Downloads: 132 | Views: 269
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10
Efficient Data Security System Using Room Reservation Approach on Digital Images for Secret Sharing using Color Visual Cryptography
Aparna T. Deshmukh, Jyoti Raghatwan
Abstract: Reversible data hiding is the technique in which the cover image can reversibly be retrieved after the extraction of hidden data in it. This technique provides secrecy for data, and for its cover image. All the previous methods of reversible data hiding were vacating room for data hiding after encryption process, which leads tointroduction of some error rates at the time of data extraction and image restoration. Here we have described a novel method of reversible data hiding in which, Reserving room before encryption (RRBE) in images using visual cryptography, so that image extraction will be error free. Also here we are proposing an LSB replacement method for the data hiding, which will result in more space for embedding secret data.
Keywords: Reversible data hiding, RRBE, LSB replacement, visual cryptography
Edition: Volume 3 Issue 12, December 2014
Pages: 248 - 251
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1054 - 1058Colour Extended Visual Cryptography based on MKGED
T. Anuradha, Dr. K. Usha Rani
Downloads: 101
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2657 - 2659An Outline of Various Secret Sharing Techniques
Kavita Choudhary, Kumar Vaibhav
Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1155 - 1157Avoidance of Unauthorized user using Visual Cryptography
Dayanand G Savakar, Pandurang H Biradar