An extended visual cryptography without pixel expansion for halftone images
S.Aruna
, K Vikas , V Manikanta
Cryptography, Image Processing, Secret Sharing
Module 3: Generating Shares We calculate intensity values of halftone image through Floyd algorithm this algorithm is used to hide data at background image. We calculate the PSNR & MSE values for both input & halftone image. Module 4: Overlapping of shares to generate decrypted image Embedding input image with watermark image by floyd and obtaining watermarked image as output. Dct coefficients are then quantized, coded and transmitted. The JPEG receiver decodes the quantized DCT coefficients, computes the inverse two-dimensional DCT of each block, and puts the blocks back together into single image. . For typical images, many of the DCT coefficients have values close to zero.
"An extended visual cryptography without pixel expansion for halftone images", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.1, Issue 5, page no.163 - 165, May-2016, Available :https://ijsdr.org/papers/IJSDR1605033.pdf
Volume 1
Issue 5,
May-2016
Pages : 163 - 165
Paper Reg. ID: IJSDR_160241
Published Paper Id: IJSDR1605033
Downloads: 000347057
Research Area: Engineering
Country: kanchepuram, Tamil nadu, India
ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: IJSDR(IJ Publication) Janvi Wave