SlideShare a Scribd company logo
A WEAK SECURITY NOTION FOR VISUAL SECRET SHARING
                                   SCHEMES



OBJECTIVE:

      The main objectives of this project is a sharing the secret information
through an encrypted color image based on LSB Method.

PROBLEM DIFINITION:

      The problem found in our existing system is we must expand the original
pixels on the secret images in encryption, which aces lower level of contrast of the
reproduced images.Many efforts have been devoted to minimizing the pixel
expansion and to maximize the contrast of reproduced images.



ABSTRACT:

      In visual secret sharing (VSS) scheme, the alignment of the transparencies is
important to the visual quality of the reconstructed secret image. Each pixel of the
original secret image is expanded to m subpixels in a share image. If a share image
is printed on a paper with the same size as the original secret image, the alignment
or the registration of the subpixels, which is only m times smaller than that of the
original secret image, could be troublesome. In this paper, we propose a (2, n)-VSS
scheme that allows a relative shift between the shares in the horizontal direction
and vertical direction. When the shares are perfectly aligned, the contrast of the
reconstructed image is equal to that of the traditional VSS scheme.
When there is a shift, the average contrast of the reconstructed image is
higher than that of the traditional VSS scheme, and the scheme can still work in
cases where very little shape redundancy is present in the image. The trade-off is
that our method involves a larger pixel expansion. The basic building block of our
scheme is duplication and concatenation of certain rows or columns of the basic
matrices. This seemingly simple but very powerful construction principle can be
easily used to create more general (k, n) schemes.

EXISTING SYSTEM:

    GrayScale Image Based VSS(GI-VSS)
    Water Marking Technique based VSS(WaterMarking Based-VSS)

DISADVANTAGES:

    We must expand the original pixels on the secret imagesin encryption, which
      akes lower level of contrast of the reproducedimages.
    Many efforts have been devoted tominimizing the pixel expansion and to
      maximize the contrastof reproduced images.


PROPOSED SYSTEM:
      In proposed system comes from the fact that VSS schemes need no
computation in decryption Based on this observation, we can relax the
unconditional security notion of -threshold VSS schemes to a weaker notion in
such a way that it is secure if the image obtained by stacking or fewer shares seems
to be a random dot image We also present two constructions of WS-VSS schemes.


    US-VSS scheme (B/W Image based system)
 WS-VSS scheme (color Image Based Syetem).
ADVANTAGES:


  High Security
  There is no need effort for minimizing the pixel expansion
  There is no need effort for maximize the contrast of reproduced images.


ALGORITHM USED:
    1. LSB (Least Significant Bit)
    2. AES (Advanced Encryption Standard)


ARCHITECTURE DIAGRAM:
SYSTEM REQUIREMENTS:

   Hardware Requirements:

        •    System         : Pentium IV 2.4 GHz.
        •    Hard Disk      : 40 GB.
        •    Floppy Drive   : 1.44 Mb.
        •    Monitor        : 15 VGA Colour.
        •    Mouse          : Logitech.
        •    Ram            : 512 Mb.
Software Requirements:

          •     Operating system : Windows XP.
          •     Coding Language : ASP.Net with C#.
          •     Data Base            : SQL Server 2005.



APPLICATIONS:

    1. Deductive Agencies
    2. Government Services
    3. Organization Administrative

More Related Content

Viewers also liked

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
ZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...ZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
ZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
ZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
ZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interface
ZTech Proje
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
ZTech Proje
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
ZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
ZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
ZTech Proje
 

Viewers also liked (13)

Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 

Similar to Psdot 8 a weak security notion for visual

JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
chennaijp
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
chennaijp
 
Final year automobile projects in bangalore
Final year automobile projects in bangaloreFinal year automobile projects in bangalore
Final year automobile projects in bangalore
Thirumal Krishnan
 
Final year automobile projects in bangalore
Final year automobile projects in bangaloreFinal year automobile projects in bangalore
Final year automobile projects in bangaloreThirumal Krishnan
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEEBEBTECHSTUDENTPROJECTS
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
ieeepondy
 
Matlab image size invariant visual cryptography for general access structure...
Matlab  image size invariant visual cryptography for general access structure...Matlab  image size invariant visual cryptography for general access structure...
Matlab image size invariant visual cryptography for general access structure...
Ecway Technologies
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
Ecway Technologies
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
Muqeed Hussain
 
A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matching
JPINFOTECH JAYAPRAKASH
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
Manish Myst
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
JPINFOTECH JAYAPRAKASH
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
Lakshmi Velivala
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
Lakshmi Velivala
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
IEEEGLOBALSOFTTECHNOLOGIES
 
Deep Learning for Computer Vision - PyconDE 2017
Deep Learning for Computer Vision - PyconDE 2017Deep Learning for Computer Vision - PyconDE 2017
Deep Learning for Computer Vision - PyconDE 2017
Alex Conway
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 

Similar to Psdot 8 a weak security notion for visual (20)

JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 
Final year automobile projects in bangalore
Final year automobile projects in bangaloreFinal year automobile projects in bangalore
Final year automobile projects in bangalore
 
Final year automobile projects in bangalore
Final year automobile projects in bangaloreFinal year automobile projects in bangalore
Final year automobile projects in bangalore
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
 
Matlab image size invariant visual cryptography for general access structure...
Matlab  image size invariant visual cryptography for general access structure...Matlab  image size invariant visual cryptography for general access structure...
Matlab image size invariant visual cryptography for general access structure...
 
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matching
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
main doc
main docmain doc
main doc
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Query adaptive image search with hash ...
 
Deep Learning for Computer Vision - PyconDE 2017
Deep Learning for Computer Vision - PyconDE 2017Deep Learning for Computer Vision - PyconDE 2017
Deep Learning for Computer Vision - PyconDE 2017
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Psdot 8 a weak security notion for visual

  • 1. A WEAK SECURITY NOTION FOR VISUAL SECRET SHARING SCHEMES OBJECTIVE: The main objectives of this project is a sharing the secret information through an encrypted color image based on LSB Method. PROBLEM DIFINITION: The problem found in our existing system is we must expand the original pixels on the secret images in encryption, which aces lower level of contrast of the reproduced images.Many efforts have been devoted to minimizing the pixel expansion and to maximize the contrast of reproduced images. ABSTRACT: In visual secret sharing (VSS) scheme, the alignment of the transparencies is important to the visual quality of the reconstructed secret image. Each pixel of the original secret image is expanded to m subpixels in a share image. If a share image is printed on a paper with the same size as the original secret image, the alignment or the registration of the subpixels, which is only m times smaller than that of the original secret image, could be troublesome. In this paper, we propose a (2, n)-VSS scheme that allows a relative shift between the shares in the horizontal direction and vertical direction. When the shares are perfectly aligned, the contrast of the reconstructed image is equal to that of the traditional VSS scheme.
  • 2. When there is a shift, the average contrast of the reconstructed image is higher than that of the traditional VSS scheme, and the scheme can still work in cases where very little shape redundancy is present in the image. The trade-off is that our method involves a larger pixel expansion. The basic building block of our scheme is duplication and concatenation of certain rows or columns of the basic matrices. This seemingly simple but very powerful construction principle can be easily used to create more general (k, n) schemes. EXISTING SYSTEM:  GrayScale Image Based VSS(GI-VSS)  Water Marking Technique based VSS(WaterMarking Based-VSS) DISADVANTAGES:  We must expand the original pixels on the secret imagesin encryption, which akes lower level of contrast of the reproducedimages.  Many efforts have been devoted tominimizing the pixel expansion and to maximize the contrastof reproduced images. PROPOSED SYSTEM: In proposed system comes from the fact that VSS schemes need no computation in decryption Based on this observation, we can relax the unconditional security notion of -threshold VSS schemes to a weaker notion in such a way that it is secure if the image obtained by stacking or fewer shares seems to be a random dot image We also present two constructions of WS-VSS schemes.  US-VSS scheme (B/W Image based system)
  • 3.  WS-VSS scheme (color Image Based Syetem). ADVANTAGES:  High Security  There is no need effort for minimizing the pixel expansion  There is no need effort for maximize the contrast of reproduced images. ALGORITHM USED: 1. LSB (Least Significant Bit) 2. AES (Advanced Encryption Standard) ARCHITECTURE DIAGRAM:
  • 4. SYSTEM REQUIREMENTS: Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb.
  • 5. Software Requirements: • Operating system : Windows XP. • Coding Language : ASP.Net with C#. • Data Base : SQL Server 2005. APPLICATIONS: 1. Deductive Agencies 2. Government Services 3. Organization Administrative