International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

In this paper, we are presenting a novel technique of multilayer multi share Visual Cryptography in which image is encrypted at multiple levels using sterilization algorithm. In encryption secret image is converted into monochromatic image i.e. Red, Green and Blue channels are separated and each channel encrypted using sterilization algorithm. It is a bitwise operation. Shares obtain at each level are stored in database using that database image is encrypted to further levels. For decryption all the shares are need to be superimposed in proper sequence using desterilization algorithm. By stacking shares with same keys, original secret image is revealed.

Keywords: Multilayer, Multishares, Sterilization, Visual Secret Shares, Security, bitwise operation

Edition: Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

Share this Article

How to Cite this Article?

Apurva A. Mohod, Prof. Komal B. Bijwe, "An Image Database Security Using Multilayer Multi Share Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=26041504, Volume 4 Issue 4, April 2015, 3262 - 3267

31 PDF Views | 27 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'Multilayer'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 496 - 497

Naive Buyers Theorem for Heart Disease Prediction System

Indu Kumari, Dinesh Kumar Bahgel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1709 - 1713

Rider: A Multi Layer Framework for Road Condition Estimation

Sona P, Divya M

Share this Article

Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article



Top