Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to encrypt and decrypt the confidential data. Conventional encryption technique is one of the methods usedto transmit secret image which has a drawback of maintaining the secret key. Image splitting is another technique used, in which secret image is divided into different share images. Individual share does not reveal any information about the secret. Qualified set of shares are used to decrypt and get back the original image. Quality of the recovered image and security are the two major issues of this technique. In this paper, we proposed the cryptographic technique which uses three steps for encryption. Encryption process creates two shares, which are like random noise. Shares are transmitted to receiver and shares are decrypted separately and combine both the shares to obtain the original secret image. Proposed method increases the security level and the quality of decrypted image is same as that of original secret image
Authors and Affiliations
Prasanna Kumar H R , Niranjan N Chiplunkar
Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wire...
Efficient Detection of Internet Worms Using Data Mining Techniques
Internet worms pose a serious threat to computer security.Traditional approaches using signatures to detect worms pose little danger to the zero day attacks. The focus of malware research is shifting from using signature...
Immune Optimization Design of Diesel Engine Valve Spring Based on the Artificial Fish Swarm
Abstract: In order to improve the reliability of the structure design of the diesel engine valve spring and its working performance, an artificial fish swarm-based immune genetic algorithm (AFS-IGA) is proposed. Af...
Improved and Feasible Access to Health Care Services throughIntegration of Mobile Technology and Big Data (Indian Context)
Abstract: Big Data is already changing the way business decisions are made, however, it is still early in thegame. Big data has the potential to increase the capacity and capabilities of conventional storage, repor...
A Survey Report on Distributed System Using Load Balancing Approach
Abstract:A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each process...