ADVANCED COLOR COVERT IMAGE SHARING USING ARNOLD CAT MAP AND VISUAL CRYPTOGRAPHY

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Chaotic Image Encryption Using 1D Logistic Map, 2D Arnold Cat Map and 3D Arnold Cat Map

Analyzing the randomness, complexity and efficiency of chaotic image encryption using 1D Logistic map, 2D Arnold cat map or 3D Arnold cat map is proposed here. The keys for the encryption process are generated from the biometric image of the sender. Initially the biometric fingerprint image of the sender is captured using a scanner, which is preprocessed to the grey level image. By using an eff...

متن کامل

High Security Image Steganography with Modified Arnold cat map

Information security is concerned with maintaining the secrecy, reliability and accessibility of data. The main objective of information security is to protect information and information system from unauthorized access, revelation, disruption, alteration, annihilation and use. This paper uses spatial domain LSB substitution method for information embedding and Arnold’s transform is applied twi...

متن کامل

k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence

Visual cryptography is a special type of encryption technique where visual information (Image, Text etc) gets encrypted in such a way that decryption can be performed by Human Visual System with a computation free decryption process. The beauty of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using H...

متن کامل

Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm

Visual Cryptography Schemes (VCS) is a method of image encryption used to hide the secret information in images. In the traditional VCS, the secret image is encrypted into n number of shares randomly and distributed to the n number of participates. The secret image can be recovered simply by stacking the shares without any complex computation involved. However previous approach suffers a securi...

متن کامل

Visual Cryptography Using Color Images

Information security has become a major issue as information technology is ruling the world. Cryptography using mathematical techniques is providing information security but requires complex algorithms, intensive mathematical computations and efficient computational resources. To avoid such intensive and complex algorithms a new scheme known as Visual cryptography (VC) was introduced by Naor an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ICTACT Journal on Image and Video Processing

سال: 2019

ISSN: 0976-9099,0976-9102

DOI: 10.21917/ijivp.2019.0288