Essay Examples on Wyoming Technical Institute

Visual cryptography plays a very crucial role for security of image based Secret

Visual Cryptography based Gray Share Generation Department of Computer Science Asst Professor Dept of Computer Science Institute of Engineering Institute of Engineering And Technology Kalady And Technology Kalady Abstract Visual cryptography plays a very crucial role for security of image based secret Visual cryptography encrypts the image in to shares and in decryption process all shares are stacked together to reveal the secret image This paper proposing a new scheme for color share generation In this scheme R G and B component is extracted from color image then apply gray share generation algorithm on R component and make n number of R gray shares then all shares are combine with B and G component to make color shares At decryption side B and G component is extracted from all shares and then combine all r gray share to make r component and after that all R G and B is combined to revealed the secret image Decrypted secret image has same size as original secret image Keywords Visual cryptography color image pixel expansion secret image hierarchical visual cryptography share I INTRODUCTION Data security is very important because most of our data is travelled over internet Many techniques have been proposed and developed for security of our data Secret data will be in the form of text image audio video etc Visual cryptography plays a important role for image security In this technique image is encrypted in to number of shares and at decryption side all or some of the shares are overlapped with each other to reveal the secret image 



2 pages | 520 words
Save