VISUAL CRYPTOGRAPHY
#4
Thumbs Up 

[attachment=5727]
Visual Cryptography


Abstract

Today, the world is on the anvil of being shrunk into a global net. All the systems around the world are to be used in the epoch of a nanosecond even when installed across continents and oceans. This is possible only through networks. It is in this context that networks become crucial to the viability of science and engineering research. The unprecedented growth of networking has helped in breaking all geographic barriers of the world and building the information super highway and global village.

In this direction a new technology has developed in the past few years which makes it possible to interconnect many disparate networks and make them work as a co-coordinated unit. Thus the technology is designed to foster the communication between 2 machines with hardware architectures, to accommodate and use any packet switched network hardware and to accommodate multiple operating systems.

It is in this context that Visual Cryptography has gained importance for communications between disparate networks.
SYSTEM ANALYSIS

System Analysis is first stage according to System Development Life Cycle model. This System Analysis is a process that starts with the analyst.

Analysis is a detailed study of the various operations performed by a system and their relationships within and outside the system. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate should consider other related systems. During analysis, data is collected from the available files, decision points, and transactions handled by the present system.

Logical system models and tools are used in analysis. Training, experience, and common sense are required for collection of the information needed to do the analysis.
Existing System

The present system is having different networks for each department. Where in the files has to be manually transferred. which is not a good way of practice of file transfer, for that we have given this proposed system. Where the file transfer is done through the networks.
Problem Statement

A computer network is a communication system for connecting end system, in order to send messages or files. From one to another. So to achieve proper communication the network should be a dedicated one. the interconnection i.e. physical connections should be proper.
Whenever a new network is added it should not disturb the existing network. Similarly when a network is deleted communication should be carried on properly
The network should be reachable with a high reliability and should provide consistent routing and should be able to provide solution for the routing problem.
Proposed System

Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.
REQURIEMENTS ANALYSIS

The requirement phase basically consists of three activities:
1. Requirement Analysis
2. Requirement Specification
3. Requirement Validation

Requirement Analysis:
Requirement Analysis is a software engineering task that bridges the gap between system level software allocation and software design. It provides the system engineer to specify software function and performance, indicate software’s interface with the other system elements and establish constraints that software must meet.
The basic aim of this stage is to obtain a clear picture of the needs and requirements of the end-user and also the organization. Analysis involves interaction between the clients and the analysis. Usually analysts research a problem from any questions asked and reading existing documents. The analysts have to uncover the real needs of the user even if they don’t know them clearly. During analysis it is essential that a complete and consistent set of specifications emerge for the system. Here it is essential to resolve the contradictions that could emerge from information got from various parties.
This is essential to ensure that the final specifications are consistent.

It may be divided into 5 areas of effort.
1. Problem recognition
2. Evaluation and synthesis
3. Modeling
4. Specification
5. Review

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: verification images for visual cryptography, visual cryptography conferences 2013, applet visual cryptography, visual cryptography projects ppt**e, visual cryptography algorithm, visual cryptography full documentation, rpi 3d stacking,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
VISUAL CRYPTOGRAPHY - by project topics - 12-04-2010, 09:09 PM
RE: VISUAL CRYPTOGRAPHY - by project topics - 24-04-2010, 12:30 AM
RE: VISUAL CRYPTOGRAPHY - by Sreesa - 07-07-2010, 08:01 AM
RE: VISUAL CRYPTOGRAPHY - by projectsofme - 12-10-2010, 03:21 PM
RE: VISUAL CRYPTOGRAPHY - by summer project pal - 29-01-2011, 07:55 PM
RE: VISUAL CRYPTOGRAPHY - by [email protected] - 08-02-2011, 09:52 PM
RE: VISUAL CRYPTOGRAPHY - by veereshswamy - 12-01-2012, 07:44 AM
RE: VISUAL CRYPTOGRAPHY - by seminar addict - 12-01-2012, 09:23 AM
RE: VISUAL CRYPTOGRAPHY - by seminar addict - 03-02-2012, 12:16 PM
RE: VISUAL CRYPTOGRAPHY - by seminar paper - 01-03-2012, 11:36 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  QUANTUM CRYPTOGRAPHY- MAKING CODE UNBREAKABLE seminar class 2 2,472 11-07-2013, 02:07 PM
Last Post: computer topic
  Palladium Cryptography (Download Seminar Report) Computer Science Clay 18 15,955 31-12-2012, 02:33 PM
Last Post: seminar details
  Java Cryptography Architecture (JCA) seminar projects crazy 1 2,601 17-12-2012, 01:51 PM
Last Post: seminar details
Lightbulb Java Cryptography Architecture (JCA) computer science crazy 1 2,651 17-12-2012, 01:51 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 2,498 23-11-2012, 11:32 AM
Last Post: seminar details
  IMBRICATE CRYPTOGRAPHY Electrical Fan 3 4,133 18-10-2012, 12:34 PM
Last Post: seminar details
Thumbs Up IMBRICATE CRYPTOGRAPHY Computer Science Clay 4 3,636 18-10-2012, 12:33 PM
Last Post: seminar details
  VISUAL CRYPTOGRAPHIC STEGANOGRY IN IMAGES full report smart paper boy 1 2,504 01-03-2012, 11:36 AM
Last Post: seminar paper
  Quantum Cryptography computer science crazy 5 7,008 19-01-2012, 11:05 AM
Last Post: seminar addict
  cryptography full report computer science technology 14 9,657 19-01-2012, 11:04 AM
Last Post: seminar addict

Forum Jump: