Loading

An Efficient System for Secret Information Sharing Through SPIHT Coding and Zigzag Scanning
Yelisela Rajesh1, Guruprakash.CD2

1Yelisela Rajesh, Research Scholar, Department  of Computer Science and Engineering, Visvesvaraya Technological University, Belagavi.

2Dr.Guruprakash.C D, Professor, Department of Computer Science and Engineering, Sri Siddhartha Institute Of Technology, Maralur, Kunigul road, Karnataka.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 24 May 2019 | PP: 413-415 | Volume-8 Issue-6S3 April 2019 | Retrieval Number: F10830486S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Starting late, the transmission of data through structure is growing rapidly, which gives minute access or scattering of bleeding edge data. Secret information sharing is the basic subject in the field of correspondence progress, information security and age. At any rate security can be introduced from various perspectives like transmitting question state, picture stowing unendingly, watermarking framework, certification and seeing confirmation. Many secure and amassed data things like military maps and business noticeable bits of check are sent over the web. While using conundrum records (pictures, content, etc.) for sending over the framework, the security issue is to be considered, since there is a chance of taking the riddle information by the item works by excellence of delicate relationship in the open structure. In order to deal with the security is sue of riddle information, we need a fitting secure count by which we can avow our data over the web. With the help of Visual Cryptography, the system visual information can be securely sent over the web.

Keywords: Visual Cryptography, Security, Watermarking.
Scope of the Article: Computer Science and Its Applications