Contents Chapter 1 3 Introduction 3 1.1 Background..
3 1.2 Problem Description.. 3 1.3 Research Objectives. 3 1.4 Gantt Chart. 4 1.
5 Thesis Organization.. 4 Chapter 1IntroductionIn thischapter, a detail introduction of the fundamental concepts related thepresented thesis is discussed. In the latter half of the chapter, problemdescription and research objectives are described.1.1 BackgroundWith the rapid advancement of network technology,multimedia information is transmitted over the Internet conveniently. Variousconfidential data such a similarity map sand commercial identifications are transmittedover the Internet. While using secret images, security issue should be taken into consideration because hackers may utilize weak link over communicationnetwork to steal information that they want.
To deal with the security problemsof secret images, various image secret sharing schemes have been developed. Visual cryptography is a cryptographic techniquewhich allows visual information (e.g.
printed text, hand written not sandpictures) to be encrypted in such a way that the decryption can be performed bythe human visual system, without the a id of computers. 1.1.2 Cryptography for better Authentication The cryptographictechniques provide a secure method of authentication for any kind of system orprovide a high level of security. Cryptography Scheme is an encryption methodthat uses combinatorial techniques to encode secret written materials.
1.1 ProblemDescriptionToday, most applications are only as secure as their underlyingsystem. Since the design and technology of middleware has improved steadily,their detection is a dif?cult problem. As a result, it is nearly impossible tobe sure whether a computer that is connected to the internet can be consideredtrustworthy and secure or not. The question is how to handle applications thatrequire a high level of security.
For advance kind authentication differentcryptography techniques are used visual cryptography is one of them 1.2 ResearchObjectivesThe prime objective of this project is to ensure thesecurity of information (in this case image) transformation by creating imageshares. Methodology Sharing images using visualcryptography 1.3 Gantt Chart 1.5 Thesis OrganizationIn restof this the thesis, the related work, the used approach, details of the experimentsand their results are presented. This thesis is divided into a set of chaptersand each chapter is dedicated for each phase of the research. Below is thedetail of the chapters of this thesis:Chapter 2describes the related work reviewed in the literature.
In this chapter, thefindings of the literature review are discussed with the gap of researchidentified in the target area of research. Theresearch methodology to support interpretation of software requirements usingsemantic technology is described in detail in Chapter 3. InChapter 4, a set of core construction/model/framework of the presented thesis.InChapter 5, a set of experiments were performed to test the performance of thepresented approach accompanied with the results and discussion of the results.
Chapter 6presents the concluded work, and future work of the presented research in thisthesis.