28-11-2011, 10:48 AM
I need the source code...send mail to kalaisuc[at]gmail.com
28-11-2011, 10:48 AM
I need the source code...send mail to kalaisuc[at]gmail.com
08-03-2012, 12:45 PM
to get information about the topic"Visual cryptography schemes for secret image" full report ppt and related topic refer the link bellow
https://seminarproject.net/Thread-visual-cryptography https://seminarproject.net/Thread-embedd...?pid=73439 https://seminarproject.net/Thread-visual...phy?page=2
29-03-2012, 04:09 PM
plz send us the code for the mentioned topic in matlab
03-08-2012, 03:22 PM
Secret Sharing Schemes Using Visual Cryptography Secret Sharing Schemes Introduction Handling secret has been an issue of prominence from the time human beings started to live together. Important things and messages have been always there to be preserved and protected from possible misuse or loss. Some time secret is thought to be secure in a single hand and at other times it is thought to be secure when shared in many hands. Some of the formulae of vital combinations of medicinal plants or roots or leaves, in Ayurveda were known to a single person in a family. When he becomes old enough, he would rather share the secret formula to a chosen person from the family, or from among his disciples. There were times when the person with the secret dies before he could share the secret. Probably, similar incidents might have made the genius of those era to think of sharing the secrets. Principle of secret splitting The simplest sharing scheme splits a message between two people. Consider the case where Daniel has a message M, represented as an integer, that he would like to split between two people Alice, and Bob, in such a way that neither of them alone can reconstruct the message. A solution to the problem readily lends itself: Choose a random number r. Then r and M |
|