Visual Cryptography using Image Pixel Transparency

dc.contributor.authorShrestha, Dipesh
dc.date.accessioned2022-01-30T05:42:50Z
dc.date.available2022-01-30T05:42:50Z
dc.date.issued2014-11
dc.descriptionThis thesis makes use of transparency of pixels of the shares, the two or more encrypted images, so as to reveal the secret image.en_US
dc.description.abstractThis thesis makes use of transparency of pixels of the shares, the two or more encrypted images, so as to reveal the secret image. The pixels of shares can be generated randomly or the cover image can be used to generate the first share. The encrypted shares generated using cover image seem to be visually less similar to those generated without using cover image. Also, on the basis of image similarity between shares and original image, further encryption of encrypted shares can be performed. This thesis also compares the outcome when cover image is used and when not used to generate shares. Results show that the latter is more sensitive to the transparency factor (alpha) than the former encouraging the use of properly selected cover image for visual cryptography using pixel transparency.en_US
dc.identifier.citationMASTER OF SCIENCE IN COMPUTER SYSTEM AND KNOWLEDGE ENGINEERINGen_US
dc.identifier.urihttps://hdl.handle.net/20.500.14540/7807
dc.language.isoenen_US
dc.publisherPulchowk Campusen_US
dc.subjectVisual Cryptography,en_US
dc.subjectImage Transparencyen_US
dc.titleVisual Cryptography using Image Pixel Transparencyen_US
dc.typeThesisen_US
local.academic.levelMastersen_US
local.affiliatedinstitute.titlePulchowk Campusen_US
local.institute.titleInstitute of Engineeringen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
069MSCS655THESIS.pdf
Size:
2.98 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: