FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS
Convert to study materialsBETA
Transform any presentation into ready-made study materialselect from outputs like summaries, definitions, and practice questions.
1 of 5
Download to read offline
More Related Content
Psdot 8 a weak security notion for visual
1. A WEAK SECURITY NOTION FOR VISUAL SECRET SHARING
SCHEMES
OBJECTIVE:
The main objectives of this project is a sharing the secret information
through an encrypted color image based on LSB Method.
PROBLEM DIFINITION:
The problem found in our existing system is we must expand the original
pixels on the secret images in encryption, which aces lower level of contrast of the
reproduced images.Many efforts have been devoted to minimizing the pixel
expansion and to maximize the contrast of reproduced images.
ABSTRACT:
In visual secret sharing (VSS) scheme, the alignment of the transparencies is
important to the visual quality of the reconstructed secret image. Each pixel of the
original secret image is expanded to m subpixels in a share image. If a share image
is printed on a paper with the same size as the original secret image, the alignment
or the registration of the subpixels, which is only m times smaller than that of the
original secret image, could be troublesome. In this paper, we propose a (2, n)-VSS
scheme that allows a relative shift between the shares in the horizontal direction
and vertical direction. When the shares are perfectly aligned, the contrast of the
reconstructed image is equal to that of the traditional VSS scheme.
2. When there is a shift, the average contrast of the reconstructed image is
higher than that of the traditional VSS scheme, and the scheme can still work in
cases where very little shape redundancy is present in the image. The trade-off is
that our method involves a larger pixel expansion. The basic building block of our
scheme is duplication and concatenation of certain rows or columns of the basic
matrices. This seemingly simple but very powerful construction principle can be
easily used to create more general (k, n) schemes.
EXISTING SYSTEM:
GrayScale Image Based VSS(GI-VSS)
Water Marking Technique based VSS(WaterMarking Based-VSS)
DISADVANTAGES:
We must expand the original pixels on the secret imagesin encryption, which
akes lower level of contrast of the reproducedimages.
Many efforts have been devoted tominimizing the pixel expansion and to
maximize the contrastof reproduced images.
PROPOSED SYSTEM:
In proposed system comes from the fact that VSS schemes need no
computation in decryption Based on this observation, we can relax the
unconditional security notion of -threshold VSS schemes to a weaker notion in
such a way that it is secure if the image obtained by stacking or fewer shares seems
to be a random dot image We also present two constructions of WS-VSS schemes.
US-VSS scheme (B/W Image based system)
3. WS-VSS scheme (color Image Based Syetem).
ADVANTAGES:
High Security
There is no need effort for minimizing the pixel expansion
There is no need effort for maximize the contrast of reproduced images.
ALGORITHM USED:
1. LSB (Least Significant Bit)
2. AES (Advanced Encryption Standard)
ARCHITECTURE DIAGRAM:
4. SYSTEM REQUIREMENTS:
Hardware Requirements:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 512 Mb.
5. Software Requirements:
Operating system : Windows XP.
Coding Language : ASP.Net with C#.
Data Base : SQL Server 2005.
APPLICATIONS:
1. Deductive Agencies
2. Government Services
3. Organization Administrative