IJSRP Feb 2012 Edition, Volume 2, Issue 2

نویسندگان

  • Swati Jaiswal
  • Neeraj Gupta
  • Hina Shrivastava
چکیده

Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. [1] This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. nsecrets equals n/2 levels. This paper also provides secured authentication for the user, using the Biometric authentication [6-7] Thus the proposed paper is implemented in any of the real time applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Continuous deployment of antifungals in treating infections caused by dimorphic opportunistic pathogen Candida albicans has led to the emergence of drug resistance resulting in cross-resistance to many unrelated drugs, a phenomenon termed as Multi-Drug Resistance (MDR). Although there is reasonable understanding of major factors which contribute to MDR mechanisms, it appears unavoidable to cons...

متن کامل

IJSRP, Volume 2, Issue 7, July 2012 Edition

The main target of this research paper is to propose an algorithm to implement data security using encryption and decryption method in binary sequence of original text message. The binary sequence of message is converted into DNA sequence, which consists of nucleotide letter A,T,G,C., then by using random function, which generates the sequence of random numbers for each nucleotide. The generate...

متن کامل

IJSRP Feb 2012 Edition, Volume 2, Issue 2

In current era, XML schema design patterns are used in vast extent to exchange data and to employ the modules for reusability. XML as in plain text format can be transmitted between different applications with different platforms, operating systems and browsers. Design patterns play important role in reusability of already existing solutions. The different XML schema design patterns namely GOF,...

متن کامل

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Sports drinks are much relevant to the Indian sports scenario because of the fact that many of the Indian sports persons are undernourished and anaemic. Functional beverage was prepared by using whey water, pearl millet [Pennisetum typhoideum], cauliflower [Brassica oleracea var. botrytis] leaf powder, banana and jaggery at three different levels i.e. S1, S2 and S3. The developed functional bev...

متن کامل

IJSRP, Volume 2, Issue 7, July 2012 Edition

In this paper particle swarm optimization (PSO) algorithm is proposed to optimize Combined Economic emission Dispatch Problem (CEEDP)of thermal units. Combined Economic emission Dispatch Problem (CEEDP is used to minimize both total fuel cost of generation and the emission of toxic gases of the thermal generating units simultaneously while satisfying the load demand and constraints of the syste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012