IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Visual Cryptography is a special encryption technique that encrypts the secret image into n
number of shares to hide information in images in such a way that it can be decrypted by the
human visual system. It is imperceptible to reveal the secret information unless a certain
number of shares (k) or more are superimposed. Simple visual cryptography is very insecure.
Variable length key based visual cryptography for color image uses a variable length Symmetric
Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt
the image and division of the encrypted image is done using Random Number. Unless the secret
key, the original image will not be decrypted. Here secret key ensures the security of image.
This paper describes the overall process of above scheme. Encryption process encrypts the
Original Image using variable length Symmetric Key, gives encrypted image. Share generation
process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
Visual Cryptography is quite new but very innovative idea. This presentation will introduce about it's concept and technique. In the last it has some references that will help the user.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Visual Cryptography is a special encryption technique that encrypts the secret image into n
number of shares to hide information in images in such a way that it can be decrypted by the
human visual system. It is imperceptible to reveal the secret information unless a certain
number of shares (k) or more are superimposed. Simple visual cryptography is very insecure.
Variable length key based visual cryptography for color image uses a variable length Symmetric
Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt
the image and division of the encrypted image is done using Random Number. Unless the secret
key, the original image will not be decrypted. Here secret key ensures the security of image.
This paper describes the overall process of above scheme. Encryption process encrypts the
Original Image using variable length Symmetric Key, gives encrypted image. Share generation
process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
Visual Cryptography is quite new but very innovative idea. This presentation will introduce about it's concept and technique. In the last it has some references that will help the user.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Natural Image Based Visual Secret Sharing Schemetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...IJERA Editor
A robust watermark scheme for copyright protection is proposed in the present paper. The present method selects the pixel locations to insert the watermark by checking luminance [1] values of blocks. The watermark is embedded in the selected pixel blocks by using local area pixel value difference method. The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial domain and also in pixel value difference method. Further the watermark extraction does not require the original image as in the case of many digital watermarking methods. The experimental results indicate the high image quality and robustness against various attacks when compared to several approaches.
Secured data hiding by using extended visual cryptographyeSAT Journals
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
"Randomized Visual Cryptography scheme for color images”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in banking operations in the “either or survivor” mode where n is the number of generated shares, from which n-1 is the number of account holders in an account and one share should be kept to the bank authority. In this technique one account holder should stack his/her share with the share of the bank authority and the secret image for user authentication will be revealed. In this technique two consecutive pixels are taken as the one time input for the share generation process. This technique generates shares with less space overhead compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography.
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Protecting the data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. image cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. Communication is the process of transmitting information from source to destination. The exchanging information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information visual cryptography techniques are used. This paper proposes a novel method for key generation by using nearest prime pixels. Further 2’s complement and logical operations are performed to generate decrypted image. The final decrypted image is generated by representing pixels in matrix form and data is retrieved in column wise.
Natural Image Based Visual Secret Sharing Schemetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A DWT based Dual Image Watermarking Technique for Authenticity and Watermark ...sipij
In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding only one, to authenticate the source image and protect the watermark simultaneously. Here the DWT coefficients of the primary watermark (logo) are modified using another smaller secondary binary image (sign) and the midfrequency coefficients of the cover/host image. Since the watermark has some features of host image embedded in it, the security is increased two-fold and it also protects the watermark from any misuse or copy attack. For this purpose a new pseudorandom generator based on the mathematical constant π has been developed and used successfully in various stages of the algorithm. We have also proposed a new approach of applying pseudo-randomness in selecting the watermark pixel values for embedding in the cover image. In all the existing techniques the randomness is incorporated in selecting the location to embed the watermark. This makes the embedding process more unpredictable. The cover image which is watermarked with the signed-logo is subjected to various attacks like cropping, rotation, JPEG compression, scaling and noising. From the results it has been found that it is very robust and has good invisibility as well.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Natural Image Based Visual Secret Sharing Schemetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A Novel Method for Image Watermarking Using Luminance Based Block Selection a...IJERA Editor
A robust watermark scheme for copyright protection is proposed in the present paper. The present method selects the pixel locations to insert the watermark by checking luminance [1] values of blocks. The watermark is embedded in the selected pixel blocks by using local area pixel value difference method. The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial domain and also in pixel value difference method. Further the watermark extraction does not require the original image as in the case of many digital watermarking methods. The experimental results indicate the high image quality and robustness against various attacks when compared to several approaches.
Secured data hiding by using extended visual cryptographyeSAT Journals
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
"Randomized Visual Cryptography scheme for color images”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in banking operations in the “either or survivor” mode where n is the number of generated shares, from which n-1 is the number of account holders in an account and one share should be kept to the bank authority. In this technique one account holder should stack his/her share with the share of the bank authority and the secret image for user authentication will be revealed. In this technique two consecutive pixels are taken as the one time input for the share generation process. This technique generates shares with less space overhead compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography.
Digital image copyright protection based on visual cryptographyinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Protecting the data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. image cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. Communication is the process of transmitting information from source to destination. The exchanging information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information visual cryptography techniques are used. This paper proposes a novel method for key generation by using nearest prime pixels. Further 2’s complement and logical operations are performed to generate decrypted image. The final decrypted image is generated by representing pixels in matrix form and data is retrieved in column wise.
Natural Image Based Visual Secret Sharing Schemetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
How data can be shared from one part of the world to the other in near real time came with
the arrival of internet. Along with this they have introduced new challenges like maintaining the
confidentiality of transmitting the data. This gave a boost to the research area related to cryptography.
Firstly, Encryption of images with the accepted encryption algorithms had significant downside as key
management was complicated and limited. Secondly, introduction to new area for encrypting images
was splitting the image at its pixel level in to multiple shares. But the major drawback of this approach
was that the recovered image had a poor quality. To overcome these mentioned drawbacks we have
proposed a new approach which does not attempt to use any type of keys for encryption.
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. To provide a better secured system that ensures high data capacity and information security, a multilevel security system can be thought for which can be built by incorporating the principles of steganography and visual cryptography.
Steganography is the technique of hiding the fact that communication is taking place,by hiding data in other data. Many different carrier file formats such as image, audio, video, DNA etc can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. In this paper different steganographic techniques are described.
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To
encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each
channel is encrypted using a technique called double random matrix key encoding then three new coding
image matrices are constructed. To obtain the reconstructed image that is the same as the original image
in the receipted side; simple extracted and decryption operations can be maintained. The results shown
that the proposed technique is powerful for color image encryption and decryption and a MATLAB and
simulations were used to get the results.
The proposed technique has high security features because each color component is separately treated
using its own double random matrix key which is generated randomly and make the process of hacking the
three keys very difficult.
Similar to Copyright protection scheme based on visual Cryptography: A Review (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Copyright protection scheme based on visual Cryptography: A Review
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 79-85
www.iosrjournals.org
DOI: 10.9790/0661-17327985 www.iosrjournals.org 79 | Page
Copyright protection scheme based on visual Cryptography: A
Review
Smriti sahu1
, Namita Tiwari2
1
(Computer Science, Maulana Azad National Institute of Technology, India)
2
(Ass. Professor, Department of Computer Science, Maulana Azad National Institute of Technology, India)
Abstract: Management of digital images via internet and e-business has witnessed tremendous growth in last
decades, resulting in vulnerability to copyright infringement, Manipulation and attacks. This paper reviews
some of the current developments in the copyright protection techniques for digital images based on visual
cryptography. The approaches reviewed in the paper are lined based on the false positive rate. This paper
discusses the main approaches for copyright protection of digital images. This paper also discusses how those
approaches can achieve the required security standard. The methods are measured against relevant
performance metrics and set according to their respective environments and digital formats being used. Thus
contributing sufficient knowledge so as to develop more secure scheme.
Keywords: Copyright Protection, Visual Cryptography.
I. Introduction
Visual cryptography is a new cryptographic scheme pioneered by Moni Noar and Adi Shamir[1]. In
this technique visual information (secret) is encrypted in such a way that decryption is done without any
cryptographic computation. The visual cryptography technique encrypts a secret image into shadow images
called shares. In the basic scheme secret image is encrypted into two shares such that both the shares can only
recover the secret image, and either of the single share cannot leak any information about the secret. There are
several generalizations of the basic scheme including k-out-of-n visual cryptography where in we have n shares
and a minimum of k shares are needed to recover the secret. Characteristics of the scheme include 1. Perfect
secrecy of secret messages. 2. Human Visual Systems (HVS) can decode the secret.
The basic code book of visual cryptography is shown in Fig 1 where each pixel is divided into 4 sub
pixels. If a pixel p is white, one of the two columns tabulated under the white pixel in Fig 1 is selected. If p is
black, one of the two columns tabulated under the black pixel is selected. If p is white, the superposition of the
two shares always outputs two black and two white sub pixels, no matter which column of sub pixel pair is
chosen during encoding. If p is black, it yields four black sub pixels.
Watermarking based on visual cryptography does not modify the pixels on the host image, balancing the
characteristics like Imperceptibility, capacity, robustness, security, without any conflict. Hence termed as
Lossless watermarking technique and is useful in protecting range of digital images.
Steps involved in copyright protection based on visual cryptography are
Owner Share Generation (OSG), Public share generation and
Watermark Extraction (WE) as shown in Fig 2.Given a target image to
be copyrighted and a secret key, a secret binary matrix, called master
key is generated using some threshold technique. The bits of this master
key and visual cryptography code table are then used to generate an
owner share. The owner share is then registered with a certifying
authority. Whenever there is a controversy regarding ownership identity,
the other share called public share is computed from the controversial
image using a similar process and the same secret key. But, to generate
public share, the extraction algorithm does not require the original
watermark. Both the shares are then combined using a combination
function, to extract the watermark.
Fig. 1 Basic codebook
2. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 80 | Page
Fig. 2 Algorithm for copyright protection based on visual cryptography
Advantages of Watermarking based on visual cryptography over traditional watermarking scheme.
1. Original image is unaltered.
2. Visual cryptography based technique is lossless watermarking technique.
3. Constraint like embedding capacity is removed.
4. More secure
II. Existing approaches
(A)R. Hwang’s method
In 2000 R. Hwang proposed Digital image copyright protection scheme based on visual Cryptography [2]. The
proposed scheme used 2-2 visual cryptography to generate the verification information(Owner share).
Owner share generation Algorithm:
Input : host image M (K × 1 grey scale image), watermark image P (h×m).
Output: verification information.
Step 1: Select a random number S as the secret key of the image M.S is known only to the owner.
Step 2: Use S as the seed to generate h×n different random numbers over the interval [0, k×l].
(We use Ri to denote the i-th random number.)
Step 3: Assign the i-th pair ( , ) of the verification information V based on Table 1.
Step 4: Assemble all the ( , ) pairs to construct the verification information V.
The verification information and the watermark image pattern is then registered to certifying authority.
If any issue regarding the image occurs then the owner provides the secret key to authority for verification.
Public share generation and watermark Extraction Algorithm:
Step 1: Use S as the seed to generate h×n different random numbers over the interval [0, k×l].
(We use Ri to denote the i-th random number.)
Step 2: Assign the color of the i-th pixel of the watermark pattern P’ based on Image M as follows:
2.1 Get the left-most bit, b, of the Ri-th pixel of Image F, and, if b is “1”, then assign fi=(1, 0); otherwise,
fi=(0,1).
2.2 If fi is equal to the i-th pair of V then assign the color of the i-th pixel of P’ to be White; otherwise, assign
it to be black.
Step 3: check If P’ can be recognized as P through the human visual system. An example of the proposed
scheme is shown in Fig 3.
3. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 81 | Page
(a) (b)
(c) (d) (e)
Fig. 3 (a) host image (lena) (b) watermark image (c) Owner share (d) Public share (e) extracted watermark
(B)Ching-Sheng Hsu and Young-Chang Hou’s Method
In 2005 C.S.Hsu and Y.C.Hou proposed Copyright protection scheme for digital images using visual
cryptography and sampling methods [3] .The proposed method employed Sampling distribution of means to
generate the master share .During sampling a private key is used which is kept secret. The proposed method
enabled watermark image to be of any size regardless of the host image.
Owner share generation Algorithm:
Input: A gray-level host image H with M1×M2 pixels, a bi-level secret image S with N1×N2 pixels, and a
private key K.
Output.: An ownership share O of size N1×N2 pixels.
Step 1: Compute the population mean µ of the pixel values of the host image H.
Step 2: Generate a list of random numbers L=(l1 , l2 , . . . ), where belongs to {1,2,……. × }
by a random number generator seeded by K.
Step 3: Randomly select n(n≥30) pixel values , ,……, . from the host image H (according to L) to
form a sample mean
Step 4: For each pixel of the secret image S, determine the color of the pixel ( with 4 sub pixels) in the
ownership share OS according to the following encryption
rules:
Step 5: Repeat steps 3 to 4 until all pixels of the secret image S are processed.
4. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 82 | Page
Public share generation and watermark Extraction Algorithm:
The public share construction and watermark extraction algorithm is similar to the owner share
generation algorithm except step 4.In public share generation in step 4 For each pixel ( with 4 sub pixels) of
the ownership share OS, the color of the pixel in the secret image is determined according to the
decryption rules which are similar to the encryption rules.
Table 1 Table 2
Table 3 Table 4
Table 2
Rule Comparison between Identification
′′
𝐿𝐿1′′ 𝑚,𝑛
and 𝜇 𝑔 Block m
1
1 ′
𝐿𝐿1′′(𝑚,𝑛)<𝜇 𝑔
1
2
𝐿𝐿1′′(𝑚,𝑛)≥
𝜇 𝑔
1
(C)M.S. Wang and W.C. Chen’s Method
In 2007 M.S. Wang and W.C. Chen’s Method proposed Digital image copyright protection scheme
based on visual cryptography and singular value decomposition[4]. In this method singular value decomposition
is used to generate the master share. The main property that the singular values (SVs) of an image do not change
significantly when a small perturbation is added to an image is deployed in this scheme to attain robustness.
This method results in pixel expansion that is the size o owner share is double than the size of watermark image.
Owner share generation Algorithm:
Input:A gray-level host image H of size M1×M2 pixels, a secret image S of size N1×N2 pixels, a window of
size W×W pixels, a private key K, and a codebook C.
Output:An ownership share O of size 2N1×2N2 pixels.
Step 1: Select a list of pixel positions, P={p1 , p2 , . . . , pN1×N2}, by using a PRNG seeded with the private
key K.
Step 2: Perform the SVD on the window centered at each pixel position in P and a sequence of SVs,
ʌ= , ……………, consisting of the largest SV of each window, is acquired.
Step 3: Calculate the threshold T by using
T=
Rule
Comparison between Watermark Owner’s
𝐿𝐿1′ 𝑚,𝑛 and 𝜇 𝑔 , Block o
1 𝐿𝐿1′(𝑚,𝑛)<𝜇 𝑔 0
2 𝐿𝐿1′(𝑚,𝑛)<𝜇 𝑔
1
3 𝐿𝐿1′(𝑚,𝑛)≥𝜇 𝑔
0
4 𝐿𝐿1′(𝑚,𝑛)≥𝜇 𝑔 ′
1
5. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 83 | Page
Step 4: Construct a master share M by utilizing the sequence ʌ and the threshold T according to the codebook
In table 2.
Step 5: Create the ownership share O by mapping the master share M and the secret image S to the codebook.
Public share generation and watermark Extraction Algorithm:
Step 1-4 is exactly same as the owner share generation.
Step 5: Retrieve the secret image by stacking the master
share and the ownership share O.
Step 6: Divide the retrieved secret image into nonoverlapping
2ẋ2 blocks, (1≤k≤ ẋ )
Step 7: Perform the reduction process to obtain a reduced
Secret image by the following rules:
=
(D)Young-Chang Hou and Pei-Hsiu Huang’s Method
In 2011 Y.C.Hou and P.H.Huang proposed an image protection scheme based on visual cryptography
and statistical property[3]. In this scheme comparison of two randomly selected pixel is done to generate the
master share. This method allowed multiple watermarks to be registered for a single host image without causing
any damage to other hidden watermarks. This method also allowed large watermark to casted for small host
image.
Owner share generation Algorithm:
In owner share generation phase a secret key is used to generate random pixels for host image which is used for
comparison. Following are the rules to generate the master share M:
Rule 1: If P( ) > P( ), then = □
Rule 2: If P( ) < P( ), then = ■
Rule 3: If P( )) = P( ), then we do the classification according to the median of the host image, that is,
If P( )) > MD, then = □
If P( )) < MD, then = ■
Once we get the master share M, we can generate the ownership share O based on the encryption rules of visual
cryptography and the contents of the master share M and the watermark W. Every pixel in O is generated as
follows:
Rule 1: If = 0 and = □ then = □
Rule 2: If = 0 and = ■ then = ■
Rule 3: If = 1 and = □ then = ■
Rule 4: If = 1 and = ■ then = □
Where P( ) is selected random pixel position, is a pixel of master share , is a pixel of watermark
image and is a pixel of owner share. Obtained owner share is registered to the certifying authority.
Public share generation and watermark Extraction Algorithm:
Public share generation algorithm follows exactly the same algorithm as the owner share generation
algorithm with the same secret key. The obtained public share is the superimposed with owner share to extract
the watermark image.
6. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 84 | Page
(E)B.P.Devi, Kh. Manglem Singh and S.Roy’s Method
In 2012 .P.Devi, Kh. Manglem Singh and S.roy proposed Dual Watermarking Scheme based on
singular value decomposition and visual cryptography indiscrete wavelet transform. The proposed method is an
improvement over the existing primary watermarking scheme based on singular value decomposition in the
discrete wavelet transforms to improve the robustness.
Owner share generation Algorithm:
Input: Low frequency sub band 𝐿𝐿1′of the image of size 𝑁×𝑁, binary watermark 𝑊 of size 𝑃×𝑄 and a key
𝐾2for generation of random location(𝑚,𝑛).
Output: An owner’s share O of size 2𝑃×2𝑄
Step 1: Compute the global mean 𝜇𝑔of the sub band 𝐿𝐿1′.
Step 2: Generate a list of two-dimensional random number pair(𝑚,𝑛) over the interval 0,0 ,(𝑁−1,𝑁− 1) seeded
by the key𝐾2.
Step 3: For each pixel value in 𝐿𝐿1′at the random location 𝑚, and the global mean 𝜇𝑔 from Column 2 in Table
4, and each watermark value 𝑊 𝑖, at location (𝑖,)from Column 3 in Table 4, generate the owner’s block o from
Column 4 in Table 4.
Step 4: Repeat 3 until all pixels of the watermark W are processed.
Public share generation and watermark Extraction Algorithm:
Step 1-2 are as the owner share generation .
step 3: for each pixel value in 𝐿𝐿1′′ at the random location 𝑚,𝑛 and the global mean 𝜇𝑔′ from Column 2 in
Table3, and each sub-watermark value 𝑊 𝑖,𝑗 at location (𝑖,𝑗)from Column 2 in Table 3, generate the master
block 𝑚 from Column 3 in Table 3.
Step 4: Repeat 3 until the end of all random locations generated by 𝐾2is exhausted.
(F)N.S.Gavini and S. Borra’s method
In 2014 N.S.Gavini and S. Borra proposed a new visual cryptography based copyright protection
scheme for high resolution images[7].This method deploys Central limit theorem on a correlation matrix
obtained from the host image and block based visual cryptography.This method has 100% imperceptibility and
has no limit on the size of watermark image and is robust.
Owner share generation Algorithm:
Input : secret key K ,watermark image c×d ,target image M×N.
Step 1: resize and remap the image T to obtain a modified image G of size MN/ and with colors.
Step 2: from image G obtain Correlation Matrix CM.
Step 3: Calculate mean μ of CM.
Step 4: obtain sample means , each of size n from CM Using secret key k as a seed.
Step 5: Obtain the elements of binary key matrix called master key (M) by Comparing each with the mean μ
Step 6: using the Block visual cryptography code table, Construct an owner share from the binary watermark
and M .
The obtained owner share (OS) is then registered to a certifying authority.
Public share generation and watermark Extraction Algorithm:
Public share generation involves similar steps as the owner share Generation to obtain the public share (PS).
The shared watermark is then extracted by performing OS XOR PS.
III. Performance parameters
Peak signal-to-noise ratio(PSNR) : PSNR is used to evaluate the image quality ie the similarity of
original and attacked grey level image.
PSNR= 10 ×
MSE=
Normalized Correlation (NC) : NC is used to evaluate the similarity of original and extracted image.
7. Copyright protection scheme based on visual Cryptography: a Review
DOI: 10.9790/0661-17327985 www.iosrjournals.org 85 | Page
NC=
False Positive Rate (FPR) : FPR is a check of security. A false positive occurs if any wrong combination of
owner and public share results in a trace of hidden watermark. Numerically if NC > 0.7 for wrong combination
then false positive is said to be occurred.
FPR = , where FP= False positive and TN= True negative.
IV. Conclusion
In this paper lossless watermarking techniques for copyright protection based on visual cryptography
are discussed. Table 6 shows the false positive rate of existing techniques. According to I.J.Cox [8] false
positive rate of can meet the security requirement. So there is still a good scope of improvement. Table 5
shows the robustness of existing techniques against variety of attacks for Lena image. It is also seen that the
performance of the proposed technique depends on feature extracted from host image, visual cryptography code
book used for share generation and retrieval method used to obtain the watermark. Other parameters on which
further work can focus on are size of shares, capacity of watermark, complexity of scheme used and the format
of images.
Table 5 Table 6
References
[1]. M. Naor and A. Shamir, "Visual Cryptography", in Advances in Cryptology – Eurocrypt’94, Vol. 950 of Lecture Notes in
Computer Science, Springer-Verlag, Berlin, 1995, pp 1-12.
[2]. R. Hwang, “Digital image copyright protection scheme based on visual cryptography,” Tamkang Journal of Science and
Engineering, Vol.3, No.2, 2002, pp. 96-106.
[3]. C. S. Hsu and Y. C. Hou, “Copyright protection scheme for digital images using visual cryptography and sampling methods”,
Optical Engineering, Vol. 44, No. 7, 2005, pp. 1-10.
[4]. M.S. Wang and W.C. Chen, "Digital image copyright protection scheme based on visual cryptography and singular value
decomposition", Opt. Eng., 46, Vol. 6, 2007, pp 1-8.
[5]. Y.C Hou and P.H. Huang, "Image Protection based on Visual Cryptography and Statistical Property", IEEE SSP, 2011, pp. 481-
484.
[6]. B.P.Devi,K.M.Singh and S.Roy, “Dual image Watermarking Scheme based on Singular value decomposition and visual
cryptography in discrete wavelet Transform ”,International journal of computer application, vol. 50,No.12 , 2012.
[7]. N.S.Gavini and S. Borra, “Lossless Watermarking technique for copyright protection of high resolution images”, IEEE Region 10
Symposium,2014,pp.73-78.
[8]. I.J. Cox, M.L. Miller and J.A. Bloom, "Watermarking applications and their properties", Proceedings of the International
Conference on Information Technology: Coding and Computing- ITCC2000, 2000, pp.6–10