Submit Search
Upload
Visual Cryptography using Image Thresholding
•
0 likes
•
38 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i6/IRJET-V4I6538.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Ijetcas14 372
Ijetcas14 372
Iasir Journals
Comparative between global threshold and adaptative threshold concepts in ima...
Comparative between global threshold and adaptative threshold concepts in ima...
AssiaHAMZA
H1802054851
H1802054851
IOSR Journals
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mapping
eSAT Journals
An improved hdr image processing using fast global
An improved hdr image processing using fast global
eSAT Publishing House
50120140501016
50120140501016
IAEME Publication
IRJET- A Comparative Review of Satellite Image Super Resolution Techniques
IRJET- A Comparative Review of Satellite Image Super Resolution Techniques
IRJET Journal
Mathematical operations in image processing
Mathematical operations in image processing
Asad Ali
Recommended
Ijetcas14 372
Ijetcas14 372
Iasir Journals
Comparative between global threshold and adaptative threshold concepts in ima...
Comparative between global threshold and adaptative threshold concepts in ima...
AssiaHAMZA
H1802054851
H1802054851
IOSR Journals
An improved hdr image processing using fast global tone mapping
An improved hdr image processing using fast global tone mapping
eSAT Journals
An improved hdr image processing using fast global
An improved hdr image processing using fast global
eSAT Publishing House
50120140501016
50120140501016
IAEME Publication
IRJET- A Comparative Review of Satellite Image Super Resolution Techniques
IRJET- A Comparative Review of Satellite Image Super Resolution Techniques
IRJET Journal
Mathematical operations in image processing
Mathematical operations in image processing
Asad Ali
Digital Image Fundamentals
Digital Image Fundamentals
A B Shinde
Performance Anaysis for Imaging System
Performance Anaysis for Imaging System
Vrushali Lanjewar
1.arithmetic & logical operations
1.arithmetic & logical operations
mukesh bhardwaj
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
iaemedu
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
IJERA Editor
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
Iaetsd Iaetsd
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
TELKOMNIKA JOURNAL
Region duplication forgery detection in digital images
Region duplication forgery detection in digital images
Rupesh Ambatwad
F42022628
F42022628
IJERA Editor
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
IRJET Journal
Stereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detection
TELKOMNIKA JOURNAL
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
sipij
Oc2423022305
Oc2423022305
IJERA Editor
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion Technique
IJEEE
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
editorijcres
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
IRJET Journal
histogram equalization of grayscale and color image
histogram equalization of grayscale and color image
Saeed Ullah
Ijnsa050207
Ijnsa050207
IJNSA Journal
T01022103108
T01022103108
IOSR Journals
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
More Related Content
What's hot
Digital Image Fundamentals
Digital Image Fundamentals
A B Shinde
Performance Anaysis for Imaging System
Performance Anaysis for Imaging System
Vrushali Lanjewar
1.arithmetic & logical operations
1.arithmetic & logical operations
mukesh bhardwaj
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
iaemedu
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
IJERA Editor
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
Iaetsd Iaetsd
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
TELKOMNIKA JOURNAL
Region duplication forgery detection in digital images
Region duplication forgery detection in digital images
Rupesh Ambatwad
F42022628
F42022628
IJERA Editor
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
IRJET Journal
Stereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detection
TELKOMNIKA JOURNAL
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
sipij
Oc2423022305
Oc2423022305
IJERA Editor
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion Technique
IJEEE
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
editorijcres
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
IRJET Journal
histogram equalization of grayscale and color image
histogram equalization of grayscale and color image
Saeed Ullah
Ijnsa050207
Ijnsa050207
IJNSA Journal
T01022103108
T01022103108
IOSR Journals
What's hot
(20)
Digital Image Fundamentals
Digital Image Fundamentals
Performance Anaysis for Imaging System
Performance Anaysis for Imaging System
1.arithmetic & logical operations
1.arithmetic & logical operations
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
Region duplication forgery detection in digital images
Region duplication forgery detection in digital images
F42022628
F42022628
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Stereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detection
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
Oc2423022305
Oc2423022305
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion Technique
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
histogram equalization of grayscale and color image
histogram equalization of grayscale and color image
Ijnsa050207
Ijnsa050207
T01022103108
T01022103108
Similar to Visual Cryptography using Image Thresholding
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET Journal
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
eSAT Publishing House
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
IRJET Journal
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET Journal
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
Survey paper on image compression techniques
Survey paper on image compression techniques
IRJET Journal
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
Editor IJMTER
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
IRJET Journal
Cj36511514
Cj36511514
IJERA Editor
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...
eSAT Journals
I07015261
I07015261
IJERD Editor
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
IRJET Journal
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
IOSR Journals
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
IJECEIAES
A Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and Techniques
IRJET Journal
Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...
IRJET Journal
Similar to Visual Cryptography using Image Thresholding
(20)
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
Survey paper on image compression techniques
Survey paper on image compression techniques
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
Cj36511514
Cj36511514
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...
I07015261
I07015261
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
A Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and Techniques
Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Recently uploaded
(20)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Visual Cryptography using Image Thresholding
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1603 Visual Cryptography using Image Thresholding Daisy Das M.tech, Computer Science and Engineering, GIMT, Assam, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper proposes a novel visual cryptographic algorithm using image thresholding. The technique used simple image thresholding to generateakeylessschemewitha minimal computationalload. Theapproachcreatestwoshares of images from the original secret image. The shares are produced by thresholding the secret image such that the individual share do not reveal any information about the secret image. Most visual cryptography algorithms result in a wrong reconstruction of original image restricting the use of the scheme. In this method, the original imagecould beformed by Oring the pixel value of the shares with the threshold value without any loss of information or image quality. At such the secrecy, accuracy and confidentiality of the secret image is maintained while sharing over a medium. Key Words: Visual cryptography; shares; keyless; image; computational complexity, accuracy; secrecy; thresholding; algorithm 1.INTRODUCTION With an exponential increase in technology, the internet has become a prominent medium for sharing of multimedia information over the network. Many cryptographic methods have been developed in the recent past for sharing of secret information over the network. This gave dimensiontoa new cryptographic technique known as visual cryptography. Visual cryptography was first introduced in 1994 by Naor and Shamir [1]. The visual information encrypted using Visual cryptography can bedecodedusinga standardhuman visual system, without the aid of computers by a layman. Visual cryptography scheme does not require complex computation in decryption process, and overlapping operation can regenerate the secret images. It does not need any particular cryptographic knowledge toimplement.Most of the technique concentrates on binary images; however few of them proposed methods forprocessinggray-level and color images[2]. The methods used for color images have a poor reconstruction of an original image with quality and information loss of the recovered image. This paper describes a technique of visual cryptography using image thresholding. Two shares are generated in this scheme from the original secret image by thresholding the secret image with some defined threshold value. One share contains the image information for which pixel value is less than the threshold value, and theotherprovidesinformation for which pixel value is greater than the thresholdvalue.The original image is obtained by Oring the pixel value of the shares depending on the threshold value. This method is a keyless technique and implies no loss of pixel information from the original reconstructed image with less computational complexity. In this paper global threshold is used however adaptive and local threshold can also be applied according to users choice. 2. LITERATURE REVIEW 2.1 Thresholding Thresholding is replacing each pixel with black if the pixel intensity value of the image is less than some fixed constant T , or a white pixel if the image intensity value isgreaterthan that constant. Colour images can also be thresholded by thresholding each RGB component separately. Automatic thresholding requires the computer to select the threshold automatically. Sezgin and Sankur categorize thresholding methods into the following six groups based on the information the algorithm manipulates[9] Histogram shape-histogram based method analyzed the peak-valley and curvature of the histogram. Clustering-based thresholding clusters image into two groups as background and foreground. Entropy-based methods use algorithmstofindthedegree of randomness of foreground and background pixels and separate them accordingly. Object Attribute-based methods measure the similarity between background and foreground using algorithms of fuzzy shape similarity, edge coincidence, etc. to group the image into separate background and foreground image. Spatial methods uses higher-order probability distribution algorithms and or measures the correlation between pixels Local methods find threshold of each image pixel based on local area thresholding of the image using pixel connectivity between pixels.The thresholding values may differ depending on the intensity values of pixels locally. 2.2 Visual Cryptography Visual cryptography is splitting an image into n shares such that no individual share gives any information of the image only when a subset of the shares is stacked on another it reveals the secret image. Table I provides a comparisonofsix such techniques[3].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1604 Sr. No. Num ber of Secr et Ima ges Pixe l Exp ansi on Image Form at Type of Share generated 1. Naor and Shamir [1] 1 4 Binary Random 2. Wu and Chen [4] 2 4 Binary Random 3. Chin- Chen Chang et al [5] 1 4 Binary Meaningful 4. Liguo Fang et al [6] 1 2 Binary Random 5. S. J. Shyu et al [7] n(n> =2) 2n Binary Random 6. W. P. Fang [8] 2 9 Binary Random 3.PROPOSED METHOD The proposed method uses visual cryptography with image thresholding property to provide accuracy, secrecy, and confidentiality of the secret image. Hereinthisalgorithm global thresholding with predefined imagethresholdvalueis used.However one can also use adaptive or local threshold method according to requirement. An RGB image consists of the red, green and blue pixel plane. In the encryption phase, the schemeseparatesall the three planesand threshold each plane on a predefined thresholdvalue.Eachshareconveysno information of the original image. While decrypting it, the original image planes are reconstructed by bitwise Oring the pixel value of these shares. Finally, the RGB planes are overlapped to form the original image. The method is used for color image and also could be used for gray scale image. The reconstructed image has no information loss and correctly recover the original image with minimal computational cost without any key management. 3.1 The algorithm The proposed method involves four steps: Step 1 : Separation of an image into its constituent red, blue , green planes. Step 2 : Shares generation of each plane accordingto the predefined threshold value. Step 3 : Overlapping the two shares of each plane to reconstruct the planes. Step 4 : Finally the three planes are stacked to form the original secret image. In step 1 the secret image is divided into its constituent RGB plane. In additive model or RGB model the image in made up of different RED, GREEN, and BLUE plane stack over each other to define a particular intensity value.The value of each plane range between 0-255. In step 2 the threshold value is determined, and each separate RGB plane of the colored image is a limit based on this threshold value. Hence one share contains image information having pixel values greater than the threshold value and the other includes image data having pixel values less than the threshold value. In total, the three RGB planes have two shares each resulting in 6 shares. In step 3 the shares obtained in step 2 are overlapped by Oring the value of pixel information depending on the pixel value from the two shares to a third image reconstructing the desired RGB plane. This step is repeated for each RGB plane restoring the three planes. In step 4 the RGB planes obtained in step 3 are joined to form the required color image. Algorithm ( ) { Red plane = Image(Redvalue(0-255)) Green plane = Image(Greenvalue(0-255)) Blue plane = Image(Bluevalue(0-255)) Th=threshold value For each Red,Green,Blue Plane { For every pixel i=0 to n { If(pixel value<th) { Share 1=pixel value } Else { Share2 =pixel value } } For every pixel i=0 to n { If(pixel value<th) { Reconstructed Image value=share1 OR share2 } } 3.2 Implementation details The algorithm was implemented using Matlab on Windows XP where two functions encrypt and decrypt were used. encrypt encrypts the image by creating the two shares by comparing it with the threshold value. decrypt decrypts the image by Oring the shares pixel value with the defined threshold value into the third image reconstructing the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1605 original image. This functions works for color images and can be extended to gray scale images as well. In our proposed technique the cost incurred for encryption and decryption are less since the majority operations are comparison and OR operations. In the proposed scheme there are no keys involved, and hence there is no key management. 4. EXPERIMENTAL RESULTS 4.1 Color Image The method was implemented on a color image with the threshold value (th=231) in Matlab showed in Table 2. The two shares of the picture formed are share1 and share2 shown in column 3 and column 4 respectively. The original image and resultant image which is reconstructed after overlapping the three planes are shown in column 1 and column 6 respectively. Column 5 represents the reconstructed planes after overlapping both share1 and share2. Table 2 Algorithm implementation for Colored Image Original image plane Share 1>th Share 2<th overlapped Plane Recovered Image Red Green Blue 5. RESULTS AND DISCUSSIONS The method gives a replica of the original image without any loss of information. The results were validated using Normalized Correlation (NC)[3]. NC is used to calculate the correlation between both the encoded and decoded image NC=∑w i=1 ∑h j=1(Sij ⊕Rij)/w × h S represents the secret image and R the recovered image. w, h represents the width/height of the photographs and represents the exclusive OR operator. The algorithm was repeated for a test over multiple images, the NC for all the recovered images was 1.000. Table 3 gives a detailed feature set of our algorithm Table 3: Feature set of the algorithm Features Thresholdin g Noise Correlation Always 1.00 Image transparenc y Delivery Depends on threshold value Additional Data Structure no Key Managemen t no Pixel expansion no 3. CONCLUSIONS In this paper, a novel hybrid Visual Cryptography technique with image thresholding is presented.Itisahybrid approach of the conventional Visual Cryptographic Scheme and the traditional image encryption schemes together with image thresholding method. A secret colored image is split into its constituent RGB planes, and two shares from each plane are generated, one share image has pixel value greater than a predefined threshold, and another shared image has pixel value lesser than the specified threshold, and with minimum calculation, the original secret image can be reconstructed. The proposed algorithm has the following advantages (a) There is noinformationlosswhentheoriginal image is restored back. (b) The storage requirement is same as the original image as the exact original image is replicated (c) It is a keyless encryption method (d) It can counter attacks such as guessing, bruteforceattacksandshouldering. (e) The sametechnique can be extended to grayscaleimages. (f) The individual shares reveal no information about the secret image thus can be sent via an unsecured network. The proposed scheme is suited for entity authentication based application where authenticationcanbedonebyoverlapping the shares over one another to reveal the secret information. If the hidden image matches the originalimage,thenaccessis granted else denied REFERENCES [1]Moni Naor and Adi Shamir, "Visual Cryptography," Advances in cryptology– Eurocrypt, pp 1-12,1995. [2] Y. C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol. 36, pp. 1619-1629, 2003. [3] Ms. Moushmee Kuri, Dr. Tanuja Sarode,"RKOTechnique for Color Visual Cryptography," in : IOSR Journal of ComputerEngineering(IOSR-JCE)e-ISSN:2278-0661,p- ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr. 2014), PP 89-93
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1606 [4] C.C. Wu, L.H. Chen, "A Study On Visual Cryptography," Master Thesis, Institute of Computer and [5] Chin-Chen Chang, Jun-ChouChuang,Pei-YuLin,"Sharing A Secret Two-Tone Image In Two Gray-Level [6] Liguo Fang, BinYu, “Research On Pixel Expansion Of (2,n) Visual Threshold Scheme”, 1st International [7] S. J. Shyu, S. Y. Huanga, Y. K. Lee, R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual [8] Wen-Pinn Fang, “Visual Cryptography In Reversible Style," IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007),Kaohsiung, Taiwan, R.O.C, 2007. [9] Mehmet Sezgin and Bulent Sankur, Survey over image thresholding techniques and quantitative performance evaluation, Journal of Electronic Imaging 13(1), 146–165 (January 2004).
Download now