Friday, July 19, 2019
Essay --
As can be seen in fig.1, the VCS system converts given IMGE into random shares. To the naked eye, the random shares do not providing meaning. The VCS system has many applications in the real world. They include transmission of military orders securely, authentication and authorization, transmitting passwords and so on. The researchers worldwide focused in physical properties like color, pixel expansion etc. The proposed construction of VCS based on threshold for levels of whiteness; color VCS was considered in colored VCS. Other scheme is proposed which allows sharing of multiple secret images. Naor et al. introduced EVCS (Extended Visual Cryptography Scheme) with a simple example. This paper proposes EVCS corresponding to VCS. The EVCS takes a secret image and the original share images as input and generates shares that can satisfy the criteria given below. â⬠¢ Secret image can be recovered from any subset of shares. â⬠¢ Forbidden shares canââ¬â¢t be used to obtain secret image. â⬠¢ All the shares are meaningful images. EVCS is something similar to stereography where covering shares are m...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.