Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


Tags: DIFFUSION, ERROR, USING, CRYPTOGRAPHY, VISUAL, EXTENDED, COLOR, COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION,
 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION
Post: #1

COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION



ABSTRACT:
Color visual cryptography (VC) encrypts a color secret message into color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures.
Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.
This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.
VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Post: #2
Color Extended Visual Cryptography Using Error Diffusion


.pdf  1Color Extended Visual.pdf (Size: 5.98 MB / Downloads: 411)

Abstract

Some methods for color visual cryptography are not satisfactory
in terms of producing either meaningless shares or meaningful
shares with low visual quality, leading to suspicion of encryption.
This paper introduces the concept of visual information pixel
(VIP) synchronization and error diffusion to attain a color visual
cryptography encryption method that produces meaningful color
shares with high visual quality. VIP synchronization retains the
positions of pixels carrying visual information of original images
throughout the color channels and error diffusion generates shares
pleasant to human eyes. Comparisons with previous approaches
show the superior performance of the new method.

INTRODUCTION

VISUAL CRYPTOGRAPHY (VC) is a type of secret
sharing scheme introduced by Naor and Shamir [1]. In
a -out-of- scheme of VC, a secret binary image is cryptographically
encoded into shares of random binary patterns.
The shares are xeroxed onto transparencies, respectively,
and distributed amongst participants, one for each participant.
No participant knows the share given to another participant.
Any or more participants can visually reveal the secret image
by superimposing any transparencies together. The secret
cannot be decoded by any or fewer participants, even if
infinite computational power is available to them.

COLOR VC ENCRYPTION BASED UPON PIXEL
SYNCHRONIZATION AND ERROR DIFFUSION


In this section, we describe the encryption method for color
meaningful shares with a VIP synchronization and error diffusion.
First, we describe the VC matrix derivation method for
VIP synchronization from a set of standard VC matrices. We
then introduce an error diffusion process to produce the final
shares. The halftone process is independently applied to each
cyan ©, magenta (M), and yellow (Y) color channel so each
has only one bit per pixel to reveal colors of original images. A
secret message is halftoned ahead of the encryption stage.

Share Generation via Error Diffusion

Once the distribution of the basis matrices is completed, a
halftoning algorithm is applied to produce the final encrypted
shares. Error diffusion is used in our scheme as it is simple and
effective. The quantization error at each pixel is filtered and fed
back to future inputs. Fig. 5(a) shows a binary error diffusion
diagram designed for our scheme. To produce the th halftone
share, each of the three color layers are fed into the input.

CONCLUSION

This paper develops an encryption method to construct color
EVC scheme with VIP synchronization and error diffusion for
visual quality improvement. VIPs synchronize the positions of
pixels that carry visual information of original images across
the color channels so as to retain the original pixel values the
same before and after encryption. Error diffusion is used to construct
the shares such that the noise introduced by the preset
pixels are diffused away to neighbors when encrypted shares
are generated. It is obvious that there is a tradeoff between contrast
of encryption shares and the decryption share, however,
we can recognize the colorful secret messages having even low
contrast. Either VIP synchronization or error diffusion can be
broadly used in many VC schemes for color images.
Post: #3
plz can u send the matlab codings for this paper...my email id is anadjfamily[at]gmail.com... plz send within 2 days know it will be very useful for the review
Post: #4
pls post the matlab code for color extended visual cryptography
Post: #5
can i get the matlab code for this program at sandhyaannie[at]gmail.com
thankyou
Post: #6
It is now common to transfer multimedia data over the Internet. It is necessary to solve the problem of ensuring the security of information in the increasingly open network environment of today. Traditional cryptography encryption technologies are generally used to protect the security of information. With these technologies, the data becomes disordered after being encrypted and then can be retrieved by a correct key. Without the correct key, the contents of the encrypted source can not be detected even if unauthorized persons steal the data. Naor and Shamir proposed a new area of ​​cryptography, visual cryptography , in 1994. The most notable feature of this approach is that it exploits the human visual system to read the secret message of some overlapping actions, thus overcoming the disadvantage of complex Computing required in traditional cryptography. The threshold scheme makes the application of visual cryptography more flexible. In a k-out-of-n scheme of VC, a secret binary image is cryptographically encoded in n parts of random binary patterns. The n actions are xeroxed in n transparencies, respectively, and distributed among n participants, one for each participant. No participant knows the part given to another participant. Any k or more participants can visually reveal the secret image by superimposing any k transparencies together. The secret can not be decoded by any k-1 or less participants, even if infinite computational power is available to them. Apart from the obvious applications of information hiding, there are many VC applications, which include general access structures, copyright protection, watermarks, visual authentication and identification, print and scan applications, and so on. Many studies of visual cryptography have been published. Most of them, however, have concentrated on discussing black and white images, and only a few of them have proposed methods for processing gray and color images. There is a general method for VC scheme based on general access structure. The access structure is a specification of qualified and prohibited subsets of actions. Participants in a qualified subset can retrieve the secret image while participants in a prohibited subset can not. The concept of VC scheme has been extended to shared images in grayscale instead of sharing binary images. Although the secret image is grayscale, the parts are still constructed by random binary patterns that carry visual information that can lead to the suspicion of secret encryption. The concept of extended visual cryptography (EVC) is developed in which actions contain not only the secret information, but are also meaningful images. Hypergraphic colors are used in building meaningful images using randomly distributed pixels, resulting binary actions contain strong white noise that leads to inadequate results. This document introduces a VC color coding method to generate meaningful actions. It is based on two fundamental concepts used in the generation of actions that are the diffusion of errors and the synchronization of pixels. The diffusion of errors is a procedure that produces pleasant images of semitones to the human vision. The synchronization of the pixels of the secret image and the coverage images through the color channels improves the visual quality of the actions. Visual information Pixel synchronization (VIP) prevents the colors and contrast of the original parts from being degraded even with the permutation of the matrix and also maintains the position of the pixels in all channels.
Post: #7
It is the time to improve our military technology due to border problems. So here we suggest a new method for the air force for the automatic unit so that the pilot can only control the weapon selection and launch, and there is no need for the co-pilot. Our method is not fully automatic, we can also take control, but in critical situations we can leave our control to the machine. In this method we are using the technology of robots GPS and swarm for the implementation in real time. We are using GPS to get the map and drive the flight to the destination; In this case we can take the control manually or we can deliver it to the system. If we leave our control to the system, we will take the shortest route possible to the destination. We are using swarm robot technology to prevent random movement occurring between the same side air craft. During that time systems in different aircraft communicate with each other and maintain an optimal distance, and align. Also using swarm technology any mechanically failed combat aircraft can be carried by another enemy zone aircraft to your area thus minimising both life and loss of material on your side. Therefore, by applying these two technologies will greatly enhance the air force so pilots can be well trained for weapon selection and launch. They are not needed to concentrate on the route they are going or worry about the trajectory of the movement that flights take.

It is now common to transfer multimedia data over the Internet. It is necessary to solve the problem of ensuring the security of information in the increasingly open network environment of today. Traditional cryptography encryption technologies are generally used to protect the security of information. With these technologies, the data becomes disordered after being encrypted and then can be retrieved by a correct key. Without the correct key, the contents of the encrypted source can not be detected even if unauthorised persons steal the data. Naor and Shamir proposed a new area of ​​cryptography, visual cryptography in 1994. The most notable feature of this approach is that it explores the human visual system to read the secret message of some overlapping parts, thus overcoming the disadvantage of the complex computation required in The traditional Cryptography.
The threshold scheme makes the application of visual cryptography more flexible. In a k-out-of-n scheme of VC, a secret binary image is cryptographic-ally encoded in n parts of random binary patterns. The n actions are xeroxed in n transparencies, respectively, and distributed among n participants, one for each participant. No participant knows the part given to another participant. Any k or more participants can visually reveal the secret image by superimposing any k transparencies together. The secret can not be decoded by any k-1 or less participants, even if infinite computational power is available to them. Apart from the obvious applications of information hiding, there are many VC applications, which include general access structures, copyright protection, watermarks, visual authentication and identification, print and scan applications, and so on.
Many studies of visual cryptography have been published. Most of them, however, have concentrated on discussing black and white images, and only a few of them have proposed methods for processing Gray and colour images. There is a general method for the VC scheme based on the general access structure. The access structure is a specification of qualified and prohibited subsets of actions. Participants in a qualified subset can retrieve the secret image while participants in a prohibited subset can not. The concept of VC scheme has been extended to shared images in grayscale instead of sharing binary images. Although the secret image is grayscale, the parts are still constructed by random binary patterns that carry visual information that can lead to the suspicion of secret encryption. The concept of extended visual cryptography (EVC) is developed in which actions contain not only the secret information, but also significant images.
Hyper graphic colours are used in building meaningful images using randomly distributed pixels, resulting binary actions contain strong white noise that leads to inadequate results. This document introduces a VC colour coding method to generate meaningful actions. It is based on two fundamental concepts used in the generation of actions that are the diffusion of errors and the synchronisation of pixels. The diffusion of errors is a procedure that produces pleasant images of semitones to the human vision. The synchronisation of the pixels of the secret image and the coverage images through the colour channels improves the visual quality of the actions. Visual information Pixel synchronisation (VIP) prevents the colours and contrast of the original parts from being degraded even with the permutation of the matrix and also maintains the position of the pixels in all channels.
 

Marked Categories : cryptography, visual information pixel synchronization, color extended visual cryptography using error diffusion ppts free downloads, color extended visual cryptography using error diffusion, visual cryptography seminar report, seminar on visual cryptography, computer science visual cryptography, error diffusion, diffusion encryption, seminar topics on color visual cryptography pdf, color visual crptography using error diffusion, color visual cryptography based upon pixel synchronisation and error diffusion, seminar topics on visual cryptography, visual cryptography project report, color cryptography seminar, advantage of color extended visual cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  generating electricity using rotating door in ppt Guest 1 262 18-11-2017 11:02 AM
Last Post: jaseela123
Sad hide image inside another image using java source code Guest 1 208 18-11-2017 10:10 AM
Last Post: jaseela123
  interfacing lcd with 8255 using 8086 Guest 1 0 17-11-2017 01:07 PM
Last Post: jaseela123
  washing machine control using microprocessor 8086 Guest 1 0 07-11-2017 09:42 AM
Last Post: jaseela123
  PRE-PAID POWER CONSUPTION USING COIN BOX REPORT seminar flower 1 899 27-10-2017 01:01 PM
Last Post: nagaland 8pm today
  Electronics Letter Box Using IC 555 seminar tips 2 2,823 26-10-2017 02:37 PM
Last Post: jaseela123
  Industrial Conveyor System Using Magnetic Levitation system seminar code 2 251 25-10-2017 12:03 PM
Last Post: jaseela123
  detection of glaucoma using image processing techniques Guest 1 0 25-10-2017 11:53 AM
Last Post: jaseela123
Shocked ambulance rescue system using gps and gsm Guest 1 255 14-10-2017 03:25 PM
Last Post: jaseela123
  human computer interface based on visual lip movement and gesture recognition ppt Guest 1 676 14-10-2017 02:52 PM
Last Post: jaseela123
This Page May Contain What is COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION And Latest Information/News About COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION,If Not ...Use Search to get more info about COLOR EXTENDED VISUAL CRYPTOGRAPHY USING ERROR DIFFUSION Or Ask Here

Options: