Multiple Images Defending Process by Leaning Techniques
Providing security to data in the form of text is cryptography, but visual cryptography provides defense for visual images. In this, we intended a mechanism to encipher an image into different levels, i.e., intensity variation, pixel swapping, steganography, and randomization, which seizes network as a means to attain the actual receiver who does the retrieval procedure in reverse order. Different methods are developed, namely intensity variation on each and every pixel of an image and color pixel value swapping within an image, calculating the pixel intensity values and embedding them using steganography, and randomization process. Instead of using external images for manipulation, it provides a better encryption process. Multiple images can be used, which is a good parameter of the proposed procedure. Hence, multiple images can be transformed at a time and more security can be achieved by this proposed method.
KeywordsEnormous Retain Treatment Imbricated Decree Arbitrarily Gloom
- 4.Anitha, R., Sasirekha, N.: Image securing mechanism by gradient techniques. Int. J. Comput. Eng. Appl. VIII(I), 55–64 (2014)Google Scholar
- 5.Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT ”94. Lecture Notes in Computer ScienceGoogle Scholar
- 6.Koppu, S., Madhu Viswanatham, V.: A survey on security issues: digital images. Int. J. Pharm. Technol. 8(2),13420–13427 (2016) Google Scholar
- 7.Addin Ahmed Salem Al-Maweri, N.: State-of-the-art in techniques of text digital watermarking: challenges and limitations. Int. J. Comput. Sci. 12(2) (2016)Google Scholar
- 10.Sah, H.R., Gunasekaran, G.: Privacy preserving data mining using image slicing and visual cryptography. In: IEEE Transactions, pp. 1–7 (2016)Google Scholar