SlideShare a Scribd company logo
A Probabilistic Model of (t,n) Visual Cryptography
                     Scheme With Dynamic Group



ABSTRACT:

The visual cryptography (VC) is a secret sharing scheme where a secret image is
encoded into transparencies, and the stacking of any out of transparencies reveals
the secret image. The stacking of or fewer transparencies is unable to extract any
information about the secret. We discuss the additions and deletions of users in a
dynamic user group. To reduce the overhead of generating and distributing
transparencies in user changes, this paper proposes a VC scheme with unlimited
based on the probabilistic model. The proposed scheme allows to change
dynamically in order to include new transparencies without regenerating and
redistributing the original transparencies. Specifically, an extended VC scheme
based on basis matrices and a probabilistic model is proposed. An equation is
derived from the fundamental definitions of the VC scheme, and then the VC
scheme achieving maximal contrast can be designed by using the derived equation.
The maximal contrasts with to are explicitly solved in this paper.
ARCHITECTURE:


                       SENDER




     Login              Login
     Details




                        Binary           VCS          TRANSPARA
                        secret                          NCIES
                        image


                                                                          SECRET
                                                        RECEIVER
                                                                           DATA




EXISTING SYSTEM:



In visual cryptography, the decoding process is performed directly by the human
eyes; while in existing, the shared images need some processing to reconstruct the
secret image. The increasing numbers of possibilities to create, publishes, and
distribute images calls for novel protection methods, new sharing and access
control mechanisms for the information contained in the published images. Secure
image sharing techniques overcome the traditional cryptographic approach,
providing new solutions for the development of new and secure imaging
applications.

PROPOSED SYSTEM:



We have proposed a (t, n) VC scheme with flexible value of (n). From the practical
perspective, the proposed scheme accommodates the dynamic changes of users
without regenerating and redistributing the transparencies, which reduces
computation and communication resources required in managing the dynamically
changing user group. From the theoretical perspective, the scheme can be
considered as the probabilistic model of (t, n) VC with unlimited. Initially, the
proposed scheme is based on basis matrices, but the basis matrices with infinite
size cannot be constructed practically. Therefore, the probabilistic model is
adopted in the scheme.
MODULES:

   1. Login modules.
   2. Matrices (Black and White) Method.
   3. VC Scheme Method.
   4. Encoding Algorithm Method.



MODULE DESCRIPTION:

Login modules.



Login or logon (also called logging in or on and signing in or on) is the process by
which individual access to a computer system is controlled by identification of the
user using credentials provided by the user.

A user can log in to a system tovyfvs and can then log out or log off (perform a
logout / logoff) when the access is no longer needed.

Logging out may be done explicitly by the user performing some action, such as
entering the appropriate command, or clicking a website link labeled as such. It can
also be done implicitly, such as by powering the machine off, closing a web
browser window, leaving a website, or not refreshing a webpage within a defined
period.
Matrices (Black and White) Method.



The basis matrices of VC scheme were first introduced, a white-and-black secret
image or pixel is also described as a binary image or pixel. In the basis matrices, to
encode a binary secret image, each secret pixel white black will be turned into
blocks at the corresponding position of transparencies, respectively. Each block
consists of subpixels and each subpixel is opaque or transparent. Throughout this
paper, we use 0 to indicate a transparent subpixel and 1 to indicate an opaque
subpixel. If any two subpixels are stacked with matching positions, the
representation of a stacked pixel may be transparent, when the two corresponding
pixels are both transparent.




VC Scheme Method.



Proposed method is based on the basis matrices and the idea of probabilistic
model. For a (t, n) VC scheme, the “totally symmetric” form of (B0)and(B1) are
both constructed and described as H0 and H1, respectively.
VC scheme with flexible value of (n). From the practical perspective, the proposed
scheme accommodates the dynamic changes of users without regenerating and
redistributing the transparencies, which reduces computation and communication
resources required in managing the dynamically changing user group.



Encoding Algorithm Method.



For a given value of (t), the transparencies can be continuously generated with the
OptPrVC scheme. However, practical applications require the algorithm to
terminate within finite steps. To meet the requirement, a finite number is used to
specify the number of transparencies in the algorithm.




HARDWARE REQUIREMENTS

         Processor              : Any Processor above 500 MHz.
         Ram                    : 128Mb.
         Hard Disk              : 10 GB.
         Compact Disk           : 650 Mb.
Input device          : Standard Keyboard and Mouse.
          Output device         : VGA and High Resolution Monitor



SOFTWARE REQUIREMENTS

        Operating System        : Windows XP.

        Coding Language         : JAVA



REFERENCE:

Sian-Jheng Lin and Wei-Ho Chung, Member, IEEE, “A Probabilistic Model of
(t,n)   Visual   Cryptography     Scheme    With   Dynamic       Group”,   IEEE
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
VOL. 7, NO. 1, FEBRUARY 2012.

More Related Content

What's hot

New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals
 
Isc
IscIsc
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLA RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
cscpconf
 
A ramp code for fine grained access control
A ramp code for fine grained access controlA ramp code for fine grained access control
A ramp code for fine grained access control
csandit
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
AmAl C
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Modelling, Conception and Simulation of a Digital Watermarking System based o...
Modelling, Conception and Simulation of a Digital Watermarking System based o...Modelling, Conception and Simulation of a Digital Watermarking System based o...
Modelling, Conception and Simulation of a Digital Watermarking System based o...
sipij
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
IJCNCJournal
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
Papitha Velumani
 

What's hot (10)

New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Isc
IscIsc
Isc
 
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROLA RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL
 
A ramp code for fine grained access control
A ramp code for fine grained access controlA ramp code for fine grained access control
A ramp code for fine grained access control
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Modelling, Conception and Simulation of a Digital Watermarking System based o...
Modelling, Conception and Simulation of a Digital Watermarking System based o...Modelling, Conception and Simulation of a Digital Watermarking System based o...
Modelling, Conception and Simulation of a Digital Watermarking System based o...
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 

Viewers also liked

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
With Company
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
Yuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 

Viewers also liked (7)

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to A probabilistic model of visual cryptography Scheme With Dynamic Group

IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
cscpconf
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
main doc
main docmain doc
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
Lakshmi Velivala
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
Lakshmi Velivala
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
IJERA Editor
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IJCSEA Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IJCSEA Journal
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
IJERA Editor
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Vasanth Mca
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
IJERA Editor
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
ijcnac
 
Improved extended
Improved extendedImproved extended
Improved extended
mangaloresavita
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
IGEEKS TECHNOLOGIES
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
IJRAT
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
ijtsrd
 

Similar to A probabilistic model of visual cryptography Scheme With Dynamic Group (20)

IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
main doc
main docmain doc
main doc
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
 
Improved extended
Improved extendedImproved extended
Improved extended
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 

Recently uploaded

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 

Recently uploaded (20)

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 

A probabilistic model of visual cryptography Scheme With Dynamic Group

  • 1. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group ABSTRACT: The visual cryptography (VC) is a secret sharing scheme where a secret image is encoded into transparencies, and the stacking of any out of transparencies reveals the secret image. The stacking of or fewer transparencies is unable to extract any information about the secret. We discuss the additions and deletions of users in a dynamic user group. To reduce the overhead of generating and distributing transparencies in user changes, this paper proposes a VC scheme with unlimited based on the probabilistic model. The proposed scheme allows to change dynamically in order to include new transparencies without regenerating and redistributing the original transparencies. Specifically, an extended VC scheme based on basis matrices and a probabilistic model is proposed. An equation is derived from the fundamental definitions of the VC scheme, and then the VC scheme achieving maximal contrast can be designed by using the derived equation. The maximal contrasts with to are explicitly solved in this paper.
  • 2. ARCHITECTURE: SENDER Login Login Details Binary VCS TRANSPARA secret NCIES image SECRET RECEIVER DATA EXISTING SYSTEM: In visual cryptography, the decoding process is performed directly by the human eyes; while in existing, the shared images need some processing to reconstruct the
  • 3. secret image. The increasing numbers of possibilities to create, publishes, and distribute images calls for novel protection methods, new sharing and access control mechanisms for the information contained in the published images. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. PROPOSED SYSTEM: We have proposed a (t, n) VC scheme with flexible value of (n). From the practical perspective, the proposed scheme accommodates the dynamic changes of users without regenerating and redistributing the transparencies, which reduces computation and communication resources required in managing the dynamically changing user group. From the theoretical perspective, the scheme can be considered as the probabilistic model of (t, n) VC with unlimited. Initially, the proposed scheme is based on basis matrices, but the basis matrices with infinite size cannot be constructed practically. Therefore, the probabilistic model is adopted in the scheme.
  • 4. MODULES: 1. Login modules. 2. Matrices (Black and White) Method. 3. VC Scheme Method. 4. Encoding Algorithm Method. MODULE DESCRIPTION: Login modules. Login or logon (also called logging in or on and signing in or on) is the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user. A user can log in to a system tovyfvs and can then log out or log off (perform a logout / logoff) when the access is no longer needed. Logging out may be done explicitly by the user performing some action, such as entering the appropriate command, or clicking a website link labeled as such. It can also be done implicitly, such as by powering the machine off, closing a web browser window, leaving a website, or not refreshing a webpage within a defined period.
  • 5. Matrices (Black and White) Method. The basis matrices of VC scheme were first introduced, a white-and-black secret image or pixel is also described as a binary image or pixel. In the basis matrices, to encode a binary secret image, each secret pixel white black will be turned into blocks at the corresponding position of transparencies, respectively. Each block consists of subpixels and each subpixel is opaque or transparent. Throughout this paper, we use 0 to indicate a transparent subpixel and 1 to indicate an opaque subpixel. If any two subpixels are stacked with matching positions, the representation of a stacked pixel may be transparent, when the two corresponding pixels are both transparent. VC Scheme Method. Proposed method is based on the basis matrices and the idea of probabilistic model. For a (t, n) VC scheme, the “totally symmetric” form of (B0)and(B1) are both constructed and described as H0 and H1, respectively.
  • 6. VC scheme with flexible value of (n). From the practical perspective, the proposed scheme accommodates the dynamic changes of users without regenerating and redistributing the transparencies, which reduces computation and communication resources required in managing the dynamically changing user group. Encoding Algorithm Method. For a given value of (t), the transparencies can be continuously generated with the OptPrVC scheme. However, practical applications require the algorithm to terminate within finite steps. To meet the requirement, a finite number is used to specify the number of transparencies in the algorithm. HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 GB. Compact Disk : 650 Mb.
  • 7. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor SOFTWARE REQUIREMENTS Operating System : Windows XP. Coding Language : JAVA REFERENCE: Sian-Jheng Lin and Wei-Ho Chung, Member, IEEE, “A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.