made two share
are binary image which is random .T
first secret can be revilethe information as shown in basic
model that is superimpose two share image and for the second
share can be obtained by rotating first share i.e. A
anti-clockwise direction.
90◦.Again new researcher Wu and Chang refined the idea
programming share to be ci
rotating angle can be removed.
Kafri and Keren [3]presented a
cryptography technique. In
original image pixel size .
size and original image size is same so it
of pixel expansion. In this method random grid R is
a two dimensional array of pixels. Each pixel is either
transparent (white) or opaque (black) by a coin
The numbers of transparent pixels and opaque pixels are
probabilistically same and
grid is 50% [8]:
Young-Chang Hou and Zen
cryptography technique i
In this technique reconstruction of secret image is pr
and the share images have
size.Here, output of our secret
‘OR’ing operation applied
images. As the technique name is probabilistic
cryptography, they give no absolute guarantee on the correct
reconstruction of the original
reconstruction pixel is wrong so this is different from
traditional visual cryptography i
secret pixel is guaranteed.
a white (black) pixel can be, in some cases, replaced in the
reconstructed image by a set of
of whiteness (blackness). Since in probabili
secret pixel is correctly reconstructed with some probability,
the quality of the reconstructed images depends on how big is
the probability of correctly reconstructing the secret pixels.
Region incrementing visual cryptography is used to
multiple secrecy levels in a single image. In n level region
eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
183
because managing k number of shares is difficult task and it
also increases time complexity to compute shares.
a method for fulfilling secret sharing
activities in the environments with insufficient computing
power. Secure image sharing techniques overcome the
traditional cryptographic approach, providing new solutions
for the development of new and secure imaging applications.
VISUAL CRYPTOGRAPHY TECHNIQUES:
. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu [2]
secret sharing visual cryptography
they shared twobinary secretimages in a two
two share names A and B.Both share
e which is random .They make share such that
revilethe information as shown in basic
that is superimpose two share image and for the second
share can be obtained by rotating first share i.e. A share by
direction.They take the rotating angle
.Again new researcher Wu and Chang refined the idea by
share to be circles so that the restriction to the
rotating angle can be removed.
presented a random grid based visual
technique. In this method size of pixel is same as
pixel size .that means relieved secret image
d original image size is same so it reduces the problem
this method random grid R is defined as
array of pixels. Each pixel is either
transparent (white) or opaque (black) by a coin-flip procedure.
ansparent pixels and opaque pixels are
same and the average opacity of a random
Chang Hou and Zen-Yu Quan[4] present a new visual
e. progressive visual cryptography.
this technique reconstruction of secret image is probabilistic
and the share images have the same size as the secret image
of our secret image pixel is constructed using
appliedn the corresponding pixel in share
the technique name is probabilistic visual
give no absolute guarantee on the correct
reconstruction of the original pixel. It might be possible
reconstruction pixel is wrong so this is different from
traditional visual cryptography in which ‘approximation’ of
Here the approximation means that
a white (black) pixel can be, in some cases, replaced in the
reconstructed image by a set of sub pixels having a given set
of whiteness (blackness). Since in probabilistic models the
secret pixel is correctly reconstructed with some probability,
the quality of the reconstructed images depends on how big is
the probability of correctly reconstructing the secret pixels.
Region incrementing visual cryptography is used to hide
multiple secrecy levels in a single image. In n level region
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 184
incrementing visual cryptography scheme, image is divided in
n regions. Each region consists of one level information [5].
For implementing visual cryptography in n levels we need to
encode (n+1) shares in such a way so that any single share is
not able to show the information and by combining any two
shares, first level information would be visible. Similarly by
super imposing any three shares, information upto second
level could be seen. In similar way, for revealing whole
information all the (n+1) shares are superimposed. These n
levels are created according to user specification. In proposed
scheme, user does not need to address the area ofdifferent
levels manually and levels are created automatically. User
needs only to usea particular level information with a
particular size of text.
Ran-Zan Wang and Shuo-Fang Hsu [6]proposed a new
technique which is called tagged visual cryptography.Tagged
visual cryptography (TVC) is an innovative type of visual
cryptography (VC) in which additional tags is obscured into
each generated share. By folding up each single share, the
related tagged pattern is visually discovered. Such
supplementary tag patterns significantlysupplement extra
abilities of VC, such as improved message carried in a single
share, user-friendly interface to manage the shares. However,
reported (k, n) TVC proposed by Wang and Hsu still suffers
from the defects such as pixel expansion.
Zhongmin Wang, Gonzalo R. Arce, Giovanni Di
Crescenzo[7]presented a halftone visual cryptography. In this
technique they used error diffusion method. They take one
gray scale image and convert it into binary image by applying
halftone techniuue.In this binary shareimages, they put secret
image pixel in to each share image by applying void and
cluster algorithm. The reconstructed image is obtained by
superimposing two share images. It is a very good method but
still there is a tradeoff between pixel expansion and contrast
loss of original image.
3. COMPARISONS OF DIFFERENT VISUAL CRYPTOGRAPHY TECHNIQUE
Author Technique used Number
of secret
image
Pixel
expansion
Merits Demerits
Naor and Shamir Traditional VC 1 1:2 Provide security for
binary image
Not generate meaningful
share image
M. Nakajima and
Yamaguchi
Extended VC 1 1:2 Generate meaningful
share
Contrast loss occur
Kafri and Keren Random grid VC 1 1:1 No pixel expansion lower visual quality
Wu and Chen Multiple secret
sharing VC
2 1:4 Image can encrypt two
secret imagesbetween
two shares. Rotating
angleis 90◦
Size of theshares is 4 times
the size of the main secret
image.
Young-Chang Hou
and Zen-Yu Quan
Progressive VC 1 1:1 No pixel expansion No absolute guarantee on the
correct reconstruction of the
original pixel
Wu and Chang Multiple secret
sharing VC
2 1:4 Rotating angle is
invariant.
Pixel expansion is more
Zhongmin Wang,
Gonzalo R. Arce
Halftone VC 1 1:4 Provide meaning full
share images
Tradeoff between pixel
expansion and contras of
original image
CONCLUSIONS
In this paper introduction of visual cryptography is provided.
This paper does analysis of different visual cryptography
scheme and a comparative study has been done. This
technique encrypts a secret image into shares such that
stacking a sufficient number of shares reveal secret
image.Every existing method having own advantages even
though it has set of limitation to achieve the good encryption
method via Visual cryptography. In order to hide the secret
information we go for expansion and increasing of the number
of shares, but this affects the resolution. Hence research in
visual cryptography (VC) is going on to achieve better visual
quality.
ACKNOWLEDGEMENTS
We would like to thank reference authors and also like to
thank the anonymous reviewers,whose comments and
suggestions have helped them to improve the quality of the
originalmanuscript.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 185
REFERENCES
[1].MoniNaor and Adi Shamir, “Visual Cryptography”,
advances in cryptology– Euro crypt, pp 1-12, 1995.
[2].J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P.
Chu. “Visualsecret sharing for multiple secrets” Pattern
Recognition, 41:3572{3581,2008
[3]. O. Kafri and E. Keren. “Image encryption by multiple
random grids”Optics Letters, 12(6):377{379, 1987.
[4].Young-Chang Hou and Zen-Yu Quan“Progressive Visual
Cryptography with Unexpanded Shares” IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR
VIDEO TECHNOLOGY, VOL. 21, NO. 11, NOVEMBER
2011
[5].Wang, R.Z.[Ran-Zan], “RegionIncrementing Visual
Cryptography”,SPLetters(16), No. 8, August 2009,pp. 659-
662.
[6]. Ran-Zan Wang and Shuo-Fang Hsu,” Tagged Visual
Cryptography:, IEEE SIGNAL PROCESSING LETTERS,
VOL. 18, NO. 11, NOVEMBER 2011 627
[7]. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, “Halftone
visual cryptography via error diffusion,” IEEE Trans. Inf.
Forensics Security, vol. 4 pp 383–396, Sep.
[8]. S. J. Shyu, “Image encryption by random grids,” Patt.
Recognitions, vol. 40, no. 3, pp. 1014– 1031, 2007
[9].Xiao-qing Tan, “Two Kinds of Ideal Contrast Visual
Cryptography Schemes”, International Conference onSignal
Processing Systems, pp. 450-453, 2009.
[10]. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin,
“Sharing A Secret Two-Tone Image in Two Gray-
LevelImages”, Proceedings of the 11th International
Conference on Parallel and Distributed Systems
(ICPADS'05),2005.

More Related Content

What's hot

Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYcscpconf
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes AmAl C
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyAM Publications
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 

What's hot (19)

Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 

Viewers also liked

Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...eSAT Publishing House
 
Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...eSAT Publishing House
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach ineSAT Publishing House
 
Cross language information retrieval in indian
Cross language information retrieval in indianCross language information retrieval in indian
Cross language information retrieval in indianeSAT Publishing House
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentseSAT Publishing House
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureeSAT Publishing House
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...eSAT Publishing House
 
Picosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedPicosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedeSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...Lab view based self tuning fuzzy logic controller for sterilizing equipments ...
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...eSAT Publishing House
 
Conceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inletConceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inleteSAT Publishing House
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...eSAT Publishing House
 
Comparative study of slot loaded rectangular and triangular microstrip array ...
Comparative study of slot loaded rectangular and triangular microstrip array ...Comparative study of slot loaded rectangular and triangular microstrip array ...
Comparative study of slot loaded rectangular and triangular microstrip array ...eSAT Publishing House
 
Investigation into machining characteristics of trialumane
Investigation into machining characteristics of trialumaneInvestigation into machining characteristics of trialumane
Investigation into machining characteristics of trialumaneeSAT Publishing House
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionseSAT Publishing House
 
Design of passengers vehicle body on fire accidents
Design of passengers vehicle body on fire accidentsDesign of passengers vehicle body on fire accidents
Design of passengers vehicle body on fire accidentseSAT Publishing House
 
Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...eSAT Publishing House
 
Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniqueseSAT Publishing House
 
Numerical study of behavior of square footing on geogrid reinforced flyash be...
Numerical study of behavior of square footing on geogrid reinforced flyash be...Numerical study of behavior of square footing on geogrid reinforced flyash be...
Numerical study of behavior of square footing on geogrid reinforced flyash be...eSAT Publishing House
 

Viewers also liked (20)

Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...Nanoparticle based charge trapping memory device applying mos technology a co...
Nanoparticle based charge trapping memory device applying mos technology a co...
 
Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...Umts femto access point for higher data rate and better quality of service to...
Umts femto access point for higher data rate and better quality of service to...
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach in
 
Cross language information retrieval in indian
Cross language information retrieval in indianCross language information retrieval in indian
Cross language information retrieval in indian
 
Importance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documentsImportance of post processing for improved binarization of text documents
Importance of post processing for improved binarization of text documents
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
 
An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...An extended database reverse engineering – a key for database forensic invest...
An extended database reverse engineering – a key for database forensic invest...
 
Picosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedPicosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascaded
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...Lab view based self tuning fuzzy logic controller for sterilizing equipments ...
Lab view based self tuning fuzzy logic controller for sterilizing equipments ...
 
Conceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inletConceptual design of injection mould tool for inlet
Conceptual design of injection mould tool for inlet
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
 
Comparative study of slot loaded rectangular and triangular microstrip array ...
Comparative study of slot loaded rectangular and triangular microstrip array ...Comparative study of slot loaded rectangular and triangular microstrip array ...
Comparative study of slot loaded rectangular and triangular microstrip array ...
 
Investigation into machining characteristics of trialumane
Investigation into machining characteristics of trialumaneInvestigation into machining characteristics of trialumane
Investigation into machining characteristics of trialumane
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directions
 
Design of passengers vehicle body on fire accidents
Design of passengers vehicle body on fire accidentsDesign of passengers vehicle body on fire accidents
Design of passengers vehicle body on fire accidents
 
Kinematic model of a car
Kinematic model of a carKinematic model of a car
Kinematic model of a car
 
Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...
 
Building extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniquesBuilding extraction from remote sensing imageries by data fusion techniques
Building extraction from remote sensing imageries by data fusion techniques
 
Numerical study of behavior of square footing on geogrid reinforced flyash be...
Numerical study of behavior of square footing on geogrid reinforced flyash be...Numerical study of behavior of square footing on geogrid reinforced flyash be...
Numerical study of behavior of square footing on geogrid reinforced flyash be...
 

Similar to A comparatively study on visual cryptography

Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107IJRAT
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateIDES Editor
 

Similar to A comparatively study on visual cryptography (20)

Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
J017335863
J017335863J017335863
J017335863
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric Template
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

A comparatively study on visual cryptography

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 182 A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY Prashant B Swadas1 , Samip Patel2 ,Dhruti Darji3 1 Professor, 3 Student, Computer department Birla vishwakarma Mahavidhylaya, Vallabh vidhyanagar,India 2 Professor, IT department Birla vishwakarma Mahavidhylaya, Vallabh vidhyanagar,India Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Managing secret has been aproblem of importance from the timehuman beings started to live together. Important things and messages have been always there to be sealed and confined from promising misuse or loss. Military and defense secrets have been the subject matter for secret sharing in the past as well as in the modern days. Secretsharing is a very hot area of research in Computer Science in the recent past. Digital media has replaced almost all forms ofcommunication and information preservation and processing. Security in digital media has been a matter of serious concern. Thishas resulted in the development of encryption and cryptography. Secret Sharing is an important tool in Security and Cryptography. 1.1 Basic Model Visual cryptography scheme was developed by Naor and Shamir [1] in 1994. In this scheme two transparent images called shares are developed. One of the shares is made of random pixels in which black and white pixels are of equal number. Second share is made according to first share. When these two shares are superimposed, information is revealed. Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. This property makes visual cryptography especially useful for the low computation load requirement. The process of visual cryptography is shown in below figure 1. Fig 1 Flow of visual cryptography As shown in above figure,we tack secret image.Then make encryption process which is nothing but a share of images.Then this share images mail or fax and at the receiver side decryption process is made using just superimposing images.which can be visualy visible by human vision system. A (2, 2) visual cryptography scheme can be used to discuss fundamental visual cryptography.
  • 2. IJRET: International Journal of Research in Engineering and Technology __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ Senders create two layers. Basically pixel expansion may be 2 4, 8 etc. we have taken pixel expansion 2. pixel of our original image is replaced by 2 p image.If the pixel is white the sender takes any row from the last two rows of Figure 2 randomly and if the pixel is black, the sender takes any row from the first two rows of Figure randomly. By overlapping the two shares as shown in the row of figure 2 randomly. Fig. 2- Construction of (2, 2) VC Scheme [3] For example, in below figure3 for encryption bvm.bmp taken as input secret image Instead of sending secret image we send two encrypted images and for decryption we just superimpose two images, we will get result. All thought we will not get clear image but we can visually visualize the content. Fig 3 two out of two VC scheme The (2,2) visual cryptography extended to (k,n) and (k,k) visual cryptography. In (k, n) visualcryptography scheme allows dividing a secret into K number of shares. Then the secret can be revealed from any N number of Shares among K.and in (k, k) visual cryptography scheme secret into K number of shares and for reconstruction of the secret, all K shares are necessary. This scheme is not so popular IJRET: International Journal of Research in Engineering and Technology eISSN: 2319 __________________________________________________________________________________________ 2014, Available @ http://www.ijret.org ixel expansion may be 2, ken pixel expansion 2. That means one pixel of our original image is replaced by 2 pixels in share the pixel is white the sender takes any row from the and if the pixel is black, the first two rows of Figure 2 the two shares as shown in the last Construction of (2, 2) VC Scheme [3] For example, in below figure3 for encryption bvm.bmp as Instead of sending secret image we send two encrypted images and for decryption we just superimpose two images, we will get result. All thought we will not get clear image but we can visually visualize the out of two VC scheme (2,2) visual cryptography extended to (k,n) and (k,k) k, n) visualcryptography scheme allows dividing a secret into K number of shares. Then the secret can be revealed from any N number of Shares among scheme secret is divided into K number of shares and for reconstruction of the secret, all K shares are necessary. This scheme is not so popular because managing k number of shares is difficult task and it also increases time complex Visual cryptography is a method for fulfilling secret sharing activities in the environments with insufficient computing power. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solution for the development of new and secure imaging applications. 2. VISUAL CRYPTOGRAPHY TECHNIQUES: B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu presentedmultiple secret technique. Here they shared share image .They made two share are binary image which is random .T first secret can be revilethe information as shown in basic model that is superimpose two share image and for the second share can be obtained by rotating first share i.e. A anti-clockwise direction. 90◦.Again new researcher Wu and Chang refined the idea programming share to be ci rotating angle can be removed. Kafri and Keren [3]presented a cryptography technique. In original image pixel size . size and original image size is same so it of pixel expansion. In this method random grid R is a two dimensional array of pixels. Each pixel is either transparent (white) or opaque (black) by a coin The numbers of transparent pixels and opaque pixels are probabilistically same and grid is 50% [8]: Young-Chang Hou and Zen cryptography technique i In this technique reconstruction of secret image is pr and the share images have size.Here, output of our secret ‘OR’ing operation applied images. As the technique name is probabilistic cryptography, they give no absolute guarantee on the correct reconstruction of the original reconstruction pixel is wrong so this is different from traditional visual cryptography i secret pixel is guaranteed. a white (black) pixel can be, in some cases, replaced in the reconstructed image by a set of of whiteness (blackness). Since in probabili secret pixel is correctly reconstructed with some probability, the quality of the reconstructed images depends on how big is the probability of correctly reconstructing the secret pixels. Region incrementing visual cryptography is used to multiple secrecy levels in a single image. In n level region eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ 183 because managing k number of shares is difficult task and it also increases time complexity to compute shares. a method for fulfilling secret sharing activities in the environments with insufficient computing power. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. VISUAL CRYPTOGRAPHY TECHNIQUES: . Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu [2] secret sharing visual cryptography they shared twobinary secretimages in a two two share names A and B.Both share e which is random .They make share such that revilethe information as shown in basic that is superimpose two share image and for the second share can be obtained by rotating first share i.e. A share by direction.They take the rotating angle .Again new researcher Wu and Chang refined the idea by share to be circles so that the restriction to the rotating angle can be removed. presented a random grid based visual technique. In this method size of pixel is same as pixel size .that means relieved secret image d original image size is same so it reduces the problem this method random grid R is defined as array of pixels. Each pixel is either transparent (white) or opaque (black) by a coin-flip procedure. ansparent pixels and opaque pixels are same and the average opacity of a random Chang Hou and Zen-Yu Quan[4] present a new visual e. progressive visual cryptography. this technique reconstruction of secret image is probabilistic and the share images have the same size as the secret image of our secret image pixel is constructed using appliedn the corresponding pixel in share the technique name is probabilistic visual give no absolute guarantee on the correct reconstruction of the original pixel. It might be possible reconstruction pixel is wrong so this is different from traditional visual cryptography in which ‘approximation’ of Here the approximation means that a white (black) pixel can be, in some cases, replaced in the reconstructed image by a set of sub pixels having a given set of whiteness (blackness). Since in probabilistic models the secret pixel is correctly reconstructed with some probability, the quality of the reconstructed images depends on how big is the probability of correctly reconstructing the secret pixels. Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In n level region
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 184 incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information [5]. For implementing visual cryptography in n levels we need to encode (n+1) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by super imposing any three shares, information upto second level could be seen. In similar way, for revealing whole information all the (n+1) shares are superimposed. These n levels are created according to user specification. In proposed scheme, user does not need to address the area ofdifferent levels manually and levels are created automatically. User needs only to usea particular level information with a particular size of text. Ran-Zan Wang and Shuo-Fang Hsu [6]proposed a new technique which is called tagged visual cryptography.Tagged visual cryptography (TVC) is an innovative type of visual cryptography (VC) in which additional tags is obscured into each generated share. By folding up each single share, the related tagged pattern is visually discovered. Such supplementary tag patterns significantlysupplement extra abilities of VC, such as improved message carried in a single share, user-friendly interface to manage the shares. However, reported (k, n) TVC proposed by Wang and Hsu still suffers from the defects such as pixel expansion. Zhongmin Wang, Gonzalo R. Arce, Giovanni Di Crescenzo[7]presented a halftone visual cryptography. In this technique they used error diffusion method. They take one gray scale image and convert it into binary image by applying halftone techniuue.In this binary shareimages, they put secret image pixel in to each share image by applying void and cluster algorithm. The reconstructed image is obtained by superimposing two share images. It is a very good method but still there is a tradeoff between pixel expansion and contrast loss of original image. 3. COMPARISONS OF DIFFERENT VISUAL CRYPTOGRAPHY TECHNIQUE Author Technique used Number of secret image Pixel expansion Merits Demerits Naor and Shamir Traditional VC 1 1:2 Provide security for binary image Not generate meaningful share image M. Nakajima and Yamaguchi Extended VC 1 1:2 Generate meaningful share Contrast loss occur Kafri and Keren Random grid VC 1 1:1 No pixel expansion lower visual quality Wu and Chen Multiple secret sharing VC 2 1:4 Image can encrypt two secret imagesbetween two shares. Rotating angleis 90◦ Size of theshares is 4 times the size of the main secret image. Young-Chang Hou and Zen-Yu Quan Progressive VC 1 1:1 No pixel expansion No absolute guarantee on the correct reconstruction of the original pixel Wu and Chang Multiple secret sharing VC 2 1:4 Rotating angle is invariant. Pixel expansion is more Zhongmin Wang, Gonzalo R. Arce Halftone VC 1 1:4 Provide meaning full share images Tradeoff between pixel expansion and contras of original image CONCLUSIONS In this paper introduction of visual cryptography is provided. This paper does analysis of different visual cryptography scheme and a comparative study has been done. This technique encrypts a secret image into shares such that stacking a sufficient number of shares reveal secret image.Every existing method having own advantages even though it has set of limitation to achieve the good encryption method via Visual cryptography. In order to hide the secret information we go for expansion and increasing of the number of shares, but this affects the resolution. Hence research in visual cryptography (VC) is going on to achieve better visual quality. ACKNOWLEDGEMENTS We would like to thank reference authors and also like to thank the anonymous reviewers,whose comments and suggestions have helped them to improve the quality of the originalmanuscript.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 01 | Jan-2014, Available @ http://www.ijret.org 185 REFERENCES [1].MoniNaor and Adi Shamir, “Visual Cryptography”, advances in cryptology– Euro crypt, pp 1-12, 1995. [2].J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. “Visualsecret sharing for multiple secrets” Pattern Recognition, 41:3572{3581,2008 [3]. O. Kafri and E. Keren. “Image encryption by multiple random grids”Optics Letters, 12(6):377{379, 1987. [4].Young-Chang Hou and Zen-Yu Quan“Progressive Visual Cryptography with Unexpanded Shares” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11, NOVEMBER 2011 [5].Wang, R.Z.[Ran-Zan], “RegionIncrementing Visual Cryptography”,SPLetters(16), No. 8, August 2009,pp. 659- 662. [6]. Ran-Zan Wang and Shuo-Fang Hsu,” Tagged Visual Cryptography:, IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO. 11, NOVEMBER 2011 627 [7]. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4 pp 383–396, Sep. [8]. S. J. Shyu, “Image encryption by random grids,” Patt. Recognitions, vol. 40, no. 3, pp. 1014– 1031, 2007 [9].Xiao-qing Tan, “Two Kinds of Ideal Contrast Visual Cryptography Schemes”, International Conference onSignal Processing Systems, pp. 450-453, 2009. [10]. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin, “Sharing A Secret Two-Tone Image in Two Gray- LevelImages”, Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05),2005.