ieee 2014 java image processing projects a probabilistic model of visual cryptography scheme with...

6
A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group AbstractThe visual cryptography (VC) is a secret sharing scheme where a secret image is encoded into transparencies, and the stacking of any out of transparencies reveals the secret image. The stacking of or fewer transparencies is unable to extract any information about the secret .We discuss the additions and deletions of users in a dynamic user group. To reduce the overhead of generating and distributing transparencies in user changes, this paper proposes a VC scheme with unlimited based on the probabilistic model. The proposed scheme allows to change dynamically GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsem[email protected]

Upload: ieeefinalyearstudentprojects

Post on 02-Jun-2015

57 views

Category:

Engineering


2 download

DESCRIPTION

To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - [email protected] Our Website: www.finalyearprojects.org

TRANSCRIPT

Page 1: IEEE 2014 JAVA IMAGE PROCESSING PROJECTS A probabilistic model of visual cryptography scheme with dynamic group

A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

Abstract—The visual cryptography (VC) is a secret sharing scheme where a secret

image is encoded into transparencies, and the stacking of any out of transparencies

reveals the secret image. The stacking of or fewer transparencies is unable to

extract any information about the secret .We discuss the additions and deletions of

users in a dynamic user group. To reduce the overhead of generating and

distributing transparencies in user changes, this paper proposes a VC scheme with

unlimited based on the probabilistic model. The proposed scheme allows to change

dynamically in order to include new transparencies without regenerating and

redistributing the original transparencies. Specifically, an extended VC scheme

based on basis matrices and a probabilistic model is proposed. An equation is

derived from the fundamental definitions of the VC scheme, and then the VC

scheme achieving maximal contrast can be designed by using the derived equation.

The maximal contrasts with to are explicitly solved in this paper.

Existing System

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

GLOBALSOFT TECHNOLOGIESIEEE PROJECTS & SOFTWARE DEVELOPMENTS

IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE

BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS

CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401

Visit: www.finalyearprojects.org Mail to:[email protected]

Page 2: IEEE 2014 JAVA IMAGE PROCESSING PROJECTS A probabilistic model of visual cryptography scheme with dynamic group

• Generally, the stacking revelation of the secret with higher contrast represents the better visual quality, and therefore the stacking secret with high contrast is the goal of pursuit in VC designs.

• Based on the definition of contrast, there are studies attempting to achieve the contrast bound of VC scheme.

• Blundo et al are given the optimal contrast of VC schemes.Hofmeister et al. provide a linear program which is able to compute exactly the optimal contrast forVC schemes.

• Moreover, there exist VC related researches using differential definitions of contrast.

• Another important metric is the pixel expansion denoting the number of sub pixels in transparency used to encode a secret pixel.

• The minimization of pixel expansions has been investigated in previous studies. where the scheme is based on the basis matrices, but only one column of the matrices is chosen to encode a binary secret pixel, rather than the traditional VC scheme utilizing the whole basis matrices.

Disadvantages

• Here the scheme is based on only one column of the matrices is chosen to encode a binary secret pixel, rather than the traditional VC scheme utilizing the whole basis matrices.

• Does not use Transparencies is unable to extract any information about the secret.

• Less security can provide the upper bound and lower bound of the optimal contrast for VC schemes.

Proposed System

• proposed a probabilistic model of VC scheme, and the two cases and are explicitly constructed to achieve the optimal contrast. Based on Yang [31], Cimato et al.

Page 3: IEEE 2014 JAVA IMAGE PROCESSING PROJECTS A probabilistic model of visual cryptography scheme with dynamic group

• Proposed a generalized VC scheme in which the pixel expansion is between the probabilistic model of VC scheme and the traditional VC scheme.

• The visual cryptography (VC) is a secret sharing scheme where a secret image is encoded into transparencies, and the stacking of any out of transparencies reveals the secret image.

• paper proposes a VC scheme with unlimited based on the probabilistic model. The proposed scheme allows to change dynamically in order to include new transparencies without regenerating and redistributing the original transparencies.

• Specifically, an extended VC scheme based on basis matrices and a probabilistic model is proposed.

• An equation is derived from the fundamental definitions of the VC scheme, and then the VC scheme achieving maximal contrast can be designed by using the derived equation.

• The maximal contrasts with to are explicitly solved in this paper.

Advantages

• The RG scheme is similar to the probabilistic model of the VC scheme, but the RG scheme is not based on the basis matrices.

• The number of generated transparencies of a VC scheme.

• Its highly secured. unlimited based on the probabilistic model.

• VC scheme, and then the VC scheme achieving maximal contrast can be designed by using the derived equation.

HARDWARE & SOFTWARE REQUIREMENTS:

HARDWARE REQUIREMENTS:  

Page 4: IEEE 2014 JAVA IMAGE PROCESSING PROJECTS A probabilistic model of visual cryptography scheme with dynamic group

System    :   Pentium IV 2.4 GHz. 

Hard Disk  :   40 GB. 

Floppy Drive :   1.44 Mb. 

Monitor   :   15 VGA Colour. 

Mouse    :   Logitech. 

Ram    :   512 MB. 

SOFTWARE REQUIREMENTS:

Operating system   :   Windows 7 Professional. 

Coding Language  :  Java, Swing

Front End Tool : Netbeans 7.0

Database  : MS Sql .

Back End Tool : SQLYog