A secured approach for sharing critical data on halftone image Using advance visual cryptography

Abstract

Visual cryptography is a secret sharing scheme which uses images divided as shares such that, when the shares are created, a hidden secret image is attached. In extended visual cryptography, the share images are developed that contain meaningful cover images. For processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the released image is the same as for the original halftone secret image. The remaining scheme maintains the perfect security of the original extended visual cryptography approach.

Authors and Affiliations

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane

Keywords

Related Articles

Parking Management Systems and Their Technologies - A Review

The number of personal vehicle usage is ever increasing; so is the number of people going to shop in malls. Finding a parking space in most shopping complexes, especially during the rush hours, is difficult for drivers....

Green Computing - An Efficient Computer Power Consumption Benchmarking

Computer power consumption is becoming a more important topic as electricity prices climb and as pollution is becoming a bigger problem in the world. It is common knowledge that most of the world's power plants emit pol...

Heat Transfer Augmentation through Different Passive Intensifier Methods (Review)

In most of the previous experimental and numerical studies empirical correlations for duct flow with straight channel has been investigated and corresponding heat transfer and pressure drop are reported, very few paper...

Automatic Thread Winding Machine using Embedded System

The advances in Automation, has brought innumerous development in various fields especially in textile industries. But the small scale textile industries are unable to make use of the automatic machines for winding the...

Design and Verification of Adaptive Router for NOC Using Buffer Resizing Technique

This paper focuses on design of adaptive router with buffer resizing technique for network on chip(NOC) by run time reconfiguration of resources and verification of design using system verilog. Complex system on chip(SO...

Download PDF file
  • EP ID EP19340
  • DOI -
  • Views 253
  • Downloads 4

How To Cite

Umesh A Jain, Vijendra S Somwanshi, Rutuja Y Ghule, Akshay R Butte, Mr. S. R. Lahane (2015). A secured approach for sharing critical data on halftone image Using advance visual cryptography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(1), -. https://europub.co.uk./articles/-A-19340