Visual cryptography and image processing based approach for secure transactions in banking sector

Author(s):  
Aaditya Jain ◽  
Sourabh Soni
2017 ◽  
Vol Volume-2 (Issue-1) ◽  
pp. 1417-1421
Author(s):  
Soundarya B A ◽  
Sowmeya D ◽  
Yazhini G V ◽  

Author(s):  
R. Shanmuga Priya ◽  
A. Senthilkumar

The intent of this paper is to present some of the major things about visual cryptography for colour images. The idea behind this technique is quite simple and powerful. Visual cryptography deals with visual information like picture, printed text and written notes etc. Visual cryptography also called secret sharing. As the name implies visual cryptography which has a single secret image and more than one shadow images and provided for numerous users. Visual cryptography process depends on various measures such as accuracy, computational complexity, pixel expansion, contrast whether generated it is meaningless or meaningful. Encryption performed by image processing techniques and the decryption carried out by human visual system with the stacking images. Visual cryptography need not require any complicated cryptographic proficiency. So, the intruders or hackers get hard to hack the details programmatically. However, this papers deals with visual cryptography for colour images.


Author(s):  
RAM KRISHNA JHA ◽  
ABHIJIT MUSTAFI

Secure digital images is very important for today’s scenario which combining methods and techniques coming from cryptography and image processing. Visual Cryptography Scheme (VCS) is a new kind of cryptography technique which allows visual information (e.g. printed text, picture etc.) to be encrypted in such a way that decryption can be performed by the human visual system without any complex computation on computers. Here we proposed a Visual Cryptography Scheme based on image division of grey level images for the generation of Secret Shares. In this paper we represent the (k, n) Threshold Visual Cryptography Scheme in which the size of generated Shares as well as Recovered Image have same as the Secret Image rather than other VCS where k is the threshold value. Also we proposed the new technique to generate the Shadow Assignment Matrix with the help of Genetic Algorithm (GA). This Shadow Assignment Matrix helped us to distribute the Temporary shadow to the users according to their occurrence of 1’s in a row.


1999 ◽  
Vol 173 ◽  
pp. 243-248
Author(s):  
D. Kubáček ◽  
A. Galád ◽  
A. Pravda

AbstractUnusual short-period comet 29P/Schwassmann-Wachmann 1 inspired many observers to explain its unpredictable outbursts. In this paper large scale structures and features from the inner part of the coma in time periods around outbursts are studied. CCD images were taken at Whipple Observatory, Mt. Hopkins, in 1989 and at Astronomical Observatory, Modra, from 1995 to 1998. Photographic plates of the comet were taken at Harvard College Observatory, Oak Ridge, from 1974 to 1982. The latter were digitized at first to apply the same techniques of image processing for optimizing the visibility of features in the coma during outbursts. Outbursts and coma structures show various shapes.


Sign in / Sign up

Export Citation Format

Share Document