90 likes | 420 Views
This paper discusses a random-grid-based non expanded visual cryptography scheme for generating both meaningful and noise-like shares. First, the distribution of black pixels on the share images and the stack image is analyzed. A probability allocation method is then proposed that is capable of producing the best contrast in both the share images and the stack image. Contact Us 91 98406 78906, 91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple), X41, 5th Floor, 2nd avenue, Anna Nagar,Chennai-40
E N D
Two Step Share Synthesized Image Stamper Algorithm for Secure Visual Sharing IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 5, MAY 2014 “Random-Grid-Based Visual Cryptography Schemes”.
A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional VenkatesanPrabu .J MANAGING DIRECTOR Microsoft Web Developer Advisory Council team member and a well known Microsoft Most Valuable Professional (MVP) for the year 2008, 2009, 2010,2011,2012,2013 ,2014. LakshmiNarayanan.J GENERAL MANAGER BlackBerry Server Admin. Oracle 10g SQL Expert. Arunachalam.J Electronic Architect Human Resourse Manager
Abstract • This paper discusses a random-grid-based non expanded visual cryptography scheme for generating both meaningful\ and noise-like shares. First, the distribution of black pixels on the share images and the stack image is analyzed. • A probability allocation method is then proposed that is capable of producing the best contrast in both the share images and the stack image. • With our method, not only can different cover images be used to hide the secret image, but the contrast can be adjusted as needed. The most important result is the improvement of the visual quality of both the share images and the stack image to their theoretical maximum. • Our meaningful visual secret sharing method is shown in experiments to be superior to past methods.
Existing System • In the Existing system, the GAS Solver will take care of estimating the number of shares and the division of the pixels among the users as appropriate shares. • To avoid complication on the shares due to noise in the share and lack of clarity on the image. Our Visual Extended cryptography scheme incorporates a known image on the share to distinctly identify the share. • In addition, this option will overcome pixel expansion too. The step of pasting or stamping an image over the image is the second step in the process. • Additional advantages includes the recognition of the shares by the synthesizer. • This system will react differently based on the number of shares and merging of different shares and the content of the image will be taken by an automatic decipher concept amended with de-wrapping on the stamping layer.
Proposed System • Our Proposed system involves an automatic segregator of images which is a two step process of converting any images into the required Visual cryptography formatted images (Converting the mode of the image and size of the image). • After getting the exact image, the images will be bifurcated into various shares depends on the access structure. • In our project, we have a secret image which needs to be encode into N shares printed on transparencies. Option of providing decision of the number of shares to the user is the new feature introduced. • The shares of the images appear random and contain no decipherable information's about the underlying secret image. Still,, if any 2 or more (Based on access structure) of the shares are stacked on top of one another the secret image becomes decipherable by the human eye. • Once the shares were taken the shares needs to be stamped with the help of “Block-Based Transformation Algorithm”. So that, a clear picture of segregating the images based on the a viewable identifiers. • Our project involves two step process of removing the stamp and de-cipher the logic behind the share spread and everything will be decided based on the underlying access structure. • Enhancing the clarity of the image before processing for shares and after stamping is an important feature and provides added advantage while extracting and deciphering. • The secret shared images will be stored in the database
System Requirements • Software Requirements: Platform : DOTNET 4.0 Front End Tools : Visual Studio 2010 Back End Database : SQL Server 2008 • Hardware Requirements: Processor : Core 2 duo Speed : 2.2GHZ RAM : 2GB Hard Disk : 160GB
Records Breaks Asia Book Of Records Tamil Nadu Of Records India Of Records MVP Awards World Record
Services: A Software /Manufacturing Research Company Run By Microsoft Most Valuable Professional Inplant Training. Internship. Workshop’s. Final Year Project’s. Industrial Visit. Contact Us: +91 98406 78906,+91 90037 18877 kaashiv.info@gmail.com www.kaashivinfotech.com Shivanantha Building (Second building to Ayyappan Temple),X41, 5th Floor, 2nd avenue,Anna Nagar,Chennai-40.