Tuesday, December 31, 2019

The Haymarket Riot 1886 Labor Incident

The Haymarket Riot in Chicago in May 1886 killed several people and resulted in a highly controversial trial followed by executions of four men who may have been innocent. The American labor movement was dealt a severe setback, and the chaotic events resonated for many years. American Labor on the Rise American workers had begun organizing into unions following the Civil War, and by the 1880s many thousands were organized into unions, most notably the ​Knights of Labor. In the spring of 1886 workers struck at the McCormick Harvesting Machine Company in Chicago, the factory that made farm equipment including the famous McCormick Reaper made by Cyrus McCormick. The workers on strike demanded an eight-hour workday, at a time when 60-hour workweeks were common. The company locked out the workers and hired strikebreakers, a common practice at the time. On May 1, 1886, a large May Day parade was held in Chicago, and two days later, a protest outside the McCormick plant resulted in a person being killed. Protest Against Police Brutality A mass meeting was called to take place on May 4, to protest what was seen as brutality by the police. The location for the meeting was to be Haymarket Square in Chicago, an open area used for public markets. At the May 4th meeting a number of radical and anarchist speakers addressed a crowd of approximately 1,500 people. The meeting was peaceful, but the mood became confrontational when the police tried to disperse the crowd. The Haymarket Bombing As scuffles broke out, a powerful bomb was thrown. Witnesses later described the bomb, which was trailing smoke, sailing above the crowd in a high trajectory. The bomb landed and exploded, unleashing shrapnel. The police drew their weapons and fired into the panicked crowd. According to newspaper accounts, policemen fired their revolvers for a full two minutes. Seven policemen were killed, and it’s likely that most of them died from police bullets fired in the chaos, not from the bomb itself. Four civilians were also killed. More than 100 persons were injured. Labor Unionists and Anarchists Blamed The public outcry was enormous. Press coverage contributed to a mood of hysteria. Two weeks later, the cover of Frank Leslies Illustrated Magazine, one of the most popular publications in the US, featured an illustration of the bomb thrown by anarchists cutting down police and a drawing of a priest giving the last rites to a wounded officer in a nearby police station. The rioting was blamed on the labor movement, specifically on the Knights of Labor, the largest labor union in the United States at the time. Widely discredited, fairly or not, the Knights of Labor never recovered. Newspapers throughout the US denounced â€Å"anarchists,† and advocated hanging those responsible for the Haymarket Riot. A number of arrests were made, and charges were brought against eight men. Trial and Executions of the Anarchists The trial of the anarchists in Chicago was a spectacle lasting for much of the summer, from late June to late August of 1886. There have always been questions about the fairness of the trial and the reliability of the evidence. Some of the evidence presented did consist of early forensic work on bomb building. And while it was never established in court who had built the bomb, all eight defendants were convicted of inciting the riot. Seven of them were sentenced to death. One of the condemned men killed himself in prison, and four others were hanged on November 11, 1887. Two of the men had their death sentences commuted to life in prison by the governor of Illinois. The Haymarket Case Was Reviewed In 1892 the governorship of Illinois was won by John Peter Altgeld, who ran on a reform ticket. The new governor was petitioned by labor leaders and defense attorney Clarence Darrow to grant clemency to the three imprisoned men convicted in the Haymarket case. Critics of the convictions noted the bias of the judge and jury and the public hysteria following the Haymarket Riot. Governor Altgeld granted the clemency, stating that their trial had been unfair and was a miscarriage of justice. Altgeld’s reasoning was sound, but it damaged his own political career, as conservative voices branded him a â€Å"friend of anarchists.† Haymarket Riot a Setback for American Labor It was never officially determined who threw the bomb in Haymarket Square, but that didnt matter at the time. Critics of the American labor movement pounced on the incident, using it to discredit unions by linking them to radicals and violent anarchists. The Haymarket Riot resonated in American life for years, and there is no doubt it set back the labor movement. The Knights of Labor had its influence plummet, and its membership dwindled. At the end of 1886, at the height of the public hysteria following the Haymarket Riot, a new labor organization, the ​American Federation of Labor was formed. Eventually, the AFL rose to the forefront of the American labor movement.

Sunday, December 22, 2019

A Single, Comprehensive Solution For Environmental Challenges

A single, comprehensive solution to environmental challenges does not exist. The subject matter of the environment is interdisciplinary and entails diverse sets of strategies and solutions. Historically, collective action solutions have focused on conventional governmental regulations or privatization. It operates under the assumption that under the established apparatus of government and private institutions, individuals could join cooperative efforts and contribute to the cause. Hardin argued for the centralized administration of resources by governmental agencies or the privatization of the commons and allow the private enterprise to manage the common as it sees fit (Hardin 1968). Nobel prizing winning economist, Elinor Ostrom disputed such claims, asserting that governments have large agendas and cannot consider local environmental problems and some resources such as water and air cannot be privatized. Ostrom insists that the state or the market cannot be successful in ensuring the sustainable use of natural resources (Ostrom 1990). According to Ostrom and her research, an alternative approach to the problem of the commons is community mobilization, or polycentric governance. The alternative approach is characterized by multiple cooperative independent institutions organized and governed under a general system of rules. The citizens and officials of the community all come together to jointly chart the priorities and management of their local resources, while balancingShow MoreRelatedFormal Declaration Of Commitment To Environmental Sustainability Of Western University891 Words   |  4 Pages1. INTRODUCTION This report was contracted by Western University to reduce landfill disposal of a specific end-product on campus. As a signatory of the Council of Ontario Universities’ Formal Declaration of Commitment to Environmental Sustainability, Western University is dedicated to sustainability [1]. Through various sustainability programs, Western currently diverts approximately 50% of the total waste generated on campus from the landfill [2]. The acceptance of disposable paper coffee cups andRead MoreClimate Change And Environmental Threats1260 Words   |  6 Pages Climate change and environmental threats came more into focus in the last years and presently they represent a large challenge for the society. This means that environmental considerations have to be integrated into a number of different decisions made by businesses, individuals, policymakers and public administrators (Finnveden et al. 2009). Environmental Systems analysis is the field that ‘attempts to find supply technology systems solutions to these challenges’ (Chalmers University, 2012) InRead MoreGlobal Warming And Its Impact On The Environment Essay1672 Words   |  7 Pagesbecoming more and more aware of the environmental decay, they are torn as to the cause and the subsequent solution to the problem at hand. Litfin and Wapner highlight the issue from a legal stance, Magdoff and Foster evaluate the problem from an economic point of view while Weston opines that it is purely a problem of â€Å"stuff†. As a result in the difference in belief of the cause of the imminent state of the environment, they all put forward distinct solutions. Despite the diversity in their approachRead MoreTeen Pregnancy Is A Global Problem Essay1657 Words   |  7 Pagesparenthood on the economic, marital, and childbearing careers of young mothers (Gortzak-Uzan, Hallak, Press, Katz, M., Shoham-Vardi (2001). Teenage parents face many life challenges, for example, trying complete high school, finding and paying for quality child care, developing parenting skills, coping with s be ing a single parent, maintaining a relationship with the father of the child, attending college, securing safe and stable housing, and stable employment to support their family (KienstandRead MoreI Am A International Competitor1317 Words   |  6 Pagesam a learner. I am a sporting competitor. I am not afraid of failure. I am eager to learn the lessons required to reach the top. I dare say it is a very pleasurable mix. My views on learning are not extraordinary. They are however centred on comprehensive and investigative approaches to engineering problems. I am happiest when I am identifying problems – in a complex circuit, in control systems, logic and digital circuits or simply the detection of flaws in coding. When the problem is accessibleRead MoreEco City Advantages And Disadvantages1268 Words   |  6 Pagesfounded with the idea of reconstructing cities to be in balance with nature. The term today depicts a city that adheres to the three core pillars of sustainability: environmental stewardship, social equality and economic prosperity. How does an eco-city differ from a normal city, or even a sustainable city? Eco-city is ‘an urban environmental system in which input (of resources) and output (of waste) are minimized’. Overlap between the literature on eco-cities and that on urban planning and sustainabilityRead MoreExploration Of Oil And Gas Resources Essay1715 Words   |  7 Pageshigh performance standards and environmental concerns of their regulators and local communities. These stringent environmental concerns have led to research and development of many water based drilling muds but these muds still don’t offer the desired drilling performances like OBMs. We shall now look at the advantages and disadvantages of both OBMs and WBMs Advantages of WBM: WBMs pose a comparably minimal risk to the environment, there’s a lower logistical challenge as compared to OBMs in terms ofRead MoreAFP Versus Jollibee Food Corporation1605 Words   |  7 Pagesteamwork, spirit of family and fun, humility to listen and learn, frugality, honesty and integrity. The AFP has three general core values, honor, service and patriotism, further specified into twelve values. For the AFP, internalizing these values is a challenge, particularly integrity and honesty, considering the involvement of some high ranking officials with corruption. JFC has set two main objectives in their 2008 annual report, first, to sustain the same level of commitment of aspiring growth as aRead MoreThe Mystery Of Deep Ocean Ecosystems973 Words   |  4 PagesPacific oceans. With further research, we can hope to seek meaningful solutions to the many scourges of humanity. The oceans’ deepest places are crawling with microbes. These single-celled creatures could provide insight on everything from the origins of life to cures for diseases. Cameron’s expedition captured images of rocks covered in a stringy substance, more technically called microbial mats, representing clumps of these single-celled organisms. Researchers have found that these cells have theRead MoreIntel s Background On Computer Technology Industry Essay1586 Words   |  7 Pagesattention and using only conflict-free minerals in their products.    Intel has made great strides to improve their impact on sustainability by reinventing their product packaging and partnering with suppliers in their supply chain that have the same environmental goals. The company is committed to remaining transparent in their audits and insists on their goal of being a company that can provide a positive impact on our world.   Intel’s Supply Chain As a pioneer and leader in IT industry, Intel IT is working

Saturday, December 14, 2019

Gender wage gaps Free Essays

â€Å" In all of the advanced capitalist states adult females were sing the contradictions of an instruction which seemed to assure self-fulfilment, and a labor market based on inequalities of category and gender † ( Brinton, 1993, as cited in Threlfall, 1996, p. 270 ) . This statement has been made more than fifteen old ages ago and indicated that adult females were non treated every bit sing work and wage. We will write a custom essay sample on Gender wage gaps or any similar topic only for you Order Now However, have fortunes changed since so? If yes, did they better or decline and to which widen? The purpose of this paper is to analyze the being of a gender pay spread in Japan and Germany and to measure possible grounds for it. Furthermore, an mentality for the hereafter will be given at the terminal. 2. Gender Wage Gap in Japan The Nipponese jurisprudence system is regulated by the Nipponese Standards Labour Law which was enacted after World War II in 1947. This Nipponese Standards Labour Law contained a clause which should protect working adult females. In world, this clause prevented adult females from working inordinate overtime and during darks ( Sama and Papamarcos, 2000 ) . This is why adult females could non mount up the oily pole. Furthermore, this jurisprudence prohibited that adult females were treated otherwise on the footing of sex ( Threlfall, 1996 ) . On top of this, as stated by Threlfall ( 1996 ) , the Standards Labour Law covered merely equal rewards but non publicity or retirement. During this clip, employers could be sued for favoritism, but this was an expensive and time-consuming act as each instance had to be dealt with individually. Additionally, many companies circumvented the danger of cases by new scaling of occupation rubrics ( Threlfall, 1996 ) . This changed in 1986 when the Equ al Employment Opportunity Law ( EEOL ) was passed ( Sama and Papamarcos, 2000 ) . This jurisprudence encouraged companies in Japan to handle employees every bit in all facets like rewards, publicity, enlisting and hiring ( Threlfall, 1996 ) . Unfortunately, the EEOL contained no punishments for go oning favoritism and besides its amendment, which was enacted in 1999, did non truly better the inequalities sing pay and publicity between work forces and adult females ( Sama and Papamarcos, 2000 ) . Figure 1 clarifies these of import labor Torahs in Japan. Figure 1: Legal Mechanisms and Government Enterprises Nipponese Labour Standards Law of 1947 Contained protective clause for working adult females. Came under examination in 1970s as a possible hindrance to adult females ‘s calling promotion. Equal Employment Opportunity Law ( EEOL ) of 1986 Enacted in 1987, the EEOL called for equal wage for equal work. No punishments for lawbreakers. Employers asked merely to do a good attempt. June 1997 Amendment to the EEOL Enacted in 1999, the amendment lifted limitations on midnight, vacation, and overtime work by adult females in consequence since the 1947 Labor Standards Law. Further stiffened warnings against companies found in misdemeanor of the EEOL. No punishments attached. Beginning: Adapted from: Sama, L. and Papamarcos, S. ( 2000 ) . ‘Culture ‘s effects for working adult females in corporate America and Japan, Ind. ‘ . Cross Cultural Management – An International Journal. Vol. 7, No. 2, pp. 18-29. Harmonizing to Selmer ( 2001 ) , the Nipponese â€Å" pay system is based on senior status † ( pp. 236-237 ) . This indicates that publicity and pay rise are automatic and no topic to occupation responsibilities or virtue ( Selmer, 2001 ) . That means that employees get publicity and pay rise when they reach certain age degrees. â€Å" The gender pay spread is measured as the average pay of work forces minus the average pay of adult females, expressed as a proportion of the average pay of work forces † ( Evans, 2002, p. 191 ) . As stated by the World Economic Forum ( 2005 ) , â€Å" no state has yet managed to extinguish the gender spread † ( p. 1 ) . Harmonizing to OECD ( 2007 ) , the adult females ‘s medium pay in Japan is two tierces of that received by work forces. This represents twice the OECD norm. Figure 2 displays the gender pay spread of several states. Blau and Kahn ( 2003 ) stated that the gender pay spread in Japan is up to 85 % ( as cited in Johnes and Tanaka, 2006 ) . This means that adult females earn up to 85 % less than work forces. Recent beginnings indicated a gender pay spread of 65.9 % for 2007 ( Nipponese Institute for Labour Policy and Training, 2008 ) . The differences in the gender pay spread are capable to different informations used for analysis. Some computations include parttime workers, which are chiefly female and others base their computations on full-time employees merely. Figure 2: Gender Pay Gap in 2003 Beginning: Adapted from: OECD ( 2007 ) . ‘Highlights Japan ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.oecd.org/dataoecd/20/20/39696303.pdf [ Accessed 29 December 2008 ] . 3. Reasons for the Gender Wage Gap in Japan As already stated above, Nipponese houses discriminate on the evidences of gender when paying employees. This chapter evaluates several grounds for the gender pay spread in Japan. First of wholly, many workers in Japan acquire a lifetime employment contract ( Ishii, 2000 ) . Nipponese houses make immense investings in employee preparation and that is why they want their employees to remain as long with the company as possible. Therefore, the continuance of fond regard to a house plays an of import function when negociating rewards. As it is most frequently foreseeable that adult females will non remain with one company for their whole life, because they want to get down a household one twenty-four hours, they reasonably much ne’er acquire a life-time contract ( Ishii, 2000 ) . Therefore, as stated by Ihsii ( 2000 ) , companies make no investing in human capital when they employ adult females as they think they will non profit in the hereafter from this investing as adult femal es sooner or later leave the company. The 2nd ground for the gender pay spread is based on different experiences. Miyoshi ( 2007 ) argued that there is no gender wage spread when people are employed straight after school, college or university. But when employees accumulate work experience, the pay spread enlarges. Miyoshi ( 2007 ) explains this fact by mentioning to the full-time work experience and senior status. The more full-time work experience an employee has, the more valuable he is. As adult females frequently have less work experience because of child-raising duties and merely parttime occupations, the get less money and less publicity than their male opposite number. Different features of workers represent the 3rd ground for the gender pay spread in Japan. Johnes and Tanaka ( 2006 ) explained that different features like age, work experience, instruction and continuance of work are one ground for the gender wage spread in Japan. They agree with Miyoshi when saying that differences in work experience are the ground for wage inequalities, but they extend the statement by adding other features like age and instruction. The greater portion of the gender pay spread in Japan can be explained by mentioning to the grounds stated above. However, there is besides a smaller portion of the net incomes spread that can non be explained. Harmonizing to Kawaguchi ( 2006 ) , this portion can be attributed to arouse favoritism. 4. Gender Wage Gap in Germany Sing German jurisprudence, article 3 paragraph 2 of the German Fundamental law of 1949 provinces that work forces and adult females have equal rights ( Maier, 2007 ) . Furthermore, paragraph 3 provinces that no 1 should be discriminated on the evidences of gender. This right for equal intervention and payment was non practiced in world as particular pay groups for adult females were allowed in corporate understandings until 1955 ( Maier, 2007 ) . Furthermore, Maier ( 2007 ) stated that most employees in Germany are paid harmonizing to these corporate understandings, â€Å" although the coverage is worsening † ( p. 11 ) . In 1980, a new paragraph was added to the German Constitution which demanded equal wage for work of equal value ( Winter, 1998 ) . But this amendment brought no opportunity. Later, in 2006, the General Equal Treatment Act was passed and paragraph 7 prohibited â€Å" unequal intervention within any employment relationship † ( Maier, 2007, p. 18 ) . This jurisprudence stated that lower rewards for adult females are non justified if they are based on gender. Unfortunately, German jurisprudence still lacks legal steps to command the execution of equal pay rules. Furthermore, Maier ( 2007 ) stated that it is non easy for adult females to claim their right for equal wage. Class actions are non allowed and therefore, all adult females must convey their single claim to tribunal. As this is frequently an expensive and time-consuming procedure, many complainants refrain from registering a suit ( Maier, 2007 ) . That is why Germany has a important high gender pay spread, although the German authorities has a female Chancellor of the Exchequer ( Plass, 2008 ) . In world, as stated by Plass ( 2008 ) , Germany has one of the highest gender wage spreads on the European continent. Furthermore, more than 90 per centum of all on the job adult females are discriminated and earn between 80 and 210 cents less per hr ( Grad A ; iacute ; n, del R A ; iacute ; o and Cant A ; oacute ; , 2006 ) . Legal norms for equal wage in Germany are displayed in figure 3. Figure 3: Legal Norms on Equal Pay in Germany Legal footing Article/paragraph Persons covered Basic Law ( Grundgesetz ) Article 3 Para 2 and 3 All employees Civil Code ( B A ; uuml ; rgerliches Gesetzbuch )  § 612 Para 3 ; Replaced by General Equal Treatment Act ( Allgemeines Gleichstellungsgesetz AGG ) in 2006,  §Ã‚ §3, 7, 8 Any employment relationship Beginning: Adapted from: Maier, F. ( 2007 ) . ‘The continuity of the gender pay spread in Germany ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.harriet-taylor-mill.de/pdfs/ discuss/Discussion % 20Paper % 2001 % 202007.pdf [ Accessed 29 December 2008 ] . Harmonizing to the German authorities statistics agency, Destatis, working adult females in Germany earned 24 per centum less than work forces in 2006 ( as cited in Plass, 2008 ) . As stated by Maier ( 2007 ) , this figure has been reduced to 22 per centum in 2007. Whereas the mean difference in wage is 15 per centum in the European Union ( Spiegel Online International, 2008 ) . 5. Reasons for the Gender Wage Gap in Germany Several grounds contribute to the big gender pay spread in Germany. First of wholly, as mentioned by Lauer ( n.d. ) , adult females frequently do non possess the same instruction and accomplishments as work forces do. Employers who place value on these exact accomplishments are likely to pay adult females less in order to counterbalance the deficiency of accomplishments and cognition. Furthermore, Lauer ( n.d. ) besides mentioned that accomplishments and cognition may be rewarded otherwise between work forces and adult females. Meaning that adult females with the same educational background and cognition will gain less because these indistinguishable accomplishments are non rewarded the same manner by the employer. In add-on, Maier ( 2007 ) identified the deficiency of legal barriers against low rewards as a ground for the gender wage differences in Germany. As there exists no general lower limit pay in Germany, and as the state has about three million unemployed individuals ( Bundesagentur f A ; uuml ; R Arbeit, 2008 ) , it is easy for employers to make full a low-paid vacancy. Furthermore, Lauer ( n.d. ) identified occupational crowding of adult females in low paid businesss as another beginning for gaining inequalities between work forces and adult females in Germany. There is besides the fact that there is a low proportion of working adult females in extremely paid places ( Maier, 2007 ) . Concluding, Maier ( 2007 ) stated that factors like age, instruction and work experience present merely a really unimportant ground for pay favoritism. Again, the unexplained portion of the gender pay spread can be attributed to favoritism based on gender ( Lauer, n.d. ) . 6. Similarities and Differences between Japan and Germany After analysing the gender pay spread in Japan and Germany and its grounds, several similarities every bit good as differences can be pointed out. First of wholly, there is a important high gender pay spread in both states, although the difference in net incomes is higher in Japan with about 35 per centum compared to Germany with approximately 22 per centum ( Maier, 2007 ) . However, the German net incomes spread is 7 per centum higher than the European Union norm ( Spiegel Online International, 2008 ) . Both states put accent on the features of employees. Age, work experience and instruction are of import when negociating rewards. As adult females frequently have less instruction or work experience than work forces ( Lauer, n.d. ) , they get paid less than their male opposite number. Furthermore, portion of the gender pay spread in both states is an unexplained portion which can be attributed to gender favoritism ( Kawaguchi, 2006 ; Lauer, n.d. ) . Differences between the two states can be found in the fact that Nipponese employers discriminate when puting in human capital. Due to the Nipponese lifetime employment, many employers consider instead carefully whether to use adult females or non. As it is obvious to them that adult females will go forth the company some twenty-four hours for child-raising responsibilities, they will thereby take away the human capital in which the company invested. 7. Decision Even if both states enacted Torahs in the 80ies which should guarantee equal wage for work of equal value, there is still a important gender pay spread discernible. Japan every bit good as Germany managed during the last to decennaries to contract this spread, but this happened likely merely because of the new Torahs which were enforced. When looking in front, both states will likely hold a different hereafter. Japan will lodge to its lifetime employment system ( Kato, 2001 ) and thereby will maintain the net incomes spread between work forces and adult females stable. The fact that more and more Nipponese adult females decide to prosecute their callings can perchance assist in contracting the gender wage spread ( Fackler, 2007 ) . Germany is likely to increase the gender wage spread as the coverage of corporate understandings, which set equal rewards for work forces and adult females, is worsening ( Maier, 2007 ) . Furthermore, every bit long as there is no support from the authorit ies to implement the right for equal money for work of equal value, the gender pay spread will non be narrowed. 8. Bibliography, Blau, F. and Kahn, L. ( 2003 ) . ‘Understanding international differences in the gender wage spread ‘ . Journal of Labor Economics. Vol. 21, pp. 106-144. Brinton, M. ( 1993 ) . Womans and the economic miracle: gender and work in post-war Japan. Berkeley: Calif. Bundesagentur degree Fahrenheit A ; uuml ; R Arbeit ( 2008 ) . ‘Der Arbeits- und Ausbildungsmarkt in Deutschland ‘ ( The work and instruction market in Germany ) [ on-line ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.pub. arbeitsamt.de/hst/services/statistik/000000/html/start/monat/ aktuell.pdf [ Accessed 6 January 2009 ] . Evans, J. ( 2002 ) . ‘work/family rapprochement, gender pay equity and occupational segregation: the function of rims and public policy ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //economics.ca/cgi/jab? journal= cpp A ; view=v28s1/CPPv28s1p187.pdf [ Accessed 16 December 2008 ] . Fackler, M. ( 200 7 ) . ‘Career adult females in Japan find a out of use way ‘ . The New York Times, [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www. nytimes.com/2007/08/06/world/asia/06equal.html [ Accessed 6 January 2009 ] . Grad A ; iacute ; n, C. , del R A ; iacute ; o, C. and Cant A ; oacute ; , O. ( 2006 ) . ‘Poverty and adult females ‘s labour market activity: the function of gender pay favoritism in the EU ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.ecineq.org/milano/ WP/ECINEQ2006-40.pdf [ Accessed 6 January 2009 ] . Ishii, H. ( 2000 ) . ‘Occupational segregation and the gender pay spread in Japan ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.kli.re.kr/ iira2004/pro/papers/HisakoISHII.pdf [ Accessed 05 January 2009 ] . Nipponese Institute for Labour Policy and Training ( 2008 ) . ‘Wages and labor costs ‘ [ o nline ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.jil.go. jp/english/estatis/databook/2008/05.htm [ Accessed 05 January 2009 ] . Johnes, G. and Tanaka, Y. ( 2006 ) . ‘Changes in gender pay favoritism in the ninetiess: a narrative of three different economic systems ‘ . Japan and the World Economy. Vol. 20, pp. 97-113. Kato, T. ( 2001 ) . ‘The terminal of lifetime employment in Japan? : grounds from national studies and field research ‘ . Journal of the Japanese and International Economies. Vol. 15, pp. 489-514. Kawaguchi, D. ( 2006 ) . ‘A market trial for sex favoritism: grounds from Nipponese firm-level panel informations ‘ . International Journal of Industrial Organization. Vol. 25, pp. 441-460. Lauer, C. ( n.d. ) . ‘Gender pay spread in West Germany: how far do gender differences in human capital affair? ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //papers.ss rn.com/sol3/papers.cfm? abstract_id=217651 [ Accessed 6 January 2009 ] . Maier, F. ( 2007 ) . ‘The continuity of the gender pay spread in Germany ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.harriet-taylor-mill.de/pdfs/discuss/Discussion % 20Paper % 2001 % 202007.pdf [ Accessed 29 December 2008 ] . Miyoshi, K. ( 2007 ) . ‘Male-female pay derived functions in Japan ‘ . Japan and the World Economy. Vol. 20, pp. 479-496. OECD ( 2007 ) . ‘Highlights Japan ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.oecd.org/dataoecd/20/20/39696303.pdf [ Accessed 29 December 2008 ] . Plass, S. ( 2008 ) . ‘German adult females struggle with gender pay spread ‘ . International Herald Tribune, [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: // www.iht.com/articles/2008/08/28/business/women.php? page=1 [ Accessed 31 December 2008 ] . Sama , L. and Papamarcos, S. ( 2000 ) . ‘Culture ‘s effects for working adult females in corporate America and Japan, Ind. ‘ . Cross Cultural Management – An International Journal. Vol. 7, No. 2, pp. 18-29. Selmer, J. ( 2001 ) . ‘Human resource direction in Japan ‘ . International Journal of Manpower. Vol. 22, No. 3, pp. 235-243. Spiegel Online International ( 2008 ) . ‘German adult females earn a fifth less than work forces ‘ . Spiegel Online International, [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.spiegel.de/international/germany/0,1518, 558526,00.html [ Accessed 31 December 2008 ] . Threlfall, M. ( 1996 ) . Maping the adult females ‘s motion. London: Verso. Winter, R. ( 1998 ) . Gleiches Entgelt degree Fahrenheit A ; uuml ; r gleichwertige Arbeit: Ein Prinzip ohne Praxis ( Equal wage for work of equal value: a rule without practice. ) . Baden-Baden. World Economic Forum ( 2005 ) . â⠂¬ËœWomen ‘s authorization: mensurating the planetary gender spread ‘ [ online ] . Available at: Uniform resource locator: hypertext transfer protocol: //www.weforum.org/pdf/Global_Competitiveness_Reports/Reports/gender_gap.pdf [ Accessed 30 December 2008 ] . How to cite Gender wage gaps, Essay examples

Friday, December 6, 2019

Class Observation free essay sample

I choose to observe a primary 5 class in NT District. The lesson that aims to improve the confidence level of the students is made up of students who are weak in English. There are 30 students in the class, 17 boys and 13 girls. The gender ratio reduces biasness and made the class an ideal class to study. In the following paragraphs, I will explain how the class was conducted and the teaching methodologies of the teacher. Procedure 1. Pre-observation meeting Before the lesson, I had a meeting with the teacher. We first discussed the contents and objectives of the lesson. The lesson is a speaking class which aims to build students confidence in speaking. While improving students speaking ability is important, it is only secondary in this lesson. Next, we discussed about the activity that the students would do during the class to achieve the objectives. We will write a custom essay sample on Class Observation or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The activity was a game named ‘on board which would use in the lesson to achieve the objectives. I understand that she uses the PPP model in this lesson. The teacher would play the role of a manager, an organizer and a tutor. She mentioned that this is atypical of her routine teaching which she focuses mainly on the grammar teaching. Furthermore, a writing course is not part of the lesson plan according to the course designed by the English panel. 2. Observations The classroom has an adequate setting. It is sufficiently lighted, spacious and well furnished. There is a big blackboard in the front of classroom and the room is equipped with latest audio video technology. It has good movie projector with a laser pointer. Computer with the internet connection is another feature of the room. Instructors can use them for effective teaching. There were 30 students in the classroom. Some of them sat at the front, while the others sat near the end of the hall. They were well dispersed and worked independently. 2. 1 Recall section The class lasted about 35 minutes; it started at 11. 15 am and ended at 11. 50 am. There were two observers in the class, namely the colleagues of the teacher and me. Before the observers came into the class, the teacher announced that the class was ready to begin and instructed students to settle down. Two minutes after, students became quiet and greeted their teacher formally. The teacher shortly introduced the observers to them and asked them to give a warm welcome: we received three rhythmic claps after the teacher signal hands ready to students. First of all, the teacher did the session to help students to recall the phases they learnt previously by showing them some flash cards and invited students to the stage to read it. There were 7 cards in total, which were ‘a bottle of blackcurrant   juice, ‘ a pattern of waffle†, â€Å"a bottle of soya bean milk†,† a cup of yogurt† ,†a loaf of bread†, â€Å"a bar of chocolate†Ã‚   and â€Å"a cup of coffee†. A girl called Mary came to the front of the classroom and pointed at two objects in the flash cards by speaking loudly. After she finished it, teacher praised her instantly and appointed a boy named Mark to draw a happy face on the blackboard below the name of the girl. Following by other students came to the front; they finished recalling all flash cards. When some children were stuck on some words like blackcurrant, the teacher provided help quickly by whispering. After recalling phases, the teacher started to use the projector to show students some sentences which expanded these phrases to a sentence, such as† I want a bar of chocolate†, â€Å"this is a loaf of bread†,† my brother is having a cup of yogurt† ect. She invited students to speak in front of class again. However, there were lots of commotions from the students that were not on the stage. When the teacher thought that the class was out of control, she used the order hands up to again bring order to the class. The recalling section lasted about 15 minutes. 2. 2 Game section The game ‘on board took place around 11. 0 am. The teacher grouped students into two large groups by an equal proportion, the left part and the right part, and then appointed Mark to keep record of the scores. She explained the rules explicitly that every group would send a student to the stage; he or she could choose a flash card which picture side faced to other classmates t hen made a sentence. The mark varied from one to three based on their performance. One mark was given to student who can only point out the object. The student would be awarded two marks if he could make a sentence with the phrase or read the phrase out very loudly. Finally, the students would be awarded three points if the student was able to make a sentence with the phrase and read the phrase out very loudly. However, the teacher did not shut down the computer after introducing the rules and the students could still view the sentence patterns on the screen. Although the medium of the communication for the class was English, the teacher used Cantonese several times in order to discipline the students. Students were highly motivated at the beginning of the game; many of them volunteered to go first. However, the teacher chose students based on their seating location and every child had an equal opportunity of playing the game. The performance of students varied with their English proficiency. Some of them had difficulty in recognizing words like â€Å"waffle† and â€Å"blackcurrant†; and some of them failed to articulate clearly which was due to their unfamiliarity of sentence pattern. These students seemed to pay no attention to the sentence pattern on the big screen. Many students willingly provided help when they saw their fellow classmates met difficulty on the stage while others chatted with their friends around them. As the game progressed, the class got more rowdy. Finally, the teacher used the code hands ready again to maintain order. Criteria for scoring changed with time. Initially, the scoring was difficult but the teacher relaxed the rules. Many of students could get 3 marks by turning back to read the sentence on the screen. The teacher began to forbid students looking back when they were standing on the stage. In addition, a number of grammar mistakes like my brother like drink blackcurrant juice were not corrected instantly by teacher. Some students lost their interest in the game. For example, a shy boy near the back of classroom was eager to join the game at the beginning but since his neighbors did not pay attention to his signal of communication, he began to play his textbook by tearing down a few small pieces of pages. In contrast, several more positive students could not wait to show off themselves by speaking loudly, one of them even came to the front of class to correct the mistakes made by the child on the stage. The class was chaotic again and the teacher had to use the order code hands up for commanding student to obey the principle of classroom. She warned the student who came to the front by commanding the Mark draw an unhappy face on the right side of black board. At the very last 5 minutes, the teacher accounted the scores of each group and announced the winner following by a short conclusion of this speaking lesson. 3. Post- observation Few days after the observation, I had a short conversation with the teacher. When I asked about her general feeling of the class, she thought that one activity for the lesson was too dull but she was happy for the progress made. A girl who used to be quite inactive in class commented that the English class was very interesting. The teacher was most satisfied with the encouragement she gave to students, but she was unhappy with only having one activity in the class. She believed that the strength of her teaching was the sufficient interaction with students. Reflections 1. The learner 1. 1 Attending to the learner Teachers attending behavior is important to achieve a successful humanistic learning environment for our students. It has been said that one cannot teach a language the best one can do is to make the conditions right for learners to learn. Part of these ‘right conditions involves how the teacher relates to-or attends to-the learners. For this reason, I paid attention to observe the teachers attending behavior towards the learners: the way the teacher acknowledged, through verbal or non-verbal means, the presence, contribution, and needs of individual learners. In this case, the obvious attending strategies used by teacher were the use of students names and abundant eye contact with her students. The gender of student was not relevant to the distribution of teacher attention in here whereas the seat arrangement lent itself to a particular spread of teacher attention. The students sat at the back of the classroom did not get the equal attention compared with the students in front and the middle. What I learned from her attending strategies is that we should try to give equal amount of attention to students. 1. 2 Learner motivation Learner motivation whatever it is the instrumental motivation or integrative motivation, its level (high or low) has an impact on expected learner roles. Highly motivated learners are more likely to synchronise their roles willingly with the teachers role and are more likely to co-operate with the teacher in the various processes involved in classroom learning. Those children who raised their hands for coming to the stage are good evidence. They willingly responded to teachers questions and passionately involved into the activity. 1. 3 Learner level One objective of this observation is to check whether the teacher accommodates her teaching to the different learning levels of students. A teacher should read the indicators of challenge in order to assess whether the level of difficulty is indeed appropriate. If all students can do an activity easily and accurately then it is probably below the appropriate level of difficulty for this class. Though this class is a weak class in the school, the level of students is not homogenous. The teacher was alerted to the indicators of challenge, which reflected on some aspects that non-comprehension in facial expression, student waiting time before response and first respondent does not offer the correct answer. When students consistently did not quickly and accurately point out the objects or make sentences, she lowered the standard in order to avoid potential frustration of weaker students. 2. Language 2. 1 The teachers meta-language The term ‘meta-language in here means the language a teacher uses to allow the various classroom processes to happen, that is, the language of organizing the classroom. The language use here should be genuinely contextualized, purposeful, communicative and potentially rich in input. For example, according to students language ability, she avoided using the type of questions that would involve complex response but using yes/no questions like ‘here is a picture of a bottle of blackcurrant juice. Have you seen it before? and display questions like ‘what is it in the picture? Or what is the sentence on the first raw? Her language use fulfilled the cognitive and linguistics demands made on the learners. 2. 2 The language of feedback to error Most teachers are aware of feedback in terms of its motivational value: the value of positive feedback and the dis-incentive that negative reinforcement can produce. In this speaking class, the teacher believed that she should not interrupt students in mid-flow to point out a grammatical, lexical or pronunciation error, since to do so would interrupt the communication and drag an activity back to the study of language form or precise meaning. Thus, a number of expressions like ‘my brother like a bar of chocolate and ‘ there a bottle of yogurt were accepted by teacher till it were made too many times then she corrected it. I think students benefit more from less intervention in communicative task. However, the timing of teacher interventions should be concerned with the error types and the aim of lesson. 3. Educational climate for learning Few would now doubt that people learn best when they are relaxed, comfortable, unstressed, interested and involved in what is going on, and motivated to continue. This class impressed me deeply by its anticipative classroom atmosphere. The teacher always used positive reinforcement like smiled, nods, called by name to encourage students even when a child violated the principle of class for attempting to replace his weaker fellow, she did not penalize him. I could see most of children did enjoy this class by their facial expression. 4. Teaching Skills and Strategies 4. 1 Presenting The skill of presenting is important in the repertoire of a language teacher, as learners often look to the teacher to perform this role. As a trainee teacher, two key components of a presentation seem more important to me: The teachers voice and the physical position of the teacher in the classroom. The former one composes a number of qualities which are audibility, projection, speed, clarity and lack of distortion. During the observation, I noticed the speed of teachers speech was moderate and her articulation was clear which did not confuse her students. In addition, she stayed on the stage for the whole lesson, but I think that she could go to middle or back of classroom instead. 5. ClassroomManagement 5. 1 Managing group work Group work requires different teacher skills to transit between different interactive patterns smoothly and efficiently in teacher-led activities. The teacher chose to separate children into two groups which created groups of mixed levels but each group had too many members and no leaders were ppointed to help teacher to manage their group members. Consequently, she had to use the principle code ‘hands ready or ‘are you ready many times. In my opinion, the teacher could group students into four groups and appoint some group leaders to assist her in monitoring other students. 5. 2 Teaching and learning roles An important aspect of effective teaching is the fa cility with which a teacher can move in and out of these various roles and enable learners to do likewise. The flexibility itself depends on the teachers understanding of the purposes of different stages of a lesson and a clear sense of what the various corresponding roles of teachers and learners are. The teacher adapted a focused instructional cycle which was the Presentation-Practice-Production style of lesson. In here, wherever in the lesson the production phase occurred (e. g. children made a sentence), the relative and interconnected roles of teacher and learners remained as facilitator to producer or guide to communicator (e. g. he teacher gave tips for helping weak students). I also think the order of the three ‘Ps can vary sometimes, for example, in order to establish with clarity areas of need and motivation, the production stage may come before the presentation. 5. 3 Timing and pace The fact that teaching is itself a contrivance, an event that is structured and planned, means that it is a process affected by the parameters and constraints of time. It is very difficult for trainee teachers to predict the length of the activity. The teacher of this observation set a good example for me to follow. She handled with timing and pace well by considering a number of factors, like the age of the learners, the difficulty of task, and the level of her students. 6. Materials and Resources The materials use depends on goals, input, activity, roles and setting that the lesson wishes to achieve. The teacher did not prepare any handouts to students in this speaking class but using the flash cards and projector as instructional materials. The materials contained extrinsic value for the affective side of those kids who can use it in their daily life. 7. Lesson Planning The planning of teaching can be seen as a series of decisions made by a teacher about various elements of a lesson- learners, materials, tasks, etc. the nature of different lesson is various: a lesson devoted to role-play will be different from a writing lesson or one devoted to an analysis of grammar. Based on the observation, I can see that the teaching plan had set up activity that promoted communication, realistically contextualized language, motivated a certain number of students and checked the comprehension, but just as the teacher mentioned in the post-meeting, she did not plan enough activities. Besides that, she did not intend to incorporate speaking as a component into her future classroom teaching, which means that students confidence in spoken English would not be improved. Thus, the inconsistency of lesson planning was the weakness of her teaching. Conclusion Being an observer in the classroom, rather than the teacher, gave me the freedom to look at the lesson from a range of different perspective. For the trainee teacher like me, this freedom is particularly important, it helps teachers gain a better understanding of teaching theories were used in actual lesson. From this observation exercise, I appreciated how the teacher values interaction with her students through game, however her lesson plan is not comprehensive and do not take speaking into her future teachings. I wish that I am able to improve on this area of teaching so that my students will have a more holistic education.

Friday, November 29, 2019

Horse Dealers Daughter By Lawrence Essays - Concepts, Notation

Horse Dealer's Daughter By Lawrence In "The Horse Dealer's Daughter," symbols are used to fulfill the quest of happiness and love. This love story, written by D.H. Lawrence, has many symbols, which show hidden meaning. One can fully understand a story, if one can point out certain symbols. Symbols create ideas and images for the reader to better understand the story. Mabel, one of the two main characters in this story, is depressed and suicidal. After her mother died, she feels like there is nothing to live for. Her mother was the love and joy in her life; without her, she is lost. All she has left is her house, which she is extremely proud of, and her brother, which she seems not to care for. She decides to release herself from her troubles by drowning herself in a pond. The other main character, Dr. Fergusson, sees her and tries to save her life. This pond is a strong symbol with many meanings. It is a start of a new experience, and a change of two people's lives. The pond is described as dead and cold. This symbolizes that Dr. Fergusson had no feelings for Mabel before the incident. The narrator describes the pond as lifeless right before the doctor had entered it. Before going in, the relationship between them was dead and cold, and they had no passionate feelings for one another. Dr. Fergusson tries to rescue Mabel for no other reason but because he was doing his job. The pond also describes Dr. Fergusson's life as dull and pointless. His life was still and silent before he had met her. He was afraid to go in too deep into the pond, and was afraid of drowning. This represents his fear of falling in love. He was scared of the water because he could not swim, and also because he was scared of love. He never experienced it, so it frightened him. When he finally falls in, he felt Mabel's clothing and pulled her up. This means that when he fell into the pond, he found love. It was like fate had pushed him into the water to meet the woman he was meant to be with, for the rest of his life. He found love in a dead and cold pond, which means sometimes one has to look at even the unimaginable places to find happiness. In a dead place such as the pond, you can find something that is alive such as love. This pond symbolizes the start of their love for each other, since they fall madly in love afterwards. The water symbolizes baptism and rebirth, and when she steps into it, her troubles are washed away. It represents cleanliness and the start of new life. Her life before felt meaningless to her, and she wanted to get out of it. She had nobody to love and care for her, after her mother had died. She never tries anything new and when she finally does, something amazing happens to her. Dr. Fergusson's life was just as pointless as hers was. He had a good job working with many kinds of people, but he did not enjoy his life. He had no love in his life, and without it, there is nothing to live for. The pond also symbolizes a new start of his life, since he finds love. It baptizes them and they both get a new sense of life. When Mabel changes her clothes at the end of the story, she is starting her new life. The clothes symbolize a new and fresh experience, one of which she had never experienced before. Falling in love is something almost everyone wants in some point of their lives. It is an important element of happiness. In the beginning of the story, Mabel was dead and lifeless. In the end, she is happy and full of anticipation. When she is out of the wet and dirty clothes, she is freed from her troubles. The dirty clothes represent how she was before she fell in love. It also represents how she was suicidal and depressed. "She had on her best dress of black voile," (The Horse Dealer's Daughter pg.992) expresses her happiness and eagerness to start something new. Before she fell in love, she never wore clothing as elegant as this dress. This is something new to her and something she wants to try out. Her change of clothes also represents her change of personality and attitude. She changed from a quiet woman

Monday, November 25, 2019

Accounting treatment of software Intangible but vulnerable

Accounting treatment of software Intangible but vulnerable Companies today are highly dependent on complex information technology systems. This trend of relying on the system has grown gradually, but the downside of it is that it has made most companies’ asset base vulnerable. The machinery that used to represent much of the tangible asset base for most companies in the olden days has since been replaced by intangible assets that come in the form of software applications.Advertising We will write a custom essay sample on Accounting treatment of software: Intangible but vulnerable specifically for you for only $16.05 $11/page Learn More Currently enterprise resource planning and supply chain management systems are out of sight, but still play a substantial part in revenue and profit creation or generation. Their impact on a company’s ability to function and retain their reputation is very much tangible and this will usually manifest itself when they breakdown (Batchelor). Many companies are accused of p oor management of their software â€Å"estate.† This may involve a network of interlocking applications of different eras, which are complicated by attempts of making patches and work-arounds aimed at meeting the immediate needs of a business. If companies poorly understand the licensing arrangement stipulate, they may end up paying massive amounts and at times double the initial cost for permissions they are already allowed. They may also at times incur extra charges or costs when they opt to extend the use beyond what is within the permitted range. Finance directors are torn between capitalizing their spending on licensing arrangements on software, which at times can considerably long-term, or whether to account for this spending as an operating expense. Analysts believe that capitalizing your IT spending shows that a person believes that it has the potential to deliver future value. Critics of this proposal claim that it can cause unforeseen problems, and therefore, capita lizing on the IT should not be seen as a way to deliver future value. According to Mike Mobby, who is a partner as well as the lead of the finance consulting practice at Deloitte, a business consultancy group, â€Å"There is a trend to treat IT as an operating cost† (Batchelor). He continues and says that, at times we have situations where projects undertaken have not yielded the expected results and, therefore, companies have ended up having material write-offs since they have already capitalized their spending. The fast moving trend into cloud computing has done a lot in strengthening the belief and the way people view IT. People are gearing up towards appreciating and treating IT as an operating expense rather than investing heavily on IT assets such as hardware and the software needed (Batchelor). Companies have the chance to buy their computing needs from external service providers and do the work at a cheaper price. According to Stewart Buchanan the vice president of re search at Gartner, â€Å"Some organizations like to be asset-light, so they outsource their needs.† (Batchelor).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a person who has spent most of his life in the IT industry Gartner is a force to reckon with. He continues and says, â€Å"There has to be a long conversation with the chief financial officer about the assets and liabilities. Many are concerned about liabilities and want to know how much to put in provisions† (Batchelor). The IT system poses a risk to organization and may make companies vulnerable to attacks. They should therefore be treated the same way organizations treat their accounting practices. Consultants and analysts are reported as having increased their interest in the way companies and organizations manage the risks they face from their IT assets. Also not left behind are credit rating agencies who have also taken a keen interest on the same. Mr. Buchanan comments that many of the firms around do not have mechanisms in place or life cycles for the pieces of software that they use. He continues and says, â€Å"If they have it for the main software applications, they may not have it for the next layers down the stack. Organizations need to understand that their software will ‘wear out’ at some stage† (Batchelor). The companies face the risk of having their software vendors or manufactures going out of business, taken over or losing interest in the product sold. This can pose a great challenge for the companies because this may mean that support for the product, hardware or software is no longer available for crucial parts of the company’s IT network. If the company then decides to upgrade or modify their system, then this may mean this part no longer works as well with the new parts of the new system and may become, therefore, redundant. This is a complex problem as Mr. Buchanan explains, â€Å"Clients who take their eyes off the ball may find they lose control of their IT functions and they have to throw money at the problem to fix it. Managers should plan for contingencies just as they do with their supply chain or their manufacturing activities† (Batchelor). From the point of view of Jim McGIvern, â€Å"There is the potential for huge liabilities if you are sitting on a mainframe or an old system that is no longer fit for purpose, no matter how much you maintain it† (Batchelor). Jim is a senior business consultant working for AutoReck, a company that specializes in providing data management services to financial organizations and banks. Another challenge that faces companies and organizations is the complexity in managing licenses. Most times it is impossible to buy a soft ware and the only option company have is to buy specific and limited licenses to use the software. Companies run the risk of being billed by their software vendors if they use the software beyond the license, despite at times they may not know they are abusing the licenses.Advertising We will write a custom essay sample on Accounting treatment of software: Intangible but vulnerable specifically for you for only $16.05 $11/page Learn More Vendors are facing increasing financial pressure and in turn they focus on companies and try to get them enforce licensing arrangements when they are violated. Problems usually arise when companies exceed the agreed number of users of certain programs or allow their employees to join the office network via their phones. At times like this, companies may find themselves being sued by the vendors who are going to claim damages. With the increase in use of mobile phones and smart phones, a challenge arises in various business models. For example, publishers of books or magazines are delivering content digitally to computers and phones. The problem comes when th ey want to set a cost for the service as well as problem with allocating costs, including royalties. This at times will push companies to overhaul their systems such as the accounting systems. This risk is real for every company that uses licensed software and therefore companies are warned to follow and stick to the licensing agreements (Batchelor). Batchelor, Charles. â€Å"Accounting treatment of software: Intangible but vulnerable.† Financial Times. 6 Dec. 2011. Web. https://www.ft.com/.

Thursday, November 21, 2019

The Conflict between Territorial Integrity and Self-Determination Essay

The Conflict between Territorial Integrity and Self-Determination - Essay Example Such a classic perspective of statehood with respect to territorial integrity has manifested a simmering tension with another international principle. Recent events, equated with the collapse of the USSR, illustrate that the concept of self-determination shows a tendency to conflict with this long-held principle in international law. The embrace of territorial integrity by international law has something to do with international security and stability and there is a gnawing concern that the burgeoning concept of self-determination may pose a challenge to the status quo. Nonetheless, one need not necessarily neutralize or render the other principle void. While territorial integrity still finds relevance in the present times, the world must find a place for self-determination for the purpose of resolving existing conflicts and avoiding the escalation of violence or the eruption of wars. The international community must seek ways to moderate the build-up of tension between these two see mingly contending international principles. Territorial Integrity and Self-Determination: Definition of Concepts The origin of the concept of self-determination can be traced back to the 1789 American Declaration of Independence and later in the 1792 French Declaration. It originally refers to the entitlement endowed to the state by the populace to govern on their behalf with their consent as well as represent them in the international community as a separate, independent and co-equal entity alongside other states (Castellino p.11). Simply put however, self-determination was just perceived as â€Å"the right of nations to sovereign independence† (cited Schwed p. 447) According to the Finnish international law professor Koskenniemi, the concept of national determination can be viewed from two perspectives. The first has a patriotic facet while the other a secessionist element. The first model has a classical or Hobbesean underpinning because it sees the nation as a state and s elf-determination as closely related to the presence or absence of procedural mechanism that the state adopts to allow its citizens to participate in decision-making. Anything outside of this decision-making procedure, therefore, is â€Å"destructive, irrational passion† according to this model (Castellino pp. 9-10). The implication of this perspective is that the state is placed at the center of everything and that self-determination is legitimate only when it preserves the state as an organized body and when it prevents bellum omnium or what Hobbes called â€Å"a war by all against all,† which occurs in the absence of a civilized society (Leviathan Chapter 13). On the other hand, the second model of self-determination has a more romantic underpinning to it as it is largely based on Rousseau’s social contract theory. In this model, procedure is relegated to the background while purpose and goal take center stage. Moreover, this model does not see a nation as me rely an artificial entity, but as an authentic community. Self-determination from this perspective is thus, an expression, rather than a procedure, of the will of the community geared towards the collective good, not necessarily of the state (Castellino pp. 9-10).An example of the classical or Hobbesian model is the Palestinian claim against Israel, while the South Ossenian-Georgia conflict illustrates the romantic or Rousseauesque model. On the other hand, the concept of territorial integrity has underpinnings from the concept of state as a person of international law under the

Wednesday, November 20, 2019

Preparing Students for Work and Prior Learning Assignment

Preparing Students for Work and Prior Learning - Assignment Example The research analyzes the necessity for schools and universities to change the way of teaching in order to prepare their students for their future careers and supply them with a set of necessary skills. The works indicates two polar views on the educational system: one is negative, the other one is positive. The author claims changes should be done at all levels of education. Schools need to prepare students broadly for work and provide work experience opportunities. They should ensure that their employment engagement interventions offer career advice to the students. The writer also describes the program called The Prior Learning Assessment and Recognition (PLAR). It refers to evaluating informal learning that has occurred outside formal academic environment. This learning process assists individuals to identify what they already know and what they need to know in order to achieve whatever they desire. In conclusion the author states Universities need to take into account prior lear ning to enable students to enhance their image, and increase students’ placement in programs. PLAR promotes individuals’ self-esteem as it recognizes their previous learning accomplishment. Prior learning also validates appropriate learning and important skills acquired through life or work experience. Applicants for PLAR need to provide evidence by providing appropriate certificates, resume, and references from employers to prove that they have indeed acquired the necessary skills and knowledge. PLAR has proved to be an important initiative in education system.

Monday, November 18, 2019

Buddhist art at Asian art Museum in SF Essay Example | Topics and Well Written Essays - 1250 words

Buddhist art at Asian art Museum in SF - Essay Example The architectural designs of the walls and lights bring anyone inside into a time of serenity and ancient civilization which Buddhism stand for. The pillars are arranged parallel to the series of time warps inside the whole journey in the museum. Each segment inside the museum depicts a historical time that attributed to the living conditions of each country under the Buddhism religion. For example one of the artifacts that peeked my interest during visit in the Asian Museum was the artifact entitled "Bodhisattva crossing over". This artifact is made from nephrite (also known as jade) which size comprise of: Height 9 in x Width 6 1/2 in x Diameter 3 in, Height 22.9 cm x Width 16.5 cm x Diameter 7.6 cm. This jade carving was made from the time of Chin Dynasty in China. For our information, Qin Dynasty is one of the most influential and greatest dynasty in China headed by Emperor Qin Hwang Ti. During this time, arts have been one of the most precious means of depicting arts to preserve and foretell the significance of this dynasty during that time. Nephrite or much known as Jade is a precious stone (a green colored stone, which is uniquely made). Jade is considered to be one of the most precious stones every used in China, especially during the ancient times. To be able to create a form in jade one needs to patiently polish in order to create depth and form. This symbolical artifact used a significant precious stone to share to the world and to people that during the Qin Dynasty, Buddhism is the most significant religion ever followed by most people in China. The image in this artifact is intricately done because each curve, shapes and depth formed the message of the piece. The top portion of the artifact is shaped form like a cave, which the depth of the piece has generally created a distinct image of a person inside a cave. The bottom of the artifact is series of layered curved like waves forming which symbolically moving towards the right side (facing the artifact). In addition to the bottom portion of the artifact, the curves as mixed with various sizes (big and small currents); that also is mixed with stoned form enveloping the waves in each side. The middle part of the artifact is slimmed down in size, which adds another form and balance into the whole piece. The middle portion contains an image of a person, who is believed to be Buddha (or known as the enlightened one). The image of Buddha in the artifact is standing on top of the big and strong currents and as he is also enveloped above by the cave forming stones. The balance in t his artifact is blended with a piece of branches with tiny leaves growing in each of its edges. Buddha's gown was curved finitely creating a gentle movement of alternating flowing of the cloth as it follows the blowing wind. Chinese arts developed every dynasty. Each century or decade, the art and literature of China embodies the depth, symphony and music that each creator and artist have appreciated and grateful for. Buddhism in this creation is highly looked up and followed by everyone. Sakaymuni Buddha or Sidharhta (as he was commonly known for) has a lot of divine teachings to which

Saturday, November 16, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an