際際滷

際際滷Share a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS
STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS

ABSTRACT:

Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an
uncontrollable display quality problem for recovered images, and lacks a general approach to
construct visual secret sharing schemes (VSSs) for general access structures (GASs). We
propose herein a general and systematic approach to address these issues without sophisticated
codebook design. The approach can be used for binary secret images in non-computer-aided
decryption environments.

We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem
to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the
display quality of the recovered image is superior to that of previous studies.

More Related Content

Viewers also liked (10)

Usos tecnologico en nuestra vida cotidianaUsos tecnologico en nuestra vida cotidiana
Usos tecnologico en nuestra vida cotidiana
Dabeiba Boh坦rquez Urrego
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
Ecwaytech
Inteligent braking system
Inteligent braking systemInteligent braking system
Inteligent braking system
Ecwaytech
Planning du CDI Vigan pendant le bac 2015Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015
esidocvigan
Improved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power controlImproved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power control
Ecwaytech
Transcript id edjansen
Transcript id edjansenTranscript id edjansen
Transcript id edjansen
Edwin Jansen
my resume
my resumemy resume
my resume
shruti bhargava
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Cummings
How To Read Their Thoughts
How To Read Their ThoughtsHow To Read Their Thoughts
How To Read Their Thoughts
George Hutton
Movie poster research
Movie poster researchMovie poster research
Movie poster research
RoseBishay
Usos tecnologico en nuestra vida cotidianaUsos tecnologico en nuestra vida cotidiana
Usos tecnologico en nuestra vida cotidiana
Dabeiba Boh坦rquez Urrego
In network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networksIn network estimation with delay constraints in wireless sensor networks
In network estimation with delay constraints in wireless sensor networks
Ecwaytech
Inteligent braking system
Inteligent braking systemInteligent braking system
Inteligent braking system
Ecwaytech
Planning du CDI Vigan pendant le bac 2015Planning du CDI Vigan pendant le bac 2015
Planning du CDI Vigan pendant le bac 2015
esidocvigan
Improved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power controlImproved voltage vector sequences on dead-beat predictive direct power control
Improved voltage vector sequences on dead-beat predictive direct power control
Ecwaytech
Transcript id edjansen
Transcript id edjansenTranscript id edjansen
Transcript id edjansen
Edwin Jansen
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Legal shorts 12.06.15 including ESMA speech on MiFID II and EMIR and commissi...
Cummings
How To Read Their Thoughts
How To Read Their ThoughtsHow To Read Their Thoughts
How To Read Their Thoughts
George Hutton
Movie poster research
Movie poster researchMovie poster research
Movie poster research
RoseBishay

Similar to Image size invariant visual cryptography for general access structures subject to display quality constraints (20)

Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
Ecway Technologies
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoring
Ecwaytech
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Ecwaytech
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecwayprojects
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
Ecwaytech
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwaytech
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwayt
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classification
Ecwaytech
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecway
Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...Image size invariant visual cryptography for general access structures subjec...
Image size invariant visual cryptography for general access structures subjec...
Ecway Technologies
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
Matlab casual stereoscopic photo authoring
Matlab  casual stereoscopic photo authoringMatlab  casual stereoscopic photo authoring
Matlab casual stereoscopic photo authoring
Ecwaytech
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwayt
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecwaytechnoz
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
Ecway2004
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab  rich intrinsic image decomposition of outdoor scenes from multiple viewsMatlab  rich intrinsic image decomposition of outdoor scenes from multiple views
Matlab rich intrinsic image decomposition of outdoor scenes from multiple views
Ecwaytech
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecwayprojects
Dotnet model-based analysis of wireless system architectures for real-time a...
Dotnet  model-based analysis of wireless system architectures for real-time a...Dotnet  model-based analysis of wireless system architectures for real-time a...
Dotnet model-based analysis of wireless system architectures for real-time a...
Ecwaytech
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwaytech
Large graph analysis in the g mine system
Large graph analysis in the g mine systemLarge graph analysis in the g mine system
Large graph analysis in the g mine system
ecwayprojects
Dotnet large graph analysis in the g mine system
Dotnet  large graph analysis in the g mine systemDotnet  large graph analysis in the g mine system
Dotnet large graph analysis in the g mine system
Ecwayt
Matlab linear distance coding for image classification
Matlab  linear distance coding for image classificationMatlab  linear distance coding for image classification
Matlab linear distance coding for image classification
Ecwaytech
Model based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applicationsModel based analysis of wireless system architectures for real-time applications
Model based analysis of wireless system architectures for real-time applications
ecway

Image size invariant visual cryptography for general access structures subject to display quality constraints

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE BANGALORE / HYDRABAD CELL: +91 98949 17187, +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111 / 8111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com IMAGE SIZE INVARIANT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES SUBJECT TO DISPLAY QUALITY CONSTRAINTS ABSTRACT: Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). We propose herein a general and systematic approach to address these issues without sophisticated codebook design. The approach can be used for binary secret images in non-computer-aided decryption environments. We design a set of column vectors to encrypt secret pixels rather than use the conventional VCbased approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulatedannealing-based algorithm to solve the problem. The experimental results indicate that the display quality of the recovered image is superior to that of previous studies.