SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 8, Issue 4 (August 2013), PP.65-68
65
Visual Cryptography in Gray Scale Images
Archana B. Dhole1
, Prof. Nitin J. Janwe2
1,2
IIIrd Sem. M.Tech (C.S.E.) Department of Computer Science &Engg.
Abstract:- Visual Cryptography is a new Cryptography technique which is used to secure the images. In Visual
Cryptography the Image is divided into parts called shares and then they are distributed to the participants. The
Decryption side just stacking the share images gets the image. The initial model developed only for the bi-level
or binary images or monochrome images. Later it was advanced to suit for the Colour Images means Gray
Images and RGB/CMY Images. For the RGB/CMY Images different methods are developed based on the
colour decomposition techniques. Pixel expansion and the quality of the reconstructed secret image has been a
major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum
pixel expansion have been proposed for black and white (binary) secret images. This paper presents a (2, 2)-
VSS scheme for gray scale of the shadow images (transparent shares) is based on the bit plane coding.
I. INTRODUCTION
Visual cryptography is a cryptographic technique which allows visual information(e.g. printed text,
handwritten notes and pictures) to be encrypted in such a way that the decryption can be performed by the
human visual system, without the aid of computers. Naor and Shamir [1], in 1994 proposed a new security
technique named visual cryptography scheme. In this technique, a secret image of type binary is encoded in a
cryptographical manner into random binary patterns which contains n shares in a k-out-of-n scheme.
Previous efforts in visual cryptography were restricted to binary images which is insufficient in real
time applications. Chang-ChouLin, Wen-HsiangTsai proposed visual cryptography for gray level images by
dithering techniques. Instead of using gray sub pixels directly to constructed shares a dithering techniques is
used to convert gray level images.
A typical grayscale image
In photography and computing a grayscale or grayscale digital image is an image in which the value of
each pixel is a single sample that is it carries only intensity information. Images of this sort also known as black
and white are composed exclusively of shades of gray, varying from black at the weakest intensity to white at
the strongest.
The grayscale images are distinct from one-bit-bi-tonel black and white images, which in the context of
computer imaging are images with only the two colors, black and white images, which in the context of
computer imaging are images with only the two colors, black and white. Grayscale images have many shades of
gray in between. Grayscale images are also called monochromatic, denoting the presence of only one
(mono)color (chrome).
Grayscale images are often the result of measuring the intensity of light at each pixel in a single band
of electromagnetic spectrum and in such cases they are monochromatic proper when only a given frequency is
captured. But also they can be synthesized from a full color image.
In gray scale each pixel has 8 bits. Hence there are 0 to 255 intensity level are there. No matter what
pixel depth is used, the binary representations assume that 0 is black and the maximum value (255 at 8 bpp,
65,535 at 16 bpp, etc.) is white, if not otherwise noted.
This paper is well thorough-out as follows, Section II deals with the review of literature. Section III
described method of gray scale visual cryptography. And offers proposed scheme.Finally the conclusion of this
paper in Section IV.
II. LITERATURE SURVEY
Visual Cryptography in Gray Scale Images
66
A few researches have discussed the visual cryptography for grayscale and color images. Naor and
Shamir mentioned the extention of their scheme to grayscale images[Naor95]. That is, torepresent the graylevels
of the hidden image bycontrolling the way how the opaque subpixels ofthe sheets are stacked together. The
grayscaleversion of the visual cryptography is fundamentallyproposed in the paper.
There are some researches that deal with color images[Naor96, Koga98, E.R.V97, Rijme96].Naor and
Shamir discussed the visual cryptographyscheme which reconstructs a message withtwo colors, by arranging the
colored or transparen tsubpixels[Naor96]. Koga et al. deviseda lattice-based (k, n) scheme[Koga98]. The
approach by Verheul and van Tilborg[E.R.V97] isbasically similar to Koga’s. Both approaches assign
A color to a subpixel at a certain position,which means that displaying m colors uses m−1subpixels.
The resulting pixels contain one colored subpixel and the rest of the subpixels are black. Therefore the more
colors are used, theworse the contrast of the images becomes significantly.Their approaches cannot be applied
tothe extended visual cryptography, either. Rijmen and Preneel talked about enabling multicolors with relatively
less subpixels. However each sheets must containcolor random images, which means applying this approach to
the extended visual cryptography isimpossible.
In the paper Extended Visual Cryptography for Natural Images[2 ] proposed by Nakagima focuses on
the (2, 2) scheme and discussesthe method to deal with the natural images with intermediate graylevels. It also
shows howto enhance the contrast.
In 2002 Young-Chang Hou proposes a Visual cryptography [3]for color images. There have been
many published studies [1–10] of visual cryptography. Most of them, however, have concentrated on discussing
black-and-white images, and just few of them have proposed methods for processing gray-level and color
images. Rijmen and Preneel [8] have proposed a visual cryptography approach for color images. In their
approach, each pixel of the color secret image is expanded into a 2×2 block to form two sharing images. Each
2×2 block on the sharing image is Elled with red, green, blue and white (transparent), respectively, and hence no
clue about the secret image can be identified from any one of these two shares alone. Rijman and Preneel
claimed that there would be 24 possible combinations according to the permutation of the fou2.3. Gray-level
visual cryptography.Since most printers have to transform gray-level images into halftone ones before printing,
and the transformed halftone images are black-and-white only, such an image format is very suitable for the
traditional method to generate the shares of visual cryptography. So in this paper, use transformed halftone
images to generate the visualcryptography for gray-level images. The algorithm is asfollows:
1. Transform the gray-level image into a black-and-whitehalftone image.
2. For each black or white pixel in the halftone image, decompose it into a 2×2 block of the two transparencies
In the paper of Visual Secret Sharing Scheme using Grayscale Images By Sandeep Katta [7] in 2012
proposes a probabilistic 2-out-of-3 visual secret sharing scheme for grayscale images and gives a high quality
images that of perfect (original) quality to be reconstructed. Here currently investigating to modify the grayscale
secret sharing scheme in to most efficient way. In this scheme the quality of the image is maintained perfectly
without any loss of generality but the size of the shadow is increased drastically, which represents the pixel
expansion problem.
Secret sharing techniques belong to the larger area of information hiding that includes watermarking
[1]-[8]. In secret sharing, random looking shares when brought together recreate the secret. In recursive secret
sharing, the shares themselves have components defined at a lower recursive level [3]-[6]. The injection of the
random bits in the shares may be done conveniently using d-sequences [9]-[11] or other random sequences.
A grayscale image is an image in which the value of each single pixel is a sample, that is, it carries only
intensity information. The darkest possible shade is black, which is the total absence of transmitted or reflected
light and the lightest possible shade is white.
According to their physical characteristics, different media use different ways to represent the color
level of images. The computer screen uses the electric current to control lightness of the pixels. The diversity of
the lightness generates different color levels. The general printer, such as 2dot matrix printers, laser printers, and
jet printers can only control a single pixel to be printed (black pixel) or not to be printed (white pixel), instead of
displaying the gray level. As such, the way to represent the gray level of images is to use the density of printed
dots. The method that uses the density of the net dots to simulate the gray level is called “halftone” and
transforms an image with gray level into a binary image before processing. Every pixel of the transformed
halftone image has only two possible color levels (black or white). Because human eyes cannot identify too tiny
printed dots and, when viewing a dot, tend to cover its nearby dots, we can simulate different gray levels
through the density of printed dots, even though the transformed image actually has only two colors – black and
white.
In the paper Boolean XOR Based (K,N) Threshold Visual Cryptography for Grayscale Images by Ram
Krishna proposed a VisualCryptography Scheme based on image division of grey level images for the
generation of Secret Shares. In this paper werepresent the (k, n) Threshold Visual Cryptography Scheme in
Visual Cryptography in Gray Scale Images
67
which the size of generated Shares as well as RecoveredImage have same as the Secret Image rather than other
VCS where k is the threshold value. Also we proposed the newtechnique to generate the Shadow Assignment
Matrix with the help of Genetic Algorithm (GA).
In New Algorithm For Halftone Image Visual Cryptography[9] byTalalMousaAlkharobi,King Fahd
University of Pet. & Min. proposeses schemes are for gray scale image and by stacking the shares; the resultant
image achieved in same size with original secret image. We used randomization and pixel reversal approach in
all methods.
Based on our observation that proposed algorithm could not give perfect meaningless shares in case of
the dark or high contrast secret image, we have added preprocessing elements to change the dark or high level
of gray image into lighter one (called preprocessed image or halftone image). This is to be done before
giving input secret image to proposed algorithm. We define two way of preprocessing of the input image as
follows: We change the pixel values to white (255) on the bases of the position of the pixel. We use odd and
even combination of the pixel values in the matrix as follows:
Method 1: If i=j=odd and i=j=even
pixel (i, j) = 255
Method 2: if i=odd & j=even OR i=even & j=odd
pixel (i, j) = 255.
III PROPOSED SCHEME
The gray scale image is first decomposed into 8 bit binary codes by using bit planes that are equivalent
to 8 binary images. A bit plane of a digital discrete signal is a set of bits corresponding to a given bit position in
each of the binary numbers representing the signal. For example for 16 bit data representation there are 16 bit
planes: the first bit plane contains the set of the most significant bit and the 16th
contains. It gives better
approximation.
Bit
Plane
Value Contribution Running
Total
1st
1 1*2 ^7=128 128
2nd
0 0*2 ^ 6=0 128
3rd
1 1*2 ^ 5 =32 160
4th
1 1*2 ^4=16 176
5th
0 0*2 ^ 3=0 17
6th
1 1*2 ^ 2=4 180
7th
0 0*2 ^ 1=0 180
8th
1 1*2 ^ 0=1 181
Applied the VCS to each bit plane in order to get n random looking binary images. By stacking the
corresponding binary images in bit level, the gray-scale noisy shares can be generated.
 S(𝑖,𝑗) =𝑆𝑏1 (𝑖,𝑗).2 𝑁−1
+𝑆𝑏2(𝑖,𝑗) .2 𝑁−2
+⋯……...+𝑆𝑏( 𝑁−1)
𝑖,𝑗 .2 +𝑆𝑏8( 𝑖,𝑗) -----(1)
 We consider a w × h grayscale secret image (denoted as S) with 8 bits per pixel. A single pixel
value S (i, j) with 8 bits image can be represented in a binary form using Eq.(l). Grayscale image is
decomposed into its 8 1-bit plane and every bit plane is a binary image containing a level of
information. S 𝑖,𝑗 =𝑆𝑏1 𝑖,𝑗.2𝑁−1+𝑆𝑏2 𝑖,𝑗 .2𝑁−2+⋯ ….+𝑆𝑏(𝑁−1) 𝑖,𝑗 .2 +𝑆𝑏8 𝑖,𝑗 (1) Here, S bi (i, j)
represents the pixel value in location (i, j) in i-thbit plane of each channel, and Sbl(i, j) is the most
significant bit plane. Therefore, a channel can be divided into N binary images using Eq.(l). Then,
Visual Cryptography in Gray Scale Images
68
every pixel of all the binary images generated from the bit plane is expanded into a 2× 2 block to which
a black or white color is assigned according to the model presented in Fig. 1. Every block of the
sharing images therefore includes two white pixels and two black pixels so that the entropy reaches its
maximum to conceal the content of the secret image. The (k-n) threshold VCS can be expressed in the
form of equation (2).
 𝑆1,𝑆2,𝑆3,...𝑆𝑛 ∈𝑆0,𝑃𝑖𝑗=0 𝐹𝑉𝐶𝑆 𝑃𝑖𝑗 = (2) 𝑆1,𝑆2,𝑆3….𝑆𝑛 ∈𝑆0,𝑃𝑖𝑗=1 Where, S0 = {all the matrices
obtained by permuting the columns of basis matrix B0, which meets the requirement in Definition I}
Algorithm (M, n)
1. Take a gray scale image M.
2. Separate the bit planes of that gray scale image ( shade image) into n bit plane where n is the number of
bits to represent a pixel.
3. Apply the gray code method to bit plane.
 For gray scale image the first part is just initialization phase.
 Apply bit plane coding to form eight binary images.
 Then application of visual cryptography to all image bits.
 Then combining all the bits to form the actual image and
 Finally display the image.
IV. CONCLUSIONS
This paper presents an improved bit plane coding algorithm for gray scale image for applying visual
cryptography scheme.A bit plane of an image is a binary image that carries visual information of original
images so as to retain the original pixel values the same before and after encryption. In visual cryptography if a
person gets sufficient k number of shares; the image can be easily decrypted. This paper develops an encryption
method to construct grayscale VC scheme with using bit plane encoding .
REFERENCES
[1]. M. Noar and A. Shamir, "Visual cryptography," Advances in Cryptology - EUROCRYPT'94, pp. 1-12,
1995.
[2]. Mizuho Nakajima and Yasushi Yamaguchi, “Extended Visual Cryptography for Natural Images”
[3]. Young-Chang Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, No. 7, pp.
1619-1629, 2003.
[4]. Z. Zhou, G.R. Arce and G. Crescenzo, "Halftone visual cryptography," IEEE Transactions on Image
Processing, Vol. 15, No. 8, pp. 2441-2453, 2006.
[5]. Inkookang, G.R. Arce, and H.K. Lee, "Color Extended Visual Cryptography using Error Diffusion,"
2009.
[6]. Chandramati S., Ramesh Kumar R. , Suresh R. and Harish S., “ An overview of visual cryptography”
issue 2010.
[7]. SandeepKatta,“Visual Secret Sharing Scheme using Grayscale Images”, 2012.
[8]. Ram Krishna Jha1 &AbhijitMustafi 2, “Boolean XOR Based (K,N) Threshold Visual Cryptography for
Grayscale Images,” 2012.
[9]. TalalMousaAlkharobi, “New Algorithm For Halftone Image Visual Cryptography,” 2012.
[10]. T.Rajitha, Prof P.Pradeep Kumar, V.Laxmi in August 2012,”Construction of Extended Visual
Cryptography Schemefor Secret Sharing.”

Más contenido relacionado

La actualidad más candente

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Visual hull construction from semitransparent coloured silhouettes
Visual hull construction from semitransparent coloured silhouettesVisual hull construction from semitransparent coloured silhouettes
Visual hull construction from semitransparent coloured silhouettesijcga
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Обучение нейросетей компьютерного зрения в видеоиграх
Обучение нейросетей компьютерного зрения в видеоиграхОбучение нейросетей компьютерного зрения в видеоиграх
Обучение нейросетей компьютерного зрения в видеоиграхAnatol Alizar
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes  Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes ijcga
 
Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes  Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes ijcga
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Обучение нейросети машинного зрения в видеоиграх
Обучение нейросети машинного зрения в видеоиграхОбучение нейросети машинного зрения в видеоиграх
Обучение нейросети машинного зрения в видеоиграхAnatol Alizar
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
 
improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...INFOGAIN PUBLICATION
 

La actualidad más candente (18)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Visual hull construction from semitransparent coloured silhouettes
Visual hull construction from semitransparent coloured silhouettesVisual hull construction from semitransparent coloured silhouettes
Visual hull construction from semitransparent coloured silhouettes
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Обучение нейросетей компьютерного зрения в видеоиграх
Обучение нейросетей компьютерного зрения в видеоиграхОбучение нейросетей компьютерного зрения в видеоиграх
Обучение нейросетей компьютерного зрения в видеоиграх
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes  Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes
 
Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes  Visual Hull Construction from Semitransparent Coloured Silhouettes
Visual Hull Construction from Semitransparent Coloured Silhouettes
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Обучение нейросети машинного зрения в видеоиграх
Обучение нейросети машинного зрения в видеоиграхОбучение нейросети машинного зрения в видеоиграх
Обучение нейросети машинного зрения в видеоиграх
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Ba34321326
Ba34321326Ba34321326
Ba34321326
 
improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...improving differently illuminant images with fuzzy membership based saturatio...
improving differently illuminant images with fuzzy membership based saturatio...
 

Destacado

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Destacado (7)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI), International Journal of Engineering Inventions (IJEI),
International Journal of Engineering Inventions (IJEI),
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Similar a International Journal of Engineering Research and Development (IJERD)

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Synthetic aperture radar images
Synthetic aperture radar imagesSynthetic aperture radar images
Synthetic aperture radar imagessipij
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr spaceIJECEIAES
 
Visual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingVisual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingIRJET Journal
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute Peoplepaperpublications3
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 

Similar a International Journal of Engineering Research and Development (IJERD) (20)

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
J017335863
J017335863J017335863
J017335863
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
F42022628
F42022628F42022628
F42022628
 
Synthetic aperture radar images
Synthetic aperture radar imagesSynthetic aperture radar images
Synthetic aperture radar images
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
Visual Cryptography using Image Thresholding
Visual Cryptography using Image ThresholdingVisual Cryptography using Image Thresholding
Visual Cryptography using Image Thresholding
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
 
Sub1586
Sub1586Sub1586
Sub1586
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdfStripovizijacom
 
A Selection of Tim Walsh's Recent Paintings
A Selection of Tim Walsh's  Recent PaintingsA Selection of Tim Walsh's  Recent Paintings
A Selection of Tim Walsh's Recent PaintingsTim Walsh
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiMalviyaNagarCallGirl
 
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call GirlJvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girllijeho2176
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxLauraFagan6
 
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Availabledollysharma2066
 
FULL ENJOY -9953040155 Call Girls In Aiims Metro
FULL ENJOY -9953040155 Call Girls In Aiims MetroFULL ENJOY -9953040155 Call Girls In Aiims Metro
FULL ENJOY -9953040155 Call Girls In Aiims MetroMalviyaNagarCallGirl
 
UNIT 5-6 anh văn chuyên nganhhhhhhh.docx
UNIT 5-6 anh văn chuyên nganhhhhhhh.docxUNIT 5-6 anh văn chuyên nganhhhhhhh.docx
UNIT 5-6 anh văn chuyên nganhhhhhhh.docxssuser519b4b
 
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call GirlsHauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi NcrSapana Sha
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfStripovizijacom
 
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girls
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call GirlsDilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girls
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Benjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work SlideshowBenjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work Slideshowssuser971f6c
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiMalviyaNagarCallGirl
 
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp Anytime
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp AnytimeRussian Call Girls Delhi NCR 9999965857 Call or WhatsApp Anytime
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp AnytimeKomal Khan
 
Kalkaji Call Girls : ☎ 8527673949, Low rate Call Girls
Kalkaji Call Girls : ☎ 8527673949, Low rate Call GirlsKalkaji Call Girls : ☎ 8527673949, Low rate Call Girls
Kalkaji Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call GirlsGurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girlsashishs7044
 
Kristy Soto's Industrial design Portfolio
Kristy Soto's Industrial design PortfolioKristy Soto's Industrial design Portfolio
Kristy Soto's Industrial design PortfolioKristySoto
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Servicedoor45step
 
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call Girl
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call GirlDxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call Girl
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call GirlYinisingh
 

Último (20)

Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdf
 
A Selection of Tim Walsh's Recent Paintings
A Selection of Tim Walsh's  Recent PaintingsA Selection of Tim Walsh's  Recent Paintings
A Selection of Tim Walsh's Recent Paintings
 
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | DelhiFULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
FULL ENJOY - 9953040155 Call Girls in Gandhi Vihar | Delhi
 
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call GirlJvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
Jvc Call Girl +971528604116 Indian Call Girl in Jvc By Dubai Call Girl
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptx
 
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
8377087607, Door Step Call Girls In Gaur City (NOIDA) 24/7 Available
 
FULL ENJOY -9953040155 Call Girls In Aiims Metro
FULL ENJOY -9953040155 Call Girls In Aiims MetroFULL ENJOY -9953040155 Call Girls In Aiims Metro
FULL ENJOY -9953040155 Call Girls In Aiims Metro
 
UNIT 5-6 anh văn chuyên nganhhhhhhh.docx
UNIT 5-6 anh văn chuyên nganhhhhhhh.docxUNIT 5-6 anh văn chuyên nganhhhhhhh.docx
UNIT 5-6 anh văn chuyên nganhhhhhhh.docx
 
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call GirlsHauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
Hauz Khas Call Girls : ☎ 8527673949, Low rate Call Girls
 
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
9654467111 Full Enjoy @24/7 Call Girls In Saket Delhi Ncr
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
 
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girls
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call GirlsDilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girls
Dilshad Garden Call Girls : ☎ 8527673949, Low rate Call Girls
 
Benjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work SlideshowBenjamin Portfolio Process Work Slideshow
Benjamin Portfolio Process Work Slideshow
 
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | DelhiFULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
FULL ENJOY - 9953040155 Call Girls in Dwarka Mor | Delhi
 
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp Anytime
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp AnytimeRussian Call Girls Delhi NCR 9999965857 Call or WhatsApp Anytime
Russian Call Girls Delhi NCR 9999965857 Call or WhatsApp Anytime
 
Kalkaji Call Girls : ☎ 8527673949, Low rate Call Girls
Kalkaji Call Girls : ☎ 8527673949, Low rate Call GirlsKalkaji Call Girls : ☎ 8527673949, Low rate Call Girls
Kalkaji Call Girls : ☎ 8527673949, Low rate Call Girls
 
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call GirlsGurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
Gurgaon Call Girls : ☎ 8527673949, Low rate Call Girls
 
Kristy Soto's Industrial design Portfolio
Kristy Soto's Industrial design PortfolioKristy Soto's Industrial design Portfolio
Kristy Soto's Industrial design Portfolio
 
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts ServiceIndian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
Indian High Profile Call Girls In Sector 18 Noida 8375860717 Escorts Service
 
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call Girl
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call GirlDxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call Girl
Dxb Call Girl +971509430017 Indian Call Girl in Dxb By Dubai Call Girl
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 8, Issue 4 (August 2013), PP.65-68 65 Visual Cryptography in Gray Scale Images Archana B. Dhole1 , Prof. Nitin J. Janwe2 1,2 IIIrd Sem. M.Tech (C.S.E.) Department of Computer Science &Engg. Abstract:- Visual Cryptography is a new Cryptography technique which is used to secure the images. In Visual Cryptography the Image is divided into parts called shares and then they are distributed to the participants. The Decryption side just stacking the share images gets the image. The initial model developed only for the bi-level or binary images or monochrome images. Later it was advanced to suit for the Colour Images means Gray Images and RGB/CMY Images. For the RGB/CMY Images different methods are developed based on the colour decomposition techniques. Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a (2, 2)- VSS scheme for gray scale of the shadow images (transparent shares) is based on the bit plane coding. I. INTRODUCTION Visual cryptography is a cryptographic technique which allows visual information(e.g. printed text, handwritten notes and pictures) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Naor and Shamir [1], in 1994 proposed a new security technique named visual cryptography scheme. In this technique, a secret image of type binary is encoded in a cryptographical manner into random binary patterns which contains n shares in a k-out-of-n scheme. Previous efforts in visual cryptography were restricted to binary images which is insufficient in real time applications. Chang-ChouLin, Wen-HsiangTsai proposed visual cryptography for gray level images by dithering techniques. Instead of using gray sub pixels directly to constructed shares a dithering techniques is used to convert gray level images. A typical grayscale image In photography and computing a grayscale or grayscale digital image is an image in which the value of each pixel is a single sample that is it carries only intensity information. Images of this sort also known as black and white are composed exclusively of shades of gray, varying from black at the weakest intensity to white at the strongest. The grayscale images are distinct from one-bit-bi-tonel black and white images, which in the context of computer imaging are images with only the two colors, black and white images, which in the context of computer imaging are images with only the two colors, black and white. Grayscale images have many shades of gray in between. Grayscale images are also called monochromatic, denoting the presence of only one (mono)color (chrome). Grayscale images are often the result of measuring the intensity of light at each pixel in a single band of electromagnetic spectrum and in such cases they are monochromatic proper when only a given frequency is captured. But also they can be synthesized from a full color image. In gray scale each pixel has 8 bits. Hence there are 0 to 255 intensity level are there. No matter what pixel depth is used, the binary representations assume that 0 is black and the maximum value (255 at 8 bpp, 65,535 at 16 bpp, etc.) is white, if not otherwise noted. This paper is well thorough-out as follows, Section II deals with the review of literature. Section III described method of gray scale visual cryptography. And offers proposed scheme.Finally the conclusion of this paper in Section IV. II. LITERATURE SURVEY
  • 2. Visual Cryptography in Gray Scale Images 66 A few researches have discussed the visual cryptography for grayscale and color images. Naor and Shamir mentioned the extention of their scheme to grayscale images[Naor95]. That is, torepresent the graylevels of the hidden image bycontrolling the way how the opaque subpixels ofthe sheets are stacked together. The grayscaleversion of the visual cryptography is fundamentallyproposed in the paper. There are some researches that deal with color images[Naor96, Koga98, E.R.V97, Rijme96].Naor and Shamir discussed the visual cryptographyscheme which reconstructs a message withtwo colors, by arranging the colored or transparen tsubpixels[Naor96]. Koga et al. deviseda lattice-based (k, n) scheme[Koga98]. The approach by Verheul and van Tilborg[E.R.V97] isbasically similar to Koga’s. Both approaches assign A color to a subpixel at a certain position,which means that displaying m colors uses m−1subpixels. The resulting pixels contain one colored subpixel and the rest of the subpixels are black. Therefore the more colors are used, theworse the contrast of the images becomes significantly.Their approaches cannot be applied tothe extended visual cryptography, either. Rijmen and Preneel talked about enabling multicolors with relatively less subpixels. However each sheets must containcolor random images, which means applying this approach to the extended visual cryptography isimpossible. In the paper Extended Visual Cryptography for Natural Images[2 ] proposed by Nakagima focuses on the (2, 2) scheme and discussesthe method to deal with the natural images with intermediate graylevels. It also shows howto enhance the contrast. In 2002 Young-Chang Hou proposes a Visual cryptography [3]for color images. There have been many published studies [1–10] of visual cryptography. Most of them, however, have concentrated on discussing black-and-white images, and just few of them have proposed methods for processing gray-level and color images. Rijmen and Preneel [8] have proposed a visual cryptography approach for color images. In their approach, each pixel of the color secret image is expanded into a 2×2 block to form two sharing images. Each 2×2 block on the sharing image is Elled with red, green, blue and white (transparent), respectively, and hence no clue about the secret image can be identified from any one of these two shares alone. Rijman and Preneel claimed that there would be 24 possible combinations according to the permutation of the fou2.3. Gray-level visual cryptography.Since most printers have to transform gray-level images into halftone ones before printing, and the transformed halftone images are black-and-white only, such an image format is very suitable for the traditional method to generate the shares of visual cryptography. So in this paper, use transformed halftone images to generate the visualcryptography for gray-level images. The algorithm is asfollows: 1. Transform the gray-level image into a black-and-whitehalftone image. 2. For each black or white pixel in the halftone image, decompose it into a 2×2 block of the two transparencies In the paper of Visual Secret Sharing Scheme using Grayscale Images By Sandeep Katta [7] in 2012 proposes a probabilistic 2-out-of-3 visual secret sharing scheme for grayscale images and gives a high quality images that of perfect (original) quality to be reconstructed. Here currently investigating to modify the grayscale secret sharing scheme in to most efficient way. In this scheme the quality of the image is maintained perfectly without any loss of generality but the size of the shadow is increased drastically, which represents the pixel expansion problem. Secret sharing techniques belong to the larger area of information hiding that includes watermarking [1]-[8]. In secret sharing, random looking shares when brought together recreate the secret. In recursive secret sharing, the shares themselves have components defined at a lower recursive level [3]-[6]. The injection of the random bits in the shares may be done conveniently using d-sequences [9]-[11] or other random sequences. A grayscale image is an image in which the value of each single pixel is a sample, that is, it carries only intensity information. The darkest possible shade is black, which is the total absence of transmitted or reflected light and the lightest possible shade is white. According to their physical characteristics, different media use different ways to represent the color level of images. The computer screen uses the electric current to control lightness of the pixels. The diversity of the lightness generates different color levels. The general printer, such as 2dot matrix printers, laser printers, and jet printers can only control a single pixel to be printed (black pixel) or not to be printed (white pixel), instead of displaying the gray level. As such, the way to represent the gray level of images is to use the density of printed dots. The method that uses the density of the net dots to simulate the gray level is called “halftone” and transforms an image with gray level into a binary image before processing. Every pixel of the transformed halftone image has only two possible color levels (black or white). Because human eyes cannot identify too tiny printed dots and, when viewing a dot, tend to cover its nearby dots, we can simulate different gray levels through the density of printed dots, even though the transformed image actually has only two colors – black and white. In the paper Boolean XOR Based (K,N) Threshold Visual Cryptography for Grayscale Images by Ram Krishna proposed a VisualCryptography Scheme based on image division of grey level images for the generation of Secret Shares. In this paper werepresent the (k, n) Threshold Visual Cryptography Scheme in
  • 3. Visual Cryptography in Gray Scale Images 67 which the size of generated Shares as well as RecoveredImage have same as the Secret Image rather than other VCS where k is the threshold value. Also we proposed the newtechnique to generate the Shadow Assignment Matrix with the help of Genetic Algorithm (GA). In New Algorithm For Halftone Image Visual Cryptography[9] byTalalMousaAlkharobi,King Fahd University of Pet. & Min. proposeses schemes are for gray scale image and by stacking the shares; the resultant image achieved in same size with original secret image. We used randomization and pixel reversal approach in all methods. Based on our observation that proposed algorithm could not give perfect meaningless shares in case of the dark or high contrast secret image, we have added preprocessing elements to change the dark or high level of gray image into lighter one (called preprocessed image or halftone image). This is to be done before giving input secret image to proposed algorithm. We define two way of preprocessing of the input image as follows: We change the pixel values to white (255) on the bases of the position of the pixel. We use odd and even combination of the pixel values in the matrix as follows: Method 1: If i=j=odd and i=j=even pixel (i, j) = 255 Method 2: if i=odd & j=even OR i=even & j=odd pixel (i, j) = 255. III PROPOSED SCHEME The gray scale image is first decomposed into 8 bit binary codes by using bit planes that are equivalent to 8 binary images. A bit plane of a digital discrete signal is a set of bits corresponding to a given bit position in each of the binary numbers representing the signal. For example for 16 bit data representation there are 16 bit planes: the first bit plane contains the set of the most significant bit and the 16th contains. It gives better approximation. Bit Plane Value Contribution Running Total 1st 1 1*2 ^7=128 128 2nd 0 0*2 ^ 6=0 128 3rd 1 1*2 ^ 5 =32 160 4th 1 1*2 ^4=16 176 5th 0 0*2 ^ 3=0 17 6th 1 1*2 ^ 2=4 180 7th 0 0*2 ^ 1=0 180 8th 1 1*2 ^ 0=1 181 Applied the VCS to each bit plane in order to get n random looking binary images. By stacking the corresponding binary images in bit level, the gray-scale noisy shares can be generated.  S(𝑖,𝑗) =𝑆𝑏1 (𝑖,𝑗).2 𝑁−1 +𝑆𝑏2(𝑖,𝑗) .2 𝑁−2 +⋯……...+𝑆𝑏( 𝑁−1) 𝑖,𝑗 .2 +𝑆𝑏8( 𝑖,𝑗) -----(1)  We consider a w × h grayscale secret image (denoted as S) with 8 bits per pixel. A single pixel value S (i, j) with 8 bits image can be represented in a binary form using Eq.(l). Grayscale image is decomposed into its 8 1-bit plane and every bit plane is a binary image containing a level of information. S 𝑖,𝑗 =𝑆𝑏1 𝑖,𝑗.2𝑁−1+𝑆𝑏2 𝑖,𝑗 .2𝑁−2+⋯ ….+𝑆𝑏(𝑁−1) 𝑖,𝑗 .2 +𝑆𝑏8 𝑖,𝑗 (1) Here, S bi (i, j) represents the pixel value in location (i, j) in i-thbit plane of each channel, and Sbl(i, j) is the most significant bit plane. Therefore, a channel can be divided into N binary images using Eq.(l). Then,
  • 4. Visual Cryptography in Gray Scale Images 68 every pixel of all the binary images generated from the bit plane is expanded into a 2× 2 block to which a black or white color is assigned according to the model presented in Fig. 1. Every block of the sharing images therefore includes two white pixels and two black pixels so that the entropy reaches its maximum to conceal the content of the secret image. The (k-n) threshold VCS can be expressed in the form of equation (2).  𝑆1,𝑆2,𝑆3,...𝑆𝑛 ∈𝑆0,𝑃𝑖𝑗=0 𝐹𝑉𝐶𝑆 𝑃𝑖𝑗 = (2) 𝑆1,𝑆2,𝑆3….𝑆𝑛 ∈𝑆0,𝑃𝑖𝑗=1 Where, S0 = {all the matrices obtained by permuting the columns of basis matrix B0, which meets the requirement in Definition I} Algorithm (M, n) 1. Take a gray scale image M. 2. Separate the bit planes of that gray scale image ( shade image) into n bit plane where n is the number of bits to represent a pixel. 3. Apply the gray code method to bit plane.  For gray scale image the first part is just initialization phase.  Apply bit plane coding to form eight binary images.  Then application of visual cryptography to all image bits.  Then combining all the bits to form the actual image and  Finally display the image. IV. CONCLUSIONS This paper presents an improved bit plane coding algorithm for gray scale image for applying visual cryptography scheme.A bit plane of an image is a binary image that carries visual information of original images so as to retain the original pixel values the same before and after encryption. In visual cryptography if a person gets sufficient k number of shares; the image can be easily decrypted. This paper develops an encryption method to construct grayscale VC scheme with using bit plane encoding . REFERENCES [1]. M. Noar and A. Shamir, "Visual cryptography," Advances in Cryptology - EUROCRYPT'94, pp. 1-12, 1995. [2]. Mizuho Nakajima and Yasushi Yamaguchi, “Extended Visual Cryptography for Natural Images” [3]. Young-Chang Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, No. 7, pp. 1619-1629, 2003. [4]. Z. Zhou, G.R. Arce and G. Crescenzo, "Halftone visual cryptography," IEEE Transactions on Image Processing, Vol. 15, No. 8, pp. 2441-2453, 2006. [5]. Inkookang, G.R. Arce, and H.K. Lee, "Color Extended Visual Cryptography using Error Diffusion," 2009. [6]. Chandramati S., Ramesh Kumar R. , Suresh R. and Harish S., “ An overview of visual cryptography” issue 2010. [7]. SandeepKatta,“Visual Secret Sharing Scheme using Grayscale Images”, 2012. [8]. Ram Krishna Jha1 &AbhijitMustafi 2, “Boolean XOR Based (K,N) Threshold Visual Cryptography for Grayscale Images,” 2012. [9]. TalalMousaAlkharobi, “New Algorithm For Halftone Image Visual Cryptography,” 2012. [10]. T.Rajitha, Prof P.Pradeep Kumar, V.Laxmi in August 2012,”Construction of Extended Visual Cryptography Schemefor Secret Sharing.”