Securing and Secrete Image Sharing Using Visual Cryptography Scheme
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 1
Abstract
To verify identity of person his /her physical or behavioural characteristics can be use,this strategy is called as Biometrics. Preservation of privacy of digital biometric data such as iris,face images etc. which stored in central database becomes more essential. This paper introduced the new visual cryptographic technique that allows encryption of visual information such that decryption can perform using human visual system hence cryptography computation does not required any extra hardware and software. In visual cryptography secrete image is encrypted into number of shares which independently can not reveal information about original image. For getting information about original image all sheets must be available simultaneously.
Authors and Affiliations
Rupali Lambe, Mayuri Ghadge, Tai Ingole, Pratiksha Surwase
A Review on Speech Emotion Recognition Using Machine Learning
This paper focuses on the development of a robust speech emotion recognition system using a combination of different speech features with feature optimization techniques and speech de-noising technique to acquire improve...
A Brief Study on Web Technology
Technology has advanced at a rapid and efficient pace in recent years. Web technology is one of the technologies that allow computers to communicate with one another by using markup languages and multimedia applications....
Study of Challenges, Impact and Solutions in Sustainable Project Management for Green Construction
In recent years, India has seen an explosion in the environmentally conscious construction industry. Despite the widespread call for greener buildings to reduce their environmental impact, studies evaluating their effect...
Analysis of Routing Tag and Fault Tolerance of Proposed Triangle Network in the Presence of Faults
Routing tag provides the algorithm to pass the data from source to destination in a network. In this paper Fault Tolerance of the proposed MIN Triangle has been analysed . All the path lengths available from source to de...
Seismic Protection with Base Isolation Method Using ETABS
Base isolation is one of the most promising alternatives among the structure control methods. In recent decades, base isolation has been seriously considered for civil structures, such as buildings and bridges, subjected...