Volume-5 (Second International Conference on Emerging Trends in Engineering' 2013)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automatic Face Recognition using Principal Component Analysis with DCT |
Country | : | India |
Authors | : | Miss.Renke Pradnya Sunil |
Abstract: The Face recognition has found its extensive application in security.Face recognition has many applications ranging from security access to video indexing by content. An effective method in extracting features increases the efficiency and the recognition rate of the face recognition system and also makes its implementation easier. This paper proposes a methodology for improving the recognition rate of the face recognition system.The proposed method is tested using ORL database.Recognition rates for a database of 100 images shows promising results.
Keywords: Face recognition, Ffeature extraction, ORL database, PCA, Recognition rate.
1] DashunQue, Bi Chen, Jin Hu "A Novel Single training sample face recognition algorithm based on Modular Weighted (2d)2 PCA" School of Information Technology, Wuhan University of Technology, Wuhan 430063, P. R. China.
[2] Turk M, Pentland A. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991.3(1): 71-86
[3] Du C, Su G D, Lin X. Face Recognition across Different Poses Using a Single 2D Model View. IEEE InternationalConference on Robotics, Intelligent Systems and SignalProcessing, 2003.2: 721-725
[4] K.E. Gates, "Fast and Accurate Face Recognition Using Support Vector Machines," Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2005, pp.163-163.
[5] S. Palanivel, B.S. Venkatesh, and B. Yegnanarayana, "Real Time Face Recognition System Using Autoassociative Neural Network Models," 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)., 2003, pp. II-833-6.
[6] S.-jen Lin, C.-yang Lee, M.-hsuan Chao, C.-senChiou, and C.-sing Yang, "The Study and Implementation of Real-Time Face Recognition and Tracking System," Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, 2010, pp. 11-14.
[7] C. Cruz, L.E. Sucar, and E.F. Morales, "Real-Time Face Recognition for Human-Robot Interaction," 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition, Sep. 2008,pp. 1-6.
[8] P. Michel and R. El Kaliouby, "Real Time Facial Expression Recognition in Video Using Support Vector Machines," Proceedings of the 5th international conference on Multimodal interfaces - ICMI'03, 2003, p. 258.
[9] L. Xie and J. Li, "A Novel Feature Extraction Method Assembled with PCA and ICA for Network Intrusion Detection," 2009 International Forum on Computer Science-Technology and Applications, vol. 3, 2009, pp. 31-34.
[10] M. Karg, R. Jenke, W. Seiberl, K. K, A. Schwirtz, and M. Buss, "A Comparison of PCA , KPCA and LDA for Feature Extraction to Recogniz
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FINGERPRINT VERIFICATION USING GABOR FILTER BANK |
Country | : | India |
Authors | : | S.M.Naigade, M.S.Kumbhar |
Abstract: Biometrics deals with identification of individuals based on their biological or behavioral characteristics. The use of fingerprints, for identification has been employed in law enforcement for about a century. An application of fingerprint is for personal authentication, for instance to access a computer, A bank-machine, cars or home.
[1] L. Hong, A. K. Jain, S. Pankanti, and R. Bolle. Fingerprint enhancement. In Proc. 1st IEEE WACV, pages 202{207, Sarasota, FL, 1996.
[2] P. E. Danielsson and Q. Z. Ye. Rotation- invariant operators applied to enhancement of _ngerprints. In Proc. 9th ICPR, pages 329{333, Rome, 1988.
[3] J. G. Daugman. Uncertainty relation for resolution in space, spatial-frequency, and ori- entation optimized by two-dimensional visual cortical _lters. J. Opt. Soc. Am., 2:1160{ 1169, 1985.}
[4] T. Chang. Texture analysis of digitized _ngerprints for singularity detection. In Proc. 5th ICPR, pages 478{480, 1980.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fusion of PET and CT images using wavelet transform |
Country | : | India |
Authors | : | Supriya Arote , Vaishali Upadhaye |
Abstract: PET/CT medical image fusion has important clinical significance. As the wavelet transform has several particular advantages in comparison with scalar wavelets on image processing, this paper proposes a medical image fusion algorithm based wavelet transform after in-depth study of wavelet theory. The algorithm achieves PET/CTfusion with wavelet coefficients fusion method. Experimental results show that fusion image combines information of the source images, adds more details and texture information, and a good fusion result. Based on the proposed algorithm, we can obtain the best result when using gradient fusion in the low-frequency part and classification fusion in the high frequency part.
Keywords - PET/CT; image fusion; wavelet transform
[1] Gonzalo Pajares *,Jesus Manuel de la cruz,A wavelet based image fusion tutorial- Pattern recognition 37(2004) 1855-1872
[2] Yuhui Liu The research of Northeastern university ,china,PET/CT Medical Image Fusion Algorithm Based On Multiwavelet Trasform ,2010,264-268
[3] Zhi-hai Xu^1,Ling-Xiang Liu^2,Lei Tong^3,Wavelet medical image fusion algorithm based on local area feature,2012,25-31 [4] Wavelet transform introduction to theory and application, RM Rao,Ajit Bopardikar
[5] Ivan W.Selesnick polytechnic University Brroklyn,NY,Wavelet Transform-A Quick Study,Sep 2007,1-11
[6] Jan Flusser,Filip Sroubek and Barobara,Image Fusion;Principles,Methods and application,2007
[7] Nicholos Triel,Stephane Mallat-Iamge Wavelet Decomposition and application,1989
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Gesture Recognition-A Review |
Country | : | India |
Authors | : | Miss. Kawade Sonam P, Prof. V. S. Ubale |
Abstract: Gesture Recognition means identification and recognition of gestures originates from any type of body motion but commonly originate from face or hand. Current focuses in the field include emotion recognition from the face and hand gesture recognition .Gesture recognition enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices. The applications of gesture recognition are manifold, ranging from sign language through medical rehabilitation to virtual reality. This paper focuses on the Gesture recognition concept, gesture types and different ways of gesture recognition.
Keywords - Image Professing and Pattern Recognition.
[2] Vladimir I. Pavlovic, Rajeev Sharma and Thomas S. Huang, "Visual Interpretation of Hand Gestures for Human-Computer Interaction: A Review", IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 19, NO. 7, JULY 1997, Page No. 677-682.
[3] Ms. Sweta A. Raut and Prof. Nitin J. Janwe, "A Review of Gesture Recognition Using Image Object Comparison and Neural Network", International Journal of Computer Technology and Electronics Engineering (IJCTEE) National Conference on Emerging Trends in Computer Science and Information Technology (NCETSIT-2011), Page No.57-58.
[4] Mokhtar M. Hasan and Pramod K. Mishra, "Hand Gesture Modeling and Recognition using Geometric Features: A Review", Canadian Journal on Image Processing and Computer Vision Vol. 3 No. 1, March 2012, Page No. 13-16.
[5] Shoaib Ahmed.V, "MAGIC GLOVES (Hand Gesture Recognition and Voice Conversion System for Differentially Able Dumb People)".
[6] Cédric Graf, "Arm and Body gesture recognition"
[7] Hatice Gunes and Massimo Piccardi, "Automatic Temporal Segment Detection and Affect Recognition From Face and Body Display", IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 39, NO. 1, FEBRUARY 2009, Page No. 70-72.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation Of Embedded Wireless Air Pollution Monitoring System |
Country | : | India |
Authors | : | Shashikant U.Suryawanshi, Deepganga I. Dhang , Ashish A. Chougule, Shailendra B. Mote |
Abstract: An Environmental Air Pollution Monitoring System for monitoring the concentrations of major air pollutant gases has been designed, developed, and tested complying with the wireless standard. This system measures concentrations of gases such as CO, NO2 and SO2, and using semiconductor sensors. [1] The hardware unit integrates a single-chip microcontroller, air pollution sensors array, a GSM-Module and a GPS-Module. [2] The Central-Server is a high-end personal computer application server with internet connectivity. The hardware unit gathers air pollutants levels (CO, NO2, and SO2), and packs them in a frame with the GPS physical location, time, and date. The frame is subsequently uploaded to the GSM-Modem and transmitted to the Central-Server via wireless network. The Central-Server is interfaced to Google Maps to display the location of hardware unit. The connection between the gas sensors and the microcontroller can be made by using signal conditioning electronic circuit. In the signal conditioning circuit is the combination of amplifier and analog to digital converter, The gas sensor provided output that is given to amplifier circuit and that output is given to the analog to digital converter and then to controller. [3] The microcontroller is the main component of a pollution detection unit. The program run inside the chip coordinates the substances measurement process.
Keywords: - Air pollution Monitoring; GSM Module; GPS Module; ARM controller; Sensors.
N. Kularatna and B. H. Sudantha, "An environmental air pollution monitoring system based on the IEEE 1451 standard for low cost requirements," IEEE Sensors J., vol. 8, pp. 415–422, Apr. 2008. W. Chung and C. H. Yang, "Remote monitoring system with wireless sensors module for room environment," Sens. Actuators B, vol. 113 no. 1, pp. 35–42, 2009.
Books: M.de Boer, Facing the Air Pollution Agenda for the 21s t Century, in Air Pollution in the 21st Century, Priority Issues and Policy, T. Schneider, Elsevier Science B.V.:Netherland,1998,pp.3-8. M. Predko, Programmi ng and Customizing PICmicro Microcontrollers, Mc Graw Hill, 2002 Theodore S. Rappaport, Wireless Communications, second edition, PHI. New Delhi
Chapters in Books:
N.D. van Egmond, Historical Perspective and Future Outlook,in Air Pollution in the 21st Century, Priority Issues and Policy, T. Schneider, Elsevier Science B.V.:Netherland,1998,pp.35-46.
Theses:
Y. J. Jung, Y. K. Lee, D. G. Lee, K. H. Ryu, and S. Nittel, "Air pollutio monitoring system based on geosensor network," in Proc. IEEE Int. Geoscience Remote Sensing Symp., 2008, vol. 3, pp. 1370–1373.
http://en.wikipedia.org/wiki/Pollution,Wikipedia.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Neutral-Point Clamped Multilevel Inverter Based Transmission Statcom for Voltage Regulation |
Country | : | India |
Authors | : | Ms.N.B.Mohite , Prof. Y. R. Atre |
Abstract: This paper deals with T-STATCOM used for voltage fluctuations with the help of multilevel VSI circuit A Power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure of end user equipments. This work describes the techniques of correcting the supply voltage sag, swell and interruption in transmission system. T-STATCOM works based on the VSI principle and injects a current into the system to correct the voltage sag, swell and interruption.
Keywords - Voltage source inverter,T-STATCOM , PWM..
2. E.Acha, V.G.Agelidis, O Anaya-Lara and T.J.E.Miller, "Power Electronic Control in Electrical Systems", Newnens Power Engineering Series 2002
3. K R Padiyar "FACTS controllers in power transmission and Distribution", New Age International Publishers, First Edition 2007.
4. Muhammad H. Rashid "Power Electronics circuits, devices and applications"Pearson Education, third edition, 2004.
5. G.Sundar ,S.RamaReddy,"Digital Simulation of D-Statcom for voltage fluctuations", International Journal of Engineering Science and Technology Vol. 2(5), 2010, 1131-1135
6. J. S. Lai, F. Z. Peng " Multilevel converters - a new breed of power converter", IEEE Trans. on Ind. Appl., Vol. 32 No 3 pp. 509-517,
7. Jose Rodriguez, Jih-sheng Lai"Multilevel Inverters : A Survey of Topologies, Control, and Apllications", IEEE Trans. on Ind. Elec., Vol. 49 No 4 pp. 724-738, 2002.
8. Nabae A, Takahashi I., Akagi H "A New Neutral Point Clamped PWM Inverter", IEEE Trans. On IA., 1981, IA-17(5), pp. 509-517.
9. Kalyan K Sen "STATCOM- STATic synchronous COMpensator: Theory, Modeling, and Applications" 1998 ,IEEE.
10. Mustapha Benghanem , Azeddine Draou " A New Modeling and Control Analysis of an Advanced Static Var Compensator using A Three-level (NPC) Inverter Topology" Journal of Electrical Engineering, Vol. 57, No.5, 2006, pp 285-290.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimization of energy charges using improved PROMETHEE method |
Country | : | India |
Authors | : | Mrs. S.G. Shirsikar, Mrs.Shubhangi Patil |
Abstract: In an electrical energy intensive industries the production cost is mainly affected by the cost of electrical énergy. The efficient use of electrical energy reduses the production cost. If the elecrical energyg is not managed properly, the Specific Energy Cost (SEC) i.e. cost of energy per unit output will not be optimized i.e.it is very high & some times not acceptable to the customer.This paper highlights solution to this important problem using a multiple criteria decision making method known as Preference Ranking Organization Method for Enrichment Evaluations (PROMETHEE). In this paper the PROMETHEE method is implemented to optimize the specific energy cost of the Textile Industry. This paper, deals with the energy optimization using improved PROMETHEE method which provides a complete ranking of the alternatives, from the best to the worst one, using the net flows. Keywords - PROMETHEE Method, AHP, Optimization, Ranking, Energy Charges, Load Curve.
[1] R.Venkata Rao, B. K. Patel,'Decision making in the manufacturing environment using an improved PROMETHEE method', International Journal of Production Research, 2009, 1-18.
[2] Wang, J.J. and Yang, D.L. 'Using a hybrid multi-criteria decision aid method for information systems outsourcing'. Computers & Operations Research, 34 (12), 2007, 3691–3700
[3] http://powermin.nic.in/distribution/energy_audit
[4] http ://www.renewableenergyworld.com
[5] http://www.mercindia.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pen Drive to Pen Drive and Mobile Data Transfer Using ARM |
Country | : | India |
Authors | : | Mr.V.S.Gawali , Mr.A.M.Agarkar |
Abstract: Generally, we used to transfer data between two pen drives by using laptops or desktops. But it is not always possible to carry such a large size device to the particular location. So to overcome this problem, we are designing a hardware which is more compact to carry anywhere. With the help of this project we can not only transfer the data but also we can see the transfer of the particular file which we want to send by using LCD display. In our project we are transferring the data between two pen drives without using any computers or laptops. We have designed a project which is known as pen drive to pen drive data transfer, and pen drives to mobile in which we will be transferring the data between two pen drives and pen drives to mobile using ARM processor. In the block diagram we can observe, whenever we insert the pen drive into the USB port then an signal will be sent to the arm processor indicating that source pen drive is inserted so now arm processor will start fetching the data from the source pen drive into the buffer and arm processor waits for the signal from destination pen drive. When arm processor gets the signal from the destination pen drive now arm processor is ready to transfer the data between those. Only the arm processor should get the input from external hard key from the user, once the user press the hard key the arm processor gets the information to transfer the data between two pen drives. While transferring the data the led blinking rate will be increased when data transfer is completed then led will stop blinking.
[2] Philips Semiconductors LPC2148 datasheet
[3] FTDI Inc, www.ftdichip.com/document Reference No.: FT-000006v. Vinculum Firmware User Manual Version 2.05.
[4] www.keil.com
[5] www.sciencedirect.com
[6] Future Technology Devices International Ltd. USB Data Packet Structure.
[7] www.usb.org
[8] www.alldatasheets.com
[9] EFY Times.com
[10] www.google.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | SEGMENTATION OF VERTEBRAE FROM DIGITIZED X-RAY IMAGES |
Country | : | India |
Authors | : | Ashwini Shivdas Shinde, Rohan A Choughle, Neeraj R Patil |
Abstract: The Hough transform is a technique which can be used to isolate features of a particular shape within an image. Because it requires that the desired features be specified in some parametric form. A generalized Hough transform can be employed in applications where a simple analytic description of a feature(s) is not possible. retains many applications, as most manufactured parts (and many anatomical parts investigated in medical imagery) contain feature boundaries which can be described by regular curves. The main advantage of the Hough transform technique is that it is tolerant of gaps in feature boundary descriptions and is relatively unaffected by image noise
Keywords: Generalized Hough Transform, R table, Accumulator bin, Template matching
[2] V.F. Leavers, "Which Hough Transform?", ImageUnderstanding, Vol. 58, No.2, pp. 250-264, Sep. 1993.
[3] J. Illingworth and J. Kittler, "The adaptive Hough Transform", IEEE Transactions on Pattern Analysis and Machine Intelligence, 9 (5), 1987.
[4] J. Illingworth and J. Kittler, "The adaptive Hough Transform", IEEE Transactions on Pattern Analysis and Machine Intelligence, 9 (5), 1987.
[5] S. Ando, "Consistent gradient operators", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 22, No.3, pp.252-255, March 2000.
[6] G. Zamora, H. Sari-Sarraf, S. Mitra, and R. Long, "Estimation of Orientation and Position of Cervical Vertebrae for Segmentation with Active Shape Models",
Proceedings of SPIE, San Diego, CA, USA, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Sigfree: Buffer Overflow Attack Detection |
Country | : | India |
Authors | : | P. H. Rathod , S. N. Dhage |
Abstract: Sigfree act as a Defender or protective shield for the today's Information world from insider or outsider attacker. Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Buffer Overflow attack is an attack which gives rise to other attacks as DOS attack. Buffer overflow is activated when a large amount of data is copied into fixed size memory. Buffer overflow attack gives opportunity to the attacker to change the return address of the function by some malicious content. In this paper we have proposed a system Sigfree which has two approaches. First approach analyses and distils machine code and second approach removes the data anomaly. Sigfree blocks the new and unknown attack. Sigfree uses the code abstraction method which separates the data and executable separately. Sigfree is generic i.e. Sigfree does not have the predefined signature or pattern for matching with worm signature. It generates the signature during the runtime. Sigfree detect the illegal or external instruction by monitoring the network traffic. Sigfree uses the recursive traversal algorithm with its ability to deal intelligently with control flow .Sigfree has low deployment and maintenance cost. Sigfree cuts down the false positive and false negative rate as compared to other network based or host based IDS.
Keywords- Buffer,Buffer Overflow Attack,Dynamic Techniques, Intrusion detection System, Static Techniques,.
[1]M. Zitser. Securing software: An evaluation of static source code analyzers. Master's thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Aug. 2003.
[2]Parasoft. Insure++: Automatic runtime error detection. http://www.parasoft.com, 2004.
[3] H. Etoh. GCC extension for protecting applications from stack smashing attacks. http://www.trl.ibm.com/projects/security/ssp/, Dec. 2003.
[4]C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke,S. Beattie, A. Grier, P. Wagle, Q. Zhang, andH. Hinton. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Conference, pages 63–78, San Antonio, Texas, Jan. 1998.
[5] AlephOne. Smashing the stack for fun and profit.Phrack Magazine, 7(47), 1998.
[6] F. Bellard. TCC: Tiny C compiler.http://www.tinycc.org, Oct. 2003.
[7] Xinran Wang, Chi-Chun Pan, Peng Liu, and Sencun Zhu, ―Sigfree: A Signature-Free Buffer Overflow Attack Blocker‖,IEEE Trans. On Dependable and Secure Computing, VOL. 7,NO. 1, Jan-Mar 2010.
[8] K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, andR.A. Olsson, ―Detecting Disruptive Routers: A Distributed Network Monitoring Approach,‖ Proc. IEEE Symp. Securityand Privacy (S&P '98), pp. 115-124, May 1998.
[9] A.T. Mizrak, Y.-C. Cheng, K. Marzullo, and S. Savage, ―Detecting and Isolating Malicious Routers,‖ IEEE Trans. Dependable and Secure Computing, vol. 3, no. 3, pp. 230-244, July-Sept. 2006.
[10]A surveyofintrusiondetectiontechniquesinCloud Chirag Modi a,n, DhirenPatel a, BhaveshBorisaniya a, HirenPatel b, Avi Patel c, MuttukrishnanRajarajan c.Journal ofNetworkandComputerApplications36(2013).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Solar Power Satellite |
Country | : | India |
Authors | : | Thorat Ashwini Anil, Prof.Katariya S. S. |
Abstract: The concept of placing enormous solar power satellite (SPS) systems in space represents one of a handful of new technological options that might provide large-scale, environmentally clean base load power into terrestrial markets. In the United States, the SPS concept was examined extensively during the late 1970s by the U.S. Department of Energy (DOE) and the National Aeronautics and Space Administration (NASA). More recently, the subject of space solar power (SSP) was re-examined by NASA from 1995-1997 in the "Fresh Look Study" and during 1998 in an SSP "Concept Definition Study." As a result of these efforts, in 1999-2000, NASA undertook the SSP Exploratory Research and Technology (SERT) program, which pursued preliminary strategic technology research and development to enable large, multimegawatt SSP systems and wireless power transmission (WPT) for government missions and commercial markets (in space and terrestrial). During 2001-2002, NASA has been pursuing an SSP Concept and Technology Maturation (SCTM) [1] program follow-up to the SERT, with special emphasis on identifying new, high-leverage technologies that might advance the feasibility of future SSP systems.
[1] J. O. Mcspadden and J. C. Mankins, "Space solar power programs and microwave wireless power transmission technology," IEEE Microwave Mag., pp. 46–57, Dec. 2002.
[2] W. C. Brown and E. E. Eves, "Beamed microwave power transmission and its application to space," IEEE Transactions on Microwave Theory and Techniques, vol. 40, no. 6, June 1992.
[3] Brown., W. C. (September 1984). "The History of Power Transmission by Radio Waves." Microwave Theory and Techniques, IEEE Transactions on (Volume: 32, Issue: 9 on page(s): 1230- 1242 + ISSN: 0018-9480).
[4] H. Matsumoto, "Research on solar power station and microwave power transmission in Japan: Review and perspectives," IEEE Microwave Mag., pp. 36–45, Dec. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Visual Cryptography Based on Halftoning |
Country | : | India |
Authors | : | Pratiksha P.Patil, Y.M. Patil |
Abstract: Visual cryptography is a type of cryptography which allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. It encodes a secret binary image into shares of different binary patterns. When the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a set of transparencies. But the shares of the decoded image have no meaning. Extended visual cryptography [1] was proposed to construct meaningful binary images as shares, but the visual quality is poor. In this paper, a technique named halftone visual cryptography is implemented to achieve visual cryptography via halftoning. This method utilizes the void and cluster algorithm [2] to encode a secret binary image into halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares is observably better than that attained by any available visual cryptography method.
Keywords - Digital halftoning, digital watermarking, error diffusion, secret sharing, visual cryptography.
[1] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Extended capabilities for visual cryptography," Theoret.Computer Science, vol. 250, no. 1–2, pp. 134–161, 2001.
[2] R. A. Ulichney, "The void-and-cluster method for dither array generation," in Proc. SPIE, Human Vision, Visual Processing, Digital DisplaysIV, Sep. 1996, vol. 1913, pp. 332–343.
[3] M. Naor and A. Shamir, "Visual cryptography," Adv. Cryptol.: EUROCRYPT, Lecture Notes Comput. Sci., vol. 950, pp. 1–12, 1995.
[4] M. Naor and B. Pinkas, "Visual authentication and identification," Crypto, Lecture Notes Comput. Sci., vol. 1294, pp. 322–340, 1997.
[5] C. Chang and H.Wu, "A copyright protection scheme of images based on visual cryptography," Imag. Sci. J., vol. 49, no. 3, pp. 141–150, 2001.
[6] C.Wang, S. Tai, and C. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Trans. Fundam. Electron.Commun.Comput. Sci., vol. E83A, no. 8, pp. 1589–1598, Aug. 2000.
[7] C. Blundo, A. De Santis, and D. R. Stinson, "On the contrast in visual cryptography schemes," J. Cryptol.: J. Int. Assoc. Cryptol. Res., vol.12, no. 4, pp. 261–289, 1999.
[8] C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson, "Contrast optimal threshold visual cryptography schemes," SIAM J. Discrete Math., vol. 16, no. 2, pp. 224–261, 2003.
[9] T. Hofmeister, M. Krause, and H. U. Simon, "Contrast-optimal k out of n secret sharing schemes in visual cryptography," Theoret.Comput.Sci., vol. 240, no. 2, pp. 471–485, Jun. 2000
[10] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Comput., vol. 129, no. 2,pp. 86–106, Sep. 1996.