Friday, November 29, 2019

Horse Dealers Daughter By Lawrence Essays - Concepts, Notation

Horse Dealer's Daughter By Lawrence In "The Horse Dealer's Daughter," symbols are used to fulfill the quest of happiness and love. This love story, written by D.H. Lawrence, has many symbols, which show hidden meaning. One can fully understand a story, if one can point out certain symbols. Symbols create ideas and images for the reader to better understand the story. Mabel, one of the two main characters in this story, is depressed and suicidal. After her mother died, she feels like there is nothing to live for. Her mother was the love and joy in her life; without her, she is lost. All she has left is her house, which she is extremely proud of, and her brother, which she seems not to care for. She decides to release herself from her troubles by drowning herself in a pond. The other main character, Dr. Fergusson, sees her and tries to save her life. This pond is a strong symbol with many meanings. It is a start of a new experience, and a change of two people's lives. The pond is described as dead and cold. This symbolizes that Dr. Fergusson had no feelings for Mabel before the incident. The narrator describes the pond as lifeless right before the doctor had entered it. Before going in, the relationship between them was dead and cold, and they had no passionate feelings for one another. Dr. Fergusson tries to rescue Mabel for no other reason but because he was doing his job. The pond also describes Dr. Fergusson's life as dull and pointless. His life was still and silent before he had met her. He was afraid to go in too deep into the pond, and was afraid of drowning. This represents his fear of falling in love. He was scared of the water because he could not swim, and also because he was scared of love. He never experienced it, so it frightened him. When he finally falls in, he felt Mabel's clothing and pulled her up. This means that when he fell into the pond, he found love. It was like fate had pushed him into the water to meet the woman he was meant to be with, for the rest of his life. He found love in a dead and cold pond, which means sometimes one has to look at even the unimaginable places to find happiness. In a dead place such as the pond, you can find something that is alive such as love. This pond symbolizes the start of their love for each other, since they fall madly in love afterwards. The water symbolizes baptism and rebirth, and when she steps into it, her troubles are washed away. It represents cleanliness and the start of new life. Her life before felt meaningless to her, and she wanted to get out of it. She had nobody to love and care for her, after her mother had died. She never tries anything new and when she finally does, something amazing happens to her. Dr. Fergusson's life was just as pointless as hers was. He had a good job working with many kinds of people, but he did not enjoy his life. He had no love in his life, and without it, there is nothing to live for. The pond also symbolizes a new start of his life, since he finds love. It baptizes them and they both get a new sense of life. When Mabel changes her clothes at the end of the story, she is starting her new life. The clothes symbolize a new and fresh experience, one of which she had never experienced before. Falling in love is something almost everyone wants in some point of their lives. It is an important element of happiness. In the beginning of the story, Mabel was dead and lifeless. In the end, she is happy and full of anticipation. When she is out of the wet and dirty clothes, she is freed from her troubles. The dirty clothes represent how she was before she fell in love. It also represents how she was suicidal and depressed. "She had on her best dress of black voile," (The Horse Dealer's Daughter pg.992) expresses her happiness and eagerness to start something new. Before she fell in love, she never wore clothing as elegant as this dress. This is something new to her and something she wants to try out. Her change of clothes also represents her change of personality and attitude. She changed from a quiet woman

Monday, November 25, 2019

Accounting treatment of software Intangible but vulnerable

Accounting treatment of software Intangible but vulnerable Companies today are highly dependent on complex information technology systems. This trend of relying on the system has grown gradually, but the downside of it is that it has made most companies’ asset base vulnerable. The machinery that used to represent much of the tangible asset base for most companies in the olden days has since been replaced by intangible assets that come in the form of software applications.Advertising We will write a custom essay sample on Accounting treatment of software: Intangible but vulnerable specifically for you for only $16.05 $11/page Learn More Currently enterprise resource planning and supply chain management systems are out of sight, but still play a substantial part in revenue and profit creation or generation. Their impact on a company’s ability to function and retain their reputation is very much tangible and this will usually manifest itself when they breakdown (Batchelor). Many companies are accused of p oor management of their software â€Å"estate.† This may involve a network of interlocking applications of different eras, which are complicated by attempts of making patches and work-arounds aimed at meeting the immediate needs of a business. If companies poorly understand the licensing arrangement stipulate, they may end up paying massive amounts and at times double the initial cost for permissions they are already allowed. They may also at times incur extra charges or costs when they opt to extend the use beyond what is within the permitted range. Finance directors are torn between capitalizing their spending on licensing arrangements on software, which at times can considerably long-term, or whether to account for this spending as an operating expense. Analysts believe that capitalizing your IT spending shows that a person believes that it has the potential to deliver future value. Critics of this proposal claim that it can cause unforeseen problems, and therefore, capita lizing on the IT should not be seen as a way to deliver future value. According to Mike Mobby, who is a partner as well as the lead of the finance consulting practice at Deloitte, a business consultancy group, â€Å"There is a trend to treat IT as an operating cost† (Batchelor). He continues and says that, at times we have situations where projects undertaken have not yielded the expected results and, therefore, companies have ended up having material write-offs since they have already capitalized their spending. The fast moving trend into cloud computing has done a lot in strengthening the belief and the way people view IT. People are gearing up towards appreciating and treating IT as an operating expense rather than investing heavily on IT assets such as hardware and the software needed (Batchelor). Companies have the chance to buy their computing needs from external service providers and do the work at a cheaper price. According to Stewart Buchanan the vice president of re search at Gartner, â€Å"Some organizations like to be asset-light, so they outsource their needs.† (Batchelor).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a person who has spent most of his life in the IT industry Gartner is a force to reckon with. He continues and says, â€Å"There has to be a long conversation with the chief financial officer about the assets and liabilities. Many are concerned about liabilities and want to know how much to put in provisions† (Batchelor). The IT system poses a risk to organization and may make companies vulnerable to attacks. They should therefore be treated the same way organizations treat their accounting practices. Consultants and analysts are reported as having increased their interest in the way companies and organizations manage the risks they face from their IT assets. Also not left behind are credit rating agencies who have also taken a keen interest on the same. Mr. Buchanan comments that many of the firms around do not have mechanisms in place or life cycles for the pieces of software that they use. He continues and says, â€Å"If they have it for the main software applications, they may not have it for the next layers down the stack. Organizations need to understand that their software will ‘wear out’ at some stage† (Batchelor). The companies face the risk of having their software vendors or manufactures going out of business, taken over or losing interest in the product sold. This can pose a great challenge for the companies because this may mean that support for the product, hardware or software is no longer available for crucial parts of the company’s IT network. If the company then decides to upgrade or modify their system, then this may mean this part no longer works as well with the new parts of the new system and may become, therefore, redundant. This is a complex problem as Mr. Buchanan explains, â€Å"Clients who take their eyes off the ball may find they lose control of their IT functions and they have to throw money at the problem to fix it. Managers should plan for contingencies just as they do with their supply chain or their manufacturing activities† (Batchelor). From the point of view of Jim McGIvern, â€Å"There is the potential for huge liabilities if you are sitting on a mainframe or an old system that is no longer fit for purpose, no matter how much you maintain it† (Batchelor). Jim is a senior business consultant working for AutoReck, a company that specializes in providing data management services to financial organizations and banks. Another challenge that faces companies and organizations is the complexity in managing licenses. Most times it is impossible to buy a soft ware and the only option company have is to buy specific and limited licenses to use the software. Companies run the risk of being billed by their software vendors if they use the software beyond the license, despite at times they may not know they are abusing the licenses.Advertising We will write a custom essay sample on Accounting treatment of software: Intangible but vulnerable specifically for you for only $16.05 $11/page Learn More Vendors are facing increasing financial pressure and in turn they focus on companies and try to get them enforce licensing arrangements when they are violated. Problems usually arise when companies exceed the agreed number of users of certain programs or allow their employees to join the office network via their phones. At times like this, companies may find themselves being sued by the vendors who are going to claim damages. With the increase in use of mobile phones and smart phones, a challenge arises in various business models. For example, publishers of books or magazines are delivering content digitally to computers and phones. The problem comes when th ey want to set a cost for the service as well as problem with allocating costs, including royalties. This at times will push companies to overhaul their systems such as the accounting systems. This risk is real for every company that uses licensed software and therefore companies are warned to follow and stick to the licensing agreements (Batchelor). Batchelor, Charles. â€Å"Accounting treatment of software: Intangible but vulnerable.† Financial Times. 6 Dec. 2011. Web. https://www.ft.com/.

Thursday, November 21, 2019

The Conflict between Territorial Integrity and Self-Determination Essay

The Conflict between Territorial Integrity and Self-Determination - Essay Example Such a classic perspective of statehood with respect to territorial integrity has manifested a simmering tension with another international principle. Recent events, equated with the collapse of the USSR, illustrate that the concept of self-determination shows a tendency to conflict with this long-held principle in international law. The embrace of territorial integrity by international law has something to do with international security and stability and there is a gnawing concern that the burgeoning concept of self-determination may pose a challenge to the status quo. Nonetheless, one need not necessarily neutralize or render the other principle void. While territorial integrity still finds relevance in the present times, the world must find a place for self-determination for the purpose of resolving existing conflicts and avoiding the escalation of violence or the eruption of wars. The international community must seek ways to moderate the build-up of tension between these two see mingly contending international principles. Territorial Integrity and Self-Determination: Definition of Concepts The origin of the concept of self-determination can be traced back to the 1789 American Declaration of Independence and later in the 1792 French Declaration. It originally refers to the entitlement endowed to the state by the populace to govern on their behalf with their consent as well as represent them in the international community as a separate, independent and co-equal entity alongside other states (Castellino p.11). Simply put however, self-determination was just perceived as â€Å"the right of nations to sovereign independence† (cited Schwed p. 447) According to the Finnish international law professor Koskenniemi, the concept of national determination can be viewed from two perspectives. The first has a patriotic facet while the other a secessionist element. The first model has a classical or Hobbesean underpinning because it sees the nation as a state and s elf-determination as closely related to the presence or absence of procedural mechanism that the state adopts to allow its citizens to participate in decision-making. Anything outside of this decision-making procedure, therefore, is â€Å"destructive, irrational passion† according to this model (Castellino pp. 9-10). The implication of this perspective is that the state is placed at the center of everything and that self-determination is legitimate only when it preserves the state as an organized body and when it prevents bellum omnium or what Hobbes called â€Å"a war by all against all,† which occurs in the absence of a civilized society (Leviathan Chapter 13). On the other hand, the second model of self-determination has a more romantic underpinning to it as it is largely based on Rousseau’s social contract theory. In this model, procedure is relegated to the background while purpose and goal take center stage. Moreover, this model does not see a nation as me rely an artificial entity, but as an authentic community. Self-determination from this perspective is thus, an expression, rather than a procedure, of the will of the community geared towards the collective good, not necessarily of the state (Castellino pp. 9-10).An example of the classical or Hobbesian model is the Palestinian claim against Israel, while the South Ossenian-Georgia conflict illustrates the romantic or Rousseauesque model. On the other hand, the concept of territorial integrity has underpinnings from the concept of state as a person of international law under the

Wednesday, November 20, 2019

Preparing Students for Work and Prior Learning Assignment

Preparing Students for Work and Prior Learning - Assignment Example The research analyzes the necessity for schools and universities to change the way of teaching in order to prepare their students for their future careers and supply them with a set of necessary skills. The works indicates two polar views on the educational system: one is negative, the other one is positive. The author claims changes should be done at all levels of education. Schools need to prepare students broadly for work and provide work experience opportunities. They should ensure that their employment engagement interventions offer career advice to the students. The writer also describes the program called The Prior Learning Assessment and Recognition (PLAR). It refers to evaluating informal learning that has occurred outside formal academic environment. This learning process assists individuals to identify what they already know and what they need to know in order to achieve whatever they desire. In conclusion the author states Universities need to take into account prior lear ning to enable students to enhance their image, and increase students’ placement in programs. PLAR promotes individuals’ self-esteem as it recognizes their previous learning accomplishment. Prior learning also validates appropriate learning and important skills acquired through life or work experience. Applicants for PLAR need to provide evidence by providing appropriate certificates, resume, and references from employers to prove that they have indeed acquired the necessary skills and knowledge. PLAR has proved to be an important initiative in education system.

Monday, November 18, 2019

Buddhist art at Asian art Museum in SF Essay Example | Topics and Well Written Essays - 1250 words

Buddhist art at Asian art Museum in SF - Essay Example The architectural designs of the walls and lights bring anyone inside into a time of serenity and ancient civilization which Buddhism stand for. The pillars are arranged parallel to the series of time warps inside the whole journey in the museum. Each segment inside the museum depicts a historical time that attributed to the living conditions of each country under the Buddhism religion. For example one of the artifacts that peeked my interest during visit in the Asian Museum was the artifact entitled "Bodhisattva crossing over". This artifact is made from nephrite (also known as jade) which size comprise of: Height 9 in x Width 6 1/2 in x Diameter 3 in, Height 22.9 cm x Width 16.5 cm x Diameter 7.6 cm. This jade carving was made from the time of Chin Dynasty in China. For our information, Qin Dynasty is one of the most influential and greatest dynasty in China headed by Emperor Qin Hwang Ti. During this time, arts have been one of the most precious means of depicting arts to preserve and foretell the significance of this dynasty during that time. Nephrite or much known as Jade is a precious stone (a green colored stone, which is uniquely made). Jade is considered to be one of the most precious stones every used in China, especially during the ancient times. To be able to create a form in jade one needs to patiently polish in order to create depth and form. This symbolical artifact used a significant precious stone to share to the world and to people that during the Qin Dynasty, Buddhism is the most significant religion ever followed by most people in China. The image in this artifact is intricately done because each curve, shapes and depth formed the message of the piece. The top portion of the artifact is shaped form like a cave, which the depth of the piece has generally created a distinct image of a person inside a cave. The bottom of the artifact is series of layered curved like waves forming which symbolically moving towards the right side (facing the artifact). In addition to the bottom portion of the artifact, the curves as mixed with various sizes (big and small currents); that also is mixed with stoned form enveloping the waves in each side. The middle part of the artifact is slimmed down in size, which adds another form and balance into the whole piece. The middle portion contains an image of a person, who is believed to be Buddha (or known as the enlightened one). The image of Buddha in the artifact is standing on top of the big and strong currents and as he is also enveloped above by the cave forming stones. The balance in t his artifact is blended with a piece of branches with tiny leaves growing in each of its edges. Buddha's gown was curved finitely creating a gentle movement of alternating flowing of the cloth as it follows the blowing wind. Chinese arts developed every dynasty. Each century or decade, the art and literature of China embodies the depth, symphony and music that each creator and artist have appreciated and grateful for. Buddhism in this creation is highly looked up and followed by everyone. Sakaymuni Buddha or Sidharhta (as he was commonly known for) has a lot of divine teachings to which

Saturday, November 16, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an

Wednesday, November 13, 2019

Imperialsim in Madagascar :: essays research papers

Imperialism in Madagascar   Ã‚  Ã‚  Ã‚  Ã‚  When someone is talking about Madagascar usually they are talking about the huge cockroaches people have to eat on Fear Factor but there is so much more to the country than that. During a time when land was being snatched up and claimed by many Euro-Asia countries little had any right or reason to have the land. This time of imperialism effected economic markets, religion, and many other things pertaining to the Malagasy.   Ã‚  Ã‚  Ã‚  Ã‚  Throughout the centuries countries and mankind have always wanted one thing: power. This power can be in many forms such as money, property, friends, or technology. During the 1800s to 1914 many countries found land in Africa that had â€Å"primitive† or â€Å"incompetent† inhabitants so they claimed the country as theirs and took control of it to get more power. I believe France wanted Madagascar because it had found that the country’s land was inadequate for further growth so to posses more land they saw Madagascar and what it had to offer them, and protectorated it.   Ã‚  Ã‚  Ã‚  Ã‚  During the 1600s the Portuguese, the English, and the French, successful or not, tried to colonize Madagascar. This was the first attempt of any kind to penetrate Madagascar. In 1869 the French attained and expanded their political influence in Madagascar. In 1896, after a native rebellion they won the French achieved control and made all of Madagascar a French colony.   Ã‚  Ã‚  Ã‚  Ã‚  In 1810, during King Radama I’s reign, the British introduced Christianity. The Protestant London Missionary Society was welcomed and converted many willing natives. This period lasted until 1835 when in 1828 Radama was succeeded, by his wife Ranavalona I, and Christianity was declared illegal. In addition all Europeans were to leave the country and trade was stopped. This era ended in 1863 when Queen Rasoherina lifted the anti-European policy and missionaries and traders were received once more.   Ã‚  Ã‚  Ã‚  Ã‚  Throughout the French’s control of Madagascar there were several rebellions with at least 15,000 natives killed altogether. The first native rebellion lasted from 1894 until 1896 when a high government official organized a resistance to the French which ended with the French exiling the queen and gaining complete power over the nation. The second was in 1916 when the French uncovered a secret nationalist society that was outlawed and hundreds of its members were taken prisoner. The largest revolt was in 1947 and lasted nearly two years. This was a major uprising against the French, who crushed the rebellion, killing between 11,000 and 80,000 Malagasy (according to different estimates).

Monday, November 11, 2019

Legalization of Marijuana: Should be Approved? Essay

American people have debated over the legalization of marijuana for many years. This discussion is an example of how the united states have struggled to reach an agreement about the use of marijuana. In recent year’s drug policy have been increasingly challenged, especially in America. In the United States a group of nearly twenty states has allowed the medical use of marijuana, even though neither the federal government nor the United Nations Convention recognize that marijuana has medical uses. In the election of November 2012, Washington State passed a referendum, and Colorado an amendment to its Constitution, which allow the recreational use of marijuana. A result of the legalization of recreational use in Denver, Colorado, have entered more than $ 1.2 million with a mechanism for maximum sales per consumer than an ounce profit status, worth $ 200, a strategy that is used to regulate the individual consumption. For instance, according to Jacob Sullum (2013), author of The Cannabis Is Out Of The bag, â€Å"People 21 or older already are allowed to possess up to an ounce of marijuana.† Nowadays Marijuana users in the United States may finally, starting this January 1, legally have it for recreational purposes in two states in the West, Washington and Colorado. Probably the most controversial news until today is that many companies would begin to distribute marijuana in vending machines as if they were sodas this will be addressed to the public who use marijuana for medical purposes, a patient with a serious medical condition that approaches a vending machine to get a dose of marijuana to cope better with certain symptoms of their disease or treatment is an increasingly common act thanks to the progress achieved by the automatic distribution. But you can still go further. Hence Smart Ventures, a company that invests in mining projects in medical marijuana and playful side, has signed an agreement with Mobile Vending, dedicated to developing mobile technology for control of vending .The objective of this joint venture is to expand and renovate the distribution process with the latest equipment and advanced techniques of identification in order to cash in on the recent legalization of marijuana  and the resulting high demand in the state of Colorado. Both formulas will drive new technology payments and cashless biometric identification methods, either through credit cards, electronic wallets and mobile payment. The new company is called Cannabis Funding Group, Inc. and is now a subsidiary of activity as Smart Ventures. One person who is clearly opposed to medical marijuana is Scott M, Arden. He suggests that there is no incentive to fund clinical trials nor advocate the use of marijuana for medical purposes. he expressed her views in the article †Å"Clinician Reviews† journal. For instance, he says, The negative side effects of medical marijuana pale in comparison to the laundry list associated with numerous prescription drugs that are FDA approved—not to mention tobacco and alcohol, much more addictive products on the market that possess no medicinal value, only detrimental. Additionally, currently available pain medications have been proven highly addictive, and their use and proliferation have led to an epidemic of chemical dependence and related crime. If the big players in the industry had significant potential gains from medical marijuana, it would have been legalized at the federal level years ago. What Scott M. Arden is saying is that it makes no sense the idea of medical marijuana. So, obviously that it will be the same as with the other drugs on the market that are addictive. There are some people who think that more states should legalize at least medical marijuana for the people who really need it. One of the strong supporters of medical marijuana is Karen Bender. She is sure that with additional research medical marijuana may benefit many people. In fact, she says, â€Å"Medical marijuana, like prescribed drugs, may benefit people with MS†. What bender means is that, if the American government is willing to continue prohibiting medical marijuana, American people would never know if is the right thing to do. It is simply means that laboratories and people specialized in the field of medical marijuana should do more research to determine the good things about it and the bad things and how will affect society. Second, another controversial reason to support or oppose legalization of marijuana is based in the economics of execution. Legalizing marijuana will save the government $ 41.3 billion a year in law-enforcement and generate $ 46.7 billion in tax according to The Libertarian Cato Institute but Chris Kennedy a spokesman of the journal â€Å"NEWSWEEK† tells that â€Å"all of our scholars definitely support an end to drug  prohibition.† He thinks that instead of prohibiting marijuana government should legalized it, according to The Libertarian Cato Institute. It is simply means that legalizing marijuana is the best thing to do for economic reasons, that’s why there’s so many controver sy in the economic execution, too much money involved. There are not many people, who support the legalization of marijuana, mostly because they think is not going to help American economy. Most people care about the national security because of terrorists and drug dealers. One person who clearly opposes legalization of marijuana is Pat Buchanan, an advisor to presidents Nixon, Ford, and Reagan , he sure believes American people is financing terrorists and drug dealers. He expressed his opinion in â€Å"NEWSWEEK† journal. For instance, he says, How does one win a drug war when millions of Americans who use recreational drugs are financing the cartels bribing, murdering, and beheading to win the war and keep self-indulgent Americans supplied with drugs? There are two sure ways to end this war swiftly. Milton’s way and Mao’s way. Mao Zedong’s communists killed users and suppliers alike, as social parasites. Milton Friedman’s way is to decriminalize drugs and call off the war. What Buchanan is really talki ng about is that most Americans are supporting and financing the cartels, and that Americans are arguing at the same time for the security when they are the cause of drug cartels having power, that’s why criminals continue enriching illicitly. There are not that many politicians who support the legalization of marijuana. One politician who supports the legalization of marijuana is Tom Tancredo who was running for governor of Colorado on the constitution party ticket. He declares that marijuana should be (Legalize it. Regulate it. Tax it) He expressed his opinion in â€Å"NEWSWEEK† journal. For instance, he says, With regard to marijuana, I have no plans to push for its legalization. I simply believe that taking money away from the drug cartels, taking the incentive out of pushing marijuana to kids by imposing the most serious penalties possible on those who do so, focusing our resources on stopping illegal aliens and hard drugs from entering the country, and reducing t he corruption now eating away at our law-enforcement establishment has merit and deserves to be debated. Another main argument has to deal with the Mexican border. There is another politician who supports the legalization of marijuana. It’s Grover Norquist, president of Americas for tax reform, he declares that the legalization of marijuana will  end with drug cartels. For instance, he says, First, there is the mess that is Mexico. Narcoterrorism is made possible by our drug prohibition in the U.S. Then there is the cost of incarceration, Proposition 19 has the opportunity to be the domino that could bring about rational drug policy nationwide. What Norquist is really taking about is that next vote in California for or against Proposition 19, which seeks to legalize the use, distribution and sale of marijuana has led, in the United States and Mexico, a debate on the legalization of drugs. Proposition 19 also plans to allow the cultivation of marijuana by adults in an area not exceeding 25 square feet in their homes and allowed local governments to regulate and collect taxes on commercial production and distribution of the drug. The Uni ted Nations (UN) estimates that one third of the cannabis consumed in the U.S. is produced domestically. Under the new laws of legalization, marijuana stores should produce their own cannabis, and will take several months for some power to make its first crop of recreational marijuana. $ 600 million annual leave year the sale of marijuana in Colorado. A study by Colorado State University estimated that the market for legal marijuana state will be about 600 million dollars annually and generate about $ 130 million in new taxes. The study also estimated that Colorado residents consume about 100 grams of marijuana per capita annually, under the new rules. One person who clearly declares that combating drugs is not the way to solve all problems related with drugs as violence, is James A. Inciardi, a director of the center for drug and alcohol studies. He expressed his views in the book, The Drug Legalization Debate. For instance, he says, â€Å"War on Drugs† is not the answers to the many problems of drug abuse in this country. I reach this conclusion by observing that during the entire time the country has been at war against drugs there has been no attempt in any administration to place the federal agencies and the American people on a wartime status. There are several characteristics of a country at war that have not been met. Although it is very obvious for most people, Legalization is not a magic formula to end violence, it may resolve other serious problems in the country but it is a necessary step in the right direction for a new paradigm that means more security. Marijuana it’s not the illegal drug that leaves more profit, but it is the most trafficked and consumed in the world. The blow to organized crime by removing these revenues vary, according to estimates, 15% to 60% of  the â€Å"profits† of t he drug. The opinion of the people in this area is very diverse, from which there are radically opposed to it until its legalization there are supporters unconditionally. These views depend on many factors, such as age, as the person it’s older the more is opposed to the legalization of these substances, another factor that determines a lot is its political ideology. The people on the left political side tend to approve the legalization of these drugs and the right side tends to reject it, it also depends on the sex gender, men usually supports more its legalization. Also people are influenced by the fact that they tried the drug before. Most of the people who have tried the drug before tend to support the legalization of marijuana. Legalizing cannabis would have the advantage that we can all imagine, a greater product quality, if we smoke or use marijuana as this should not be adulterated because going through some health checks, a much lower cost, as there would be many intermediaries as there are now and also end with the black market and drug trafficking networks. While many of these benefits would not be such, because, for example the black market and drug trafficking networks would not disappear, but still try to sell the cheapest product to make the competition to the government. The failure of prohibitionist and punitive strategy against illicit drugs, we still see an overview of production and consumption worse than in the beginning. It is necessary to create useful tools to combat drug use, which must be accompanied by a more flexible-but not libertarian-use and production perspective. Works cited Conant, Eve. â€Å"Pot and the GOP.† Newsweek 1 Nov. 2010: Academic OneFile. Web. 22 Mar. 2014. Sullum, Jacob. â€Å"The Cannabis Is Out Of The Bag: Why Prohibitionists Have an Interest in Allowing Marijuana Legalization.† Reason Aug.-Sept. 2013: 12. Academic OneFile. Web. 24 Mar. 2014. Arden, Scott M., and Meg Helgert. â€Å"Opposing Views of Medical Marijuana.† Clinician Reviews Apr. 2011: 2. Academic OneFile. Web. 22 Mar. 2014. Bender, Karen. â€Å"More Support for Medicinal Marijuana.† Momentum Spring 2011: Academic OneFile. Web. 22 Mar. 2014. Inciardi, James A. The Drug Legalization Debate. Newbury Park, CA: Sage Publications, 1991. Print.