Research Article | OPEN ACCESS
Secured Privacy Preserving Mechanism for Distributed Digital Documents
1F.R. Shiny Malar and 2M.K. Jeyakumar
1Department of Computer Science and Engineering
2Additional Controller of Examination, Noorul Islam University, Kumaracoil, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2015 5:495-503
Received: June 14, 2014 | Accepted: July 19, 2014 | Published: June 15, 2015
Abstract
The increasing availability of internet and digital imaging knowledge has given rise to the secret image sharing and visual cryptography. The unauthorized nature of data and sharing control systems, breach their privacy. To address this issue, a very efficient and robust visual cryptography scheme called, securitizing visual cryptography using error transmission technique. First, an efficient color image visual cryptic filtering scheme to improve the image quality on restored original image from visual cryptic shares. Fourier transformation and texture overlapping is applied to normalize the unevenly transformed share pixels on the original restored image. Second, privacy preservation using cache-cache mechanism which maintains cache inside a cache to preserve details about the users who shared the secret parts of digital document which has been split using visual cryptography is presented. Third, to enhance security for distributed file sharing in visual cryptography, binary spanning trees are used. Privacy of file sharing is performed with file block id relating to the participant id using binary trees. Finally, providing security and to achieve good quality of reconstructed image, error transmission technique is introduced. Experimentation carried out with bench mark data sets of real and synthetically generated data sets estimate the performance of Secured Privacy Preserving Mechanism for distributed digital document (SPPM) in terms of visual quality, time taken to read the text, security level.
Keywords:
Cache-cache mechanism, error transmission technique, image quality, privacy preservation, visual cryptography,
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|