Gives Information About Hybrid Approach for (K,N) Secret Sharing Scheme in Visual Cryptography. and also Literature Survey on visual cryptography from past 10 Years.
Designing an efficient image encryption then-compression system via predictio...LeMeniz Infotech
The document proposes a new image encryption-then-compression system that aims to efficiently compress encrypted images while maintaining a high level of security. It suggests encrypting images in the prediction error domain and using context-adaptive arithmetic coding to compress the encrypted data, resulting in only a negligible loss in compression efficiency compared to compressing the original images. This approach improves upon existing systems that induce significant penalties on compression performance when encrypting images prior to compression.
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...chennaijp
JP INFOTECH is one of the leading Matlab projects provider in Chennai having experience faculties. We have list of image processing projects as our own and also we can make projects based on your own base paper concept also.
For more details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/matlab-projects/
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
The problem of scene classification in surveillance footage is of great importance for ensuring security in public areas. With challenges such as low quality feeds, occlusion, viewpoint variations, background clutter etc. The task is both challenging and error-prone. Therefore it is important to keep the false positives low to maintain a high accuracy of detection. In this paper, we adapt high performing CNN architectures to identify abandoned luggage in a surveillance feed. We explore several CNN based approaches, from Transfer Learning on the Imagenet dataset to one-shot detection using architectures such as YOLOv3. Using network visualization techniques, we gain insight into what the neural network sees and the basis of classification decision. The experiments have been conducted on real world datasets, and highlights the complexity in such classifications. Obtained results indicate that a combination of proposed techniques outperforms the individual approaches.
Author: Utkarsh Contractor
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Designing an efficient image encryption then-compression system via predictio...LeMeniz Infotech
The document proposes a new image encryption-then-compression system that aims to efficiently compress encrypted images while maintaining a high level of security. It suggests encrypting images in the prediction error domain and using context-adaptive arithmetic coding to compress the encrypted data, resulting in only a negligible loss in compression efficiency compared to compressing the original images. This approach improves upon existing systems that induce significant penalties on compression performance when encrypting images prior to compression.
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...chennaijp
JP INFOTECH is one of the leading Matlab projects provider in Chennai having experience faculties. We have list of image processing projects as our own and also we can make projects based on your own base paper concept also.
For more details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/matlab-projects/
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
The problem of scene classification in surveillance footage is of great importance for ensuring security in public areas. With challenges such as low quality feeds, occlusion, viewpoint variations, background clutter etc. The task is both challenging and error-prone. Therefore it is important to keep the false positives low to maintain a high accuracy of detection. In this paper, we adapt high performing CNN architectures to identify abandoned luggage in a surveillance feed. We explore several CNN based approaches, from Transfer Learning on the Imagenet dataset to one-shot detection using architectures such as YOLOv3. Using network visualization techniques, we gain insight into what the neural network sees and the basis of classification decision. The experiments have been conducted on real world datasets, and highlights the complexity in such classifications. Obtained results indicate that a combination of proposed techniques outperforms the individual approaches.
Author: Utkarsh Contractor
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a method for securely sharing visual secrets using click point encryption. The method uses click points selected on an image as an encryption key to encrypt secret data using AES encryption. The encrypted data is then embedded into the image using least significant bit replacement. Only someone with the click point key received through a secure channel can decrypt and view the secret data. The document reviews related work on visual cryptography and identifies limitations like lack of authentication. It then describes the proposed method in more detail, including the AES encryption process, generating encryption keys from click points, and embedding the encrypted data into the image.
Image secret sharing using Shamir's AlgorithmNikita Kasar
This document discusses image secret sharing, which is a technique to securely distribute a secret image among multiple participants. It describes Shamir's secret sharing algorithm, which divides a secret image into shadow images using polynomial interpolation. At least k shadow images are needed to reconstruct the original secret image. The document outlines the steps to generate and distribute shadow images and then recover the secret image. It also covers advantages like robustness and flexibility, disadvantages like potential information leakage, and applications like secure storage and password generation.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
This document reviews various techniques for encrypting images using chaotic maps. It begins with an abstract summarizing that image encryption has become important with digital communication growth. Chaotic encryption is an alternative due to chaotic maps' sensitivity to initial conditions and unpredictability. The document then reviews concepts of image encryption, cryptography, and chaotic systems. It surveys several existing image encryption schemes based on chaotic maps and their approaches, such as using the Henon map or selective encryption of image components. The typical architecture of chaos-based image cryptosystems is also described.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
This document summarizes a research paper that proposes a new approach to visual cryptography using pextral coding in a cellular automaton framework. It begins by reviewing existing visual cryptography techniques that use pixel expansion to encrypt an image. The proposed method considers a 3x3 cellular automaton matrix and uses two symmetric pextral patterns to form signatures from an ASCII image pixel. These signatures are combined to reconstruct the original image without loss of information. The goal is to improve security over traditional visual cryptography while avoiding issues like noise and loss of quality during encryption and decryption.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
This document proposes a new encryption technique that combines visual cryptography and steganography for added security layers. A secret text message is first hidden in a cover image using steganography. The stego image is then sliced into shares using visual cryptography and transmitted over an open system. At the receiver end, the shares are stacked to reconstruct the cover image containing the hidden message, which can then be extracted using steganography. The technique aims to address issues like pixel expansion and memory requirements of previous methods by using unexpanded shares. It provides a less complex encryption/decryption system compared to other approaches.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
The document proposes a hybrid approach for secure data transmission combining cryptography, steganography, and rotational visual cryptography. The approach involves encrypting data using DES encryption with a session key generated via Diffie-Hellman key exchange. The encrypted data is then hidden in the least significant bits of cover image pixels to create a stego image. The stego image is rotated by a specific angle during transmission. At the receiver, the image is de-rotated, the encrypted data extracted from the image, and decrypted using the session key to obtain the original data. The approach aims to provide improved security over traditional methods through multiple layers of encryption, data hiding, and image transformation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Rajesh Kumar
This document summarizes a paper on image steganography techniques for data security. It discusses using the least significant bit (LSB) method of image steganography to hide information by modifying the LSB of image pixel values. It presents algorithms for embedding and extracting hidden data. It evaluates techniques based on peak signal-to-noise ratio (PSNR) between original and stego images. Experimental results show PSNR values and compare space and time efficiency of random pixel selection versus LSB techniques. The document concludes with references to related literature.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/applying-the-right-deep-learning-model-with-the-right-data-for-your-application-a-presentation-from-vision-elements/
Hila Blecher-Segev, Computer Vision and AI Research Associate at Vision Elements, presents the “Applying the Right Deep Learning Model with the Right Data for Your Application” tutorial at the May 2021 Embedded Vision Summit.
Deep learning has made a huge impact on a wide variety of computer vision applications. But while the capabilities of deep neural networks are impressive, understanding how to best apply them is not straightforward. In this talk, Blecher-Segev highlights key questions that must be answered when considering incorporating a deep neural network into a vision application.
What type of data will be most beneficial for the task? Should the DNN use other types of data in addition to images? How should the data be annotated? What classes should be defined? What is the minimum amount of data needed for the network to be generalized and robust? What algorithmic approach should we use for our task (classification, regression or segmentation)? What type of network should we choose (FCN, DCNN, RNN, GAN)? Blecher-Segev explains the options and trade-offs, and maps out a process for making good choices for a specific application.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
"Cross-Year Multi-Modal Image Retrieval Using Siamese Networks" by Margarita Khokhlova, Research Scientist (Post-Doc) at LIRIS
Abstract: Alegoria project aims to create content-based image retrieval (CBIR) tools to help end-users accessing great volumes of archive images of French territories which were recently digitized. The difficulty is that many photographic materials are scarcely, or not at all annotated, which makes it hard to link them to modern photographic images of the same territory. In this talk, I am going to present a new custom Siamese architecture for a cross-time multi-modal aerial image retrieval scenario and talk about single-shot and contrastive learning approaches.
Speaker biography: Margarita Khokhlova is a postdoc researcher at the IGN Saint-Mande affiliated with LIRIS Lyon. Her primary area of expertise is computer vision. She is currently working on deep learning-based methods for unsupervised multi-modal image description and retrieval. She obtained a Ph.D. degree from the University of Burgundy in 2018, where her dissertation was dedicated to automatic gait analysis using 3D active sensors. She also holds two separate master's degrees. The first is a joint degree in computer vision from the University of Lyon, France and NTNU Norway. The second is in business management administration from the University of Burgundy Dijon. Her research interests include computer vision, deep learning, and data analysis.
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
This document summarizes a research paper that proposes a novel technique for visual cryptography to securely transmit visual information. The technique encrypts images into shares using chaotic pseudo-random number generation, zigzag scan pattern, and pixel index reversal to increase security. It also aims to reduce image degradation by applying the methods to individual RGB color channels rather than just grayscale. The results demonstrate that the proposed approach increases security without increasing file size like previous methods, and improves image quality by enabling color images.
An Efficient encryption using Data compression towards Steganography,introduc...prashantdahake
This document outlines a seminar presentation on using arithmetic coding for data compression prior to encryption and steganography. It includes an introduction discussing the need for secure data transmission and compact data storage. The methodology section describes using arithmetic coding to compress data and calculates character probabilities. Block diagrams show the encryption, embedding into an image, and extraction processes. The research contribution combines compression, encryption, and steganography to provide efficient and secure data transmission.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
cse final year project of image encryptionmnbharath2002
This document describes a project on multi-image steganography. It involves embedding multiple secret images into a single cover image. The project aims to increase data hiding capacity while maintaining image quality and robustness against attacks. Existing techniques like LSB substitution and transform domain methods are discussed. The proposed approach uses deep learning models to separately encode multiple images before combining them with the cover image. The encoded image can then reveal the separate secret images through multiple decoders. The document provides background on image processing techniques for payload distribution, synchronization, encryption and robustness. It concludes that steganography provides secure information exchange while maintaining visual cover.
This document summarizes a research paper that proposes a method for securely sharing visual secrets using click point encryption. The method uses click points selected on an image as an encryption key to encrypt secret data using AES encryption. The encrypted data is then embedded into the image using least significant bit replacement. Only someone with the click point key received through a secure channel can decrypt and view the secret data. The document reviews related work on visual cryptography and identifies limitations like lack of authentication. It then describes the proposed method in more detail, including the AES encryption process, generating encryption keys from click points, and embedding the encrypted data into the image.
Image secret sharing using Shamir's AlgorithmNikita Kasar
This document discusses image secret sharing, which is a technique to securely distribute a secret image among multiple participants. It describes Shamir's secret sharing algorithm, which divides a secret image into shadow images using polynomial interpolation. At least k shadow images are needed to reconstruct the original secret image. The document outlines the steps to generate and distribute shadow images and then recover the secret image. It also covers advantages like robustness and flexibility, disadvantages like potential information leakage, and applications like secure storage and password generation.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
This document reviews various techniques for encrypting images using chaotic maps. It begins with an abstract summarizing that image encryption has become important with digital communication growth. Chaotic encryption is an alternative due to chaotic maps' sensitivity to initial conditions and unpredictability. The document then reviews concepts of image encryption, cryptography, and chaotic systems. It surveys several existing image encryption schemes based on chaotic maps and their approaches, such as using the Henon map or selective encryption of image components. The typical architecture of chaos-based image cryptosystems is also described.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
This document summarizes a research paper that proposes a new approach to visual cryptography using pextral coding in a cellular automaton framework. It begins by reviewing existing visual cryptography techniques that use pixel expansion to encrypt an image. The proposed method considers a 3x3 cellular automaton matrix and uses two symmetric pextral patterns to form signatures from an ASCII image pixel. These signatures are combined to reconstruct the original image without loss of information. The goal is to improve security over traditional visual cryptography while avoiding issues like noise and loss of quality during encryption and decryption.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
This document proposes a new encryption technique that combines visual cryptography and steganography for added security layers. A secret text message is first hidden in a cover image using steganography. The stego image is then sliced into shares using visual cryptography and transmitted over an open system. At the receiver end, the shares are stacked to reconstruct the cover image containing the hidden message, which can then be extracted using steganography. The technique aims to address issues like pixel expansion and memory requirements of previous methods by using unexpanded shares. It provides a less complex encryption/decryption system compared to other approaches.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
The document proposes a hybrid approach for secure data transmission combining cryptography, steganography, and rotational visual cryptography. The approach involves encrypting data using DES encryption with a session key generated via Diffie-Hellman key exchange. The encrypted data is then hidden in the least significant bits of cover image pixels to create a stego image. The stego image is rotated by a specific angle during transmission. At the receiver, the image is de-rotated, the encrypted data extracted from the image, and decrypted using the session key to obtain the original data. The approach aims to provide improved security over traditional methods through multiple layers of encryption, data hiding, and image transformation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Rajesh Kumar
This document summarizes a paper on image steganography techniques for data security. It discusses using the least significant bit (LSB) method of image steganography to hide information by modifying the LSB of image pixel values. It presents algorithms for embedding and extracting hidden data. It evaluates techniques based on peak signal-to-noise ratio (PSNR) between original and stego images. Experimental results show PSNR values and compare space and time efficiency of random pixel selection versus LSB techniques. The document concludes with references to related literature.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2021/10/applying-the-right-deep-learning-model-with-the-right-data-for-your-application-a-presentation-from-vision-elements/
Hila Blecher-Segev, Computer Vision and AI Research Associate at Vision Elements, presents the “Applying the Right Deep Learning Model with the Right Data for Your Application” tutorial at the May 2021 Embedded Vision Summit.
Deep learning has made a huge impact on a wide variety of computer vision applications. But while the capabilities of deep neural networks are impressive, understanding how to best apply them is not straightforward. In this talk, Blecher-Segev highlights key questions that must be answered when considering incorporating a deep neural network into a vision application.
What type of data will be most beneficial for the task? Should the DNN use other types of data in addition to images? How should the data be annotated? What classes should be defined? What is the minimum amount of data needed for the network to be generalized and robust? What algorithmic approach should we use for our task (classification, regression or segmentation)? What type of network should we choose (FCN, DCNN, RNN, GAN)? Blecher-Segev explains the options and trade-offs, and maps out a process for making good choices for a specific application.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
"Cross-Year Multi-Modal Image Retrieval Using Siamese Networks" by Margarita Khokhlova, Research Scientist (Post-Doc) at LIRIS
Abstract: Alegoria project aims to create content-based image retrieval (CBIR) tools to help end-users accessing great volumes of archive images of French territories which were recently digitized. The difficulty is that many photographic materials are scarcely, or not at all annotated, which makes it hard to link them to modern photographic images of the same territory. In this talk, I am going to present a new custom Siamese architecture for a cross-time multi-modal aerial image retrieval scenario and talk about single-shot and contrastive learning approaches.
Speaker biography: Margarita Khokhlova is a postdoc researcher at the IGN Saint-Mande affiliated with LIRIS Lyon. Her primary area of expertise is computer vision. She is currently working on deep learning-based methods for unsupervised multi-modal image description and retrieval. She obtained a Ph.D. degree from the University of Burgundy in 2018, where her dissertation was dedicated to automatic gait analysis using 3D active sensors. She also holds two separate master's degrees. The first is a joint degree in computer vision from the University of Lyon, France and NTNU Norway. The second is in business management administration from the University of Burgundy Dijon. Her research interests include computer vision, deep learning, and data analysis.
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
This document summarizes a research paper that proposes a novel technique for visual cryptography to securely transmit visual information. The technique encrypts images into shares using chaotic pseudo-random number generation, zigzag scan pattern, and pixel index reversal to increase security. It also aims to reduce image degradation by applying the methods to individual RGB color channels rather than just grayscale. The results demonstrate that the proposed approach increases security without increasing file size like previous methods, and improves image quality by enabling color images.
An Efficient encryption using Data compression towards Steganography,introduc...prashantdahake
This document outlines a seminar presentation on using arithmetic coding for data compression prior to encryption and steganography. It includes an introduction discussing the need for secure data transmission and compact data storage. The methodology section describes using arithmetic coding to compress data and calculates character probabilities. Block diagrams show the encryption, embedding into an image, and extraction processes. The research contribution combines compression, encryption, and steganography to provide efficient and secure data transmission.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
cse final year project of image encryptionmnbharath2002
This document describes a project on multi-image steganography. It involves embedding multiple secret images into a single cover image. The project aims to increase data hiding capacity while maintaining image quality and robustness against attacks. Existing techniques like LSB substitution and transform domain methods are discussed. The proposed approach uses deep learning models to separately encode multiple images before combining them with the cover image. The encoded image can then reveal the separate secret images through multiple decoders. The document provides background on image processing techniques for payload distribution, synchronization, encryption and robustness. It concludes that steganography provides secure information exchange while maintaining visual cover.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
This document summarizes a research paper that proposes an improved color visual cryptography scheme using Floyd error diffusion. Visual cryptography allows images to be encrypted into shares such that the secret image is only revealed when a sufficient number of shares are stacked together, without requiring any computational decryption. Existing color visual cryptography schemes produced low quality random shares. The proposed scheme uses the concepts of visual information pixels and error diffusion to generate high quality color shares that contain meaningful visual information. It introduces a new encryption method using visual cryptography matrices and cyclic redundancy checks to identify errors and verify authentication of shares. Experimental results show the new scheme produces better quality shares than previous methods and increases security.
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...IRJET Journal
This document presents an abstract for a research paper that proposes a new symmetric block cipher algorithm for encrypting grayscale images. The algorithm aims to improve security by introducing unpredictability through a combination of additive and multiplicative ciphers. It is shown to achieve a high avalanche effect of 98.48%, indicating strong encryption. The algorithm maintains a uniform histogram in encrypted images. It is concluded that the algorithm excels in both security and efficiency, making it suitable for applications requiring protected image transfers.
Elliptical curve cryptography image encryption scheme with aid of optimizatio...IJEECSIAES
Image encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSAbased optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR values.
Elliptical curve cryptography image encryption scheme with aid of optimizatio...nooriasukmaningtyas
The document proposes an image encryption scheme using elliptical curve cryptography (ECC) with optimization via the gravitational search algorithm (GSA). ECC is used to encrypt image blocks, with the private key generation step optimized by GSA. The encrypted image quality, measured by peak signal-to-noise ratio (PSNR), is used as the fitness value in GSA optimization. Compared to standard ECC, the proposed method finds more optimal PSNR values during private key generation. Encrypted images are decrypted and compared to the original to evaluate accuracy using metrics like PSNR, correlation coefficient, and mean squared error.
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
This document reviews techniques for encrypting and decrypting messages via image slicing. It begins with an introduction on the importance of securing data transmitted over unsecured channels. It then summarizes several existing studies on steganography and cryptography techniques. The document proposes a hybrid approach using AES cryptography, LSB steganography, and image slicing/stitching for encrypting messages and ensuring their authentic transmission. It presents block diagrams of the sender and receiver sides and compares the proposed approach to existing systems. Limitations and opportunities for future work are also discussed.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
This document proposes a new approach called anti-phishing image captcha validation using visual cryptography to detect and prevent phishing. It uses the concept of image processing and visual cryptography to encrypt an image captcha into two shares stored on separate servers. When both shares are available simultaneously, the original image captcha is revealed for the user as a password. This scheme aims to preserve the privacy of the image captcha. The document provides background on phishing, visual cryptography, and related works before describing the proposed system which uses a (2,2) visual cryptography threshold scheme to encrypt the image captcha into two shares.
Dual-Layer Video Encryption and Decryption using RSA AlgorithmIJARIIT
The document proposes a dual-layer video encryption method using RSA and pseudo-noise sequence algorithms. It discusses encrypting the audio and video components separately with two layers of encryption. The video encryption uses RSA followed by pseudo-noise encryption. It describes the RSA algorithm key generation, encryption, and decryption processes. The expected results show the original video being separated into R, G, B components, then undergoing four stages of encryption and three stages of decryption when being reconstructed. The dual-layer approach aims to provide high security without compromising speed or decryption ratio.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
Chaos Based Image Encryption Techniques: A ReviewIRJET Journal
This document reviews various techniques for encrypting digital images using chaotic systems. It begins by introducing chaos theory and its application to cryptography. It then reviews 25 research papers published between 2014-2020 that proposed different chaotic map-based techniques for image encryption. These techniques are evaluated and compared based on security metrics like key space, differential analysis, and histogram analysis. While the reviewed techniques demonstrated good encryption performance, the document also identifies potential weaknesses like vulnerability to chosen-plaintext attacks in some methods. It concludes that combining multiple chaotic maps and dynamic algorithms can help develop more robust encryption systems.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
The document describes a proposed asymmetric image encryption scheme based on the Massey Omura cryptosystem. The scheme works as follows: the sender and receiver agree on public parameters like a prime number p. The sender then represents the plaintext image as a matrix and encrypts it using their public key to get the first ciphertext image. This is sent to the receiver who encrypts it again with their public key to produce the second ciphertext image, which is sent back to the sender. The sender decrypts this using their private key to produce the third ciphertext image, which is sent to and decrypted by the receiver using their private key to recover the original plaintext image. The document provides an example of implementing the scheme and discusses evaluating its security using
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
An efficient and highly secure technique to encryptZiadAlqady
The document proposes an efficient and highly secure technique for encrypting and decrypting color images. The technique works by dividing the image matrix into blocks, selecting secret keys of the same size as the blocks, and applying exclusive-OR operations between the blocks and keys consecutively for encryption and decryption. Testing showed the technique provides high security due to the large number of possible key combinations and efficient encryption and decryption times, resulting in high throughput.
An efficient and highly secure technique to encryptZiadAlqady
The document proposes an efficient and highly secure technique for encrypting and decrypting color images. The technique works by dividing the original image matrix into blocks, selecting secret keys of equal size to the blocks, and applying exclusive-OR operations between the blocks and keys. Testing showed encryption and decryption times were small and linearly increased with image size. The encrypted images were distorted while decrypted images matched the originals. The technique achieved a high throughput between 28-29 MBits/sec, making it more efficient than other methods.
An efficient and highly secure technique to encryptZiadAlqady
The document proposes an efficient and highly secure technique for encrypting and decrypting color images. The technique works by dividing the original image matrix into blocks, selecting secret keys of equal size to the blocks, and applying exclusive-OR operations between the blocks and keys. Testing showed encryption and decryption times were small and linearly increased with image size. The encrypted images were distorted while decrypted images matched the originals. The technique achieved a high throughput between 28-29 MBits/second, making it more efficient than other methods.
Similar to Visual cryptography for hybrid approach (20)
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Data Control Language.pptx Data Control Language.pptx
Visual cryptography for hybrid approach
1. HYBRID APPROACH FOR (K, N) SECRET SHARING IN VISUAL CRYPTOGRAPHY
School of Computer Science and Engineering
Vellore Institute of Technology, Vellore-Tamil Nadu -632014
Allu Supraja-17MCI0013
M-Tech CSE(IS) 2017-2019
allu.supraja2017@vitstudent.ac.in
2. INTRODUCTION:
• Visual cryptography (VC) is an emerging area used for data hiding, authentication,
multimedia security and transmission of data.
• Recent research shows many applications uses visual cryptography concept in
authentication, secure transaction, secret sharing of information.
3. LITERATURE SURVEY
• Vinita malik et al (2016) [1] have proposed a des (data encryption standard) algorithm for shaded
visual cryptography.
• Ch. Rupa et al(2016)[2] have proposed another recommendation that is keyed visual cryptographic
scheme (KVCS) to decrease the assault by programmer.
• Asha bhadran r (2015) [3] have displayed a visual cryptography procedure for shading pictures get
encoded due to created share.
• M. Karolinet et al (2015) [4] have proposed a technique for pictures with 256 hues which are
changed over to 16 standard RGB hues design.
4. • Kashmira S. Gulhaneet et al (2016), [5] the image is partitioned into parts known as offers and
after that these offers are dispersed to the members.
• Nidhal khdhair, abbadiet et al (2016) [6] have recommended another technique for picture
encryption in light.
• K. Kanagalakshmet et al (2016) [7] have proposed a technique that depends on blowfish
calculation with prevalent highlights.
• Naor & shamir (1994) [8] have proposed the fundamental topic of visual cryptography inside
which the key picture is part into 2 shares.
• Manika sharmaet al (2013) [9] have proposed a cryptographic system for shading pictures where
we are utilizing shading mistake dissemination with xor activity.
6. COMPARITIVE STUDY
ALGORITHM METHOD ADVANTAGES DISADVANTAGE
Watermark method based on
Visual cryptography
• Difficult to detect or
recover from marked
image illegally
• The weakness of this
method is different
verification information
for different marked
images
(K,N)-threshold visual
cryptography scheme
• Data loss prevention and
security in recovering
image.
• If the dimensions of the
image is high difficult to
analyze.
Extended colour visual
cryptography for black and
white secret image
• Satisfy security, contrast,
and cover image
conditions.
• (k, n)-CBW-VCS are all
perfect black.
• Non-perfect black VC
cannot be determined
Concept of VC and image
processing in banking
• Secure transactions
• authentication
• Only works on black and
white images.
CHANG’S EMBEDDING • Less noisy • (2,N) colored images can’t
7. OBJECTIVE
• The existing system include lot of research on visual cryptography technique.
• The concepts like EVCT (extended visual cryptography technique), halftoning, CTVCS (color
transfer visual cryptography scheme), (k, n) secret sharing.
• The implementation of visual cryptography concept include mainly number of secret images,
pixel expansion, image format and types of share generated.
8. VISUAL CRYPTOGRAPHY NOTATIONS
• (1) k- threshold
• (2) n- group size
• (3) m-pixel expansion
• (4) α-relative contrast
• (5) h(v)-hamming weight
• (6) c0-collection of n*m Boolean matrices for shares of white pixel
• (7) c1-collection of n*m Boolean matrices for shares of black pixel
• (8) d-number in [1,m]
• (9) v- or’ed K rows
9. ALGORITHM FOR IMPLEMENTATION
• Visual cryptography by naor and shamir for monochrome images
• KN sharing scheme for colored images
• SHA-512 algorithm
• AES-256 bit algorithm
Tools:
• MATLAB 2018 or later
11. CONS OF EXISTING SYSTEM
• Low level of security
• No key based security
• Random noise generation in shares
• Transparency
• Possibility of attack in shares
12. PROS ON ANALYSIS OF HYBRID APPROACH
• Enhanced security
• Robustness
• No transparency
• Key based approach for each individual share
13. RESULTS AND ANALYSIS
• The below figure shows result when AES algorithm is used to generate the (k, n) secret sharing
scheme to make data more secure.
14. QUANTITATIVE RESULTS
Fig: Psnr Vs K For Normal Image Fig: Psnr Vs K For 10*10 Image
Show Variation In Psnr When Ran
10 Times
Fig 7: Psnr Vs K For 100*100
Image Variation In Psnr When Ran
10 Times
15. APPLICATIONS OF VISUAL CRYPTOGRAPHY
• Watermarking
• Secure banking communication
• Defense system
• Anti-phishing system
16. CONCLUSION
• Visual cryptography scheme place vital role in rapid growth technology while implementing any
type of application. This can be considered as one of major security concern to prevent
unauthorized access and all possible attacks.
• The above work implemented on the basis of security measure. This results in reduction of
random-noise generated between shares, secret sharing in a secured medium, and increase
transparency also robustness.
• The hybrid mechanism of two level approach is to enhance the security and makes the visual
cryptography more robust to prevent attacks.
17. FUTURE SCOPE
Every parameter of visual cryptography is kept minded and implemented, so that we can use this
approach in real time applications like distributed system, networks, banking and so on. Data
security is concentrated majorly in recent research works further we can implement for multimedia
security like audio and video.
18. REFERENCES
[1] a. Pandey and S. Som, “applications and usage of visual cryptography: A review,” 2016 5th int.
Conf. Reliab. Infocom technol. Optim. ICRITO 2016 trends futur. Dir., Pp. 375–381, 2016.
[2] b. Symposium, “AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET
HIDING R . youmaran , A . adler , A . miri school of information technology and engineering (
SITE ), university of ottawa , ontario , canada,” pp. 340–343, 2006.
[3] c. N. Yang, T. C. Tung, F. H. Wu, and Z. Zhou, “color transfer visual cryptography with perfect
security,” meas. J. Int. Meas. Confed., Vol. 95, pp. 480–493, 2017.
[4] s. Dixit, D. K. Jain, and A. Saxena, “an approach for secret sharing using randomized visual
secret sharing,” proc. - 2014 4th int. Conf. Commun. Syst. Netw. Technol. CSNT 2014, pp. 847–850,
2014.
[5] c. Vyas and M. Lunagaria, “a review on methods for image authentication and visual
cryptography in digital image,” IEEE int. Conf. Comput. Intell. Comput. Res., 2014.
1a34gvddskjjjfjij