Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image

Authors and Affiliations

Prasanna Kumar H R , Niranjan N Chiplunkar

Keywords

Related Articles

 Jamming Anticipation and Convolution through Immaculate Hiding  Process of Packets

 Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed  wire...

Efficient Detection of Internet Worms Using Data Mining Techniques

Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...

 Immune Optimization Design of Diesel Engine Valve Spring Based on the Artificial Fish Swarm

 Abstract: In order to improve the reliability of the structure design of the diesel engine valve spring and its working performance, an artificial fish swarm-based immune genetic algorithm (AFS-IGA) is proposed. Af...

 Improved and Feasible Access to Health Care Services throughIntegration of Mobile Technology and Big Data (Indian Context)

 Abstract: Big Data is already changing the way business decisions are made, however, it is still early in thegame. Big data has the potential to increase the capacity and capabilities of conventional storage, repor...

A Survey Report on Distributed System Using Load Balancing Approach

Abstract:A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each process...

Download PDF file
  • EP ID EP96399
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Prasanna Kumar H R, Niranjan N Chiplunkar (2016). Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 19-23. https://europub.co.uk./articles/-A-96399