Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/13566
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYADAV, NITESH-
dc.date.accessioned2011-04-03T16:57:05Z-
dc.date.available2011-04-03T16:57:05Z-
dc.date.issued2009-07-06-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/13566-
dc.descriptionME THESISen_US
dc.description.abstractThe visual cryptography is a process of splitting image in multiple shares or transparencies so that no one can identify the image from few shares. The image can be recovered only when the receiver has all the shares. When all the shares are stacked together the image is regenerated and can be identified by human eye. The visual cryptographic process can be used in applications where images are involved such as hiding other image information in the original image. Image embedding is the process of putting hidden image information in the original image. Image embedding using same size VC uses image size invariant VC [2] for generating multiple shares of images and the multiple shares contain the information of the hidden image. The hidden image information is embedded at every second pixel or forth pixel depending upon the assumption that two or four consecutive pixel contains the same value. Image embedding by assuming two consecutive pixels have same value contains the hidden imag...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD534;44-
dc.subjectImageen_US
dc.subjectVisual Cryptographyen_US
dc.subjectImage Embeddingen_US
dc.titleIMAGE EMBEDDING USING SAME SIZE VISUAL CRYPTOGRAPHYen_US
Appears in Collections:M.E./M.Tech. Computer Technology & Applications

Files in This Item:
File Description SizeFormat 
Nitesh+yadav(12205).doc770.5 kBMicrosoft WordView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.