Papers by Sangita Vishwakarma

The crucial issue on World Wide Web is the security of communication and authentic transmission o... more The crucial issue on World Wide Web is the security of communication and authentic transmission of confidential multimedia elements. Web has progressed towards becoming most ordinarily utilized media for communication and consequently message, voice, video, images and numerous more are transmitted through Internet. Cryptography is an important way of sending confidential information in a secret way. There are many cryptographic techniques available. One such variation is visual cryptography in which the image is divided into two or more shares in such a way that the original image cannot be recovered until all the shares are obtained and stacked together. In the present years, various algorithms of visual cryptography in image were considered and developed for the security of the image. In this paper, we have proposed visual cryptography in videos using pixel shuffling method as well as encrypting the videos shares using logistic chaos method. Experimental results and analysis show ...

Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability ... more Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability of gathering the data about environmental activities and making certain computations on them so that they can be communicated to the next node & finally to the Base Station. All the sensors work in co-ordination with each other to make communication successful. These sensors have to be continuously in active mode in order to receive and transmit data which increases their energy requirement. As these sensors are battery-powered, this continuous monitoring activity reduces their lifespan. Efficient management of energy is a critical requirement for the optimal design of a wireless sensor network. Thus, a protocol is critically needed that can make the wireless sensor network energy efficient. In this paper a detailed view and analysis of LEACH Protocol will be discussed. LEACH Protocol is a cluster-based hierarchical protocol which creates an energy balance in the network, saves the node ...
Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. pri... more Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion, contrast, security, accuracy, computational complexity, share generated is meaningful or meaningless, type of secret images(either binary or color) and number of secret images(either single or multiple) encrypted by the scheme. Intent of this paper is on study and performance analysis of the visual cryptography schemes on the basis of pixel expansion, number of secret images, image format and type of shares generated.
Uploads
Papers by Sangita Vishwakarma