Monday, September 30, 2019

A Well-Behaved Child

A Well-Behaved Child Children are the best gift created by God. They are like wet sand, they become what others want them to become. Children needs good care attention from their elders. In order to have a well-behaved child, parents and others have to teach them good habits. There are four steps for a parent to make their child well behaved. The first thing to teach a child is about their daily schedules. The parents who make timetables for their children are more successful than those who do not do.Because of this the child knows every hour what he should do or not. The child utilize most of his time by doing valuable things like playing, eating, studying, etc. , according to his schedule. In order to have a well-skilled child, parents need to give extra time to teach and play with their child so that their child can get love and help with homework and school activities. The second thing is that every child copies whatever he watches other person doing. In order to that, parents sh ould be active to watch every step of their child.In addition, they also should take care of their activities in front of their child. For example parents should not do bad things in front of their child like talking loud, arguing with each other etc. Most activity around the child either in school or in house really affects the growth of child. The third factor is healthy diet. Nutritional food has a great role in a child’s life. For instance, if a child is having more of fats and high cholesterol in his diet, it can lead to overweight and if he is not getting enough diet he can lead to underweight.This can lead lost of self confidence and can make a child lazy. Parents have a major role in making their child healthy by giving them nutritious food. The final step is to take care of the character of the child. Parents should teach children to be honest, caring, kind and lovable. some children are very annoying and are hated by all. Parents should take care that their child be haves properly when outside the house. For example some children beat other children and behave very badly in restaurants, school and outside the house.This is hated by all and no one wants their child to be like that. Children should respect their elders and should have a smiling face while meeting others. These values count a lot in a person’s future. Overall, parents have a major role in the growth of a child. Behavior of a child depends on the actions of parents. Parents should take care of their actions and should leave a good impact on them. Moreover, children should be kept well organized and disciplined. They should have the values for how to talk with elders and how to behave with others.

Sunday, September 29, 2019

Malaysian Financial Reporting Standard

Malayan Financial Reporting Standards 132 WTK Company Harmonizing to MFRS 132, the statements of fiscal place of WTK Company divide into fiscal plus, fiscal liability, and fiscal equity. In the statements of fiscal place of WTK Company besides divide into group and company. WTK Company’s fiscal assets have non-currents assets and current assets. In non-current assets, there are decently, works and equipment, prepaid land rental payments, investing belongingss, and others. For the group, in 1.1.2011, the sum of non-current assets is RM 1020829000 which increased to RM 1099123000 in twelvemonth terminal of 2011. In twelvemonth terminal of 2012, the non-current assets increased once more to RM 141151000. This show that WTK Company’s non-current assets grow from 2011 to 2012. Whereas in company portion, the sum of non-current assets in 1.1.2011 is RM 433458000 and travel up to RM 434816000 in twelvemonth terminal of 2011. In 2012, the non-current assets increase once more to RM 438215000. The current assets are stock lists, tr ade and other receivables, other current assets and others. The current assets of WTK Company, in group portion, in 1.1.2011, the sum is RM 558683000 so add up to RM 588906000. In 2012, the sum of current assets is RM 551048000. In the company portion, the current assets in 1.1.2011 are RM 45304000 grows up to RM 59270000. In 2012, the current assets sum is increase to RM 63501000. Hence, the group portion of entire sum of assets is RM 1692199000 whereas in the company portion of entire sum of assets is RM 501716000. WTK Company has fiscal liability and fiscal equity. In fiscal liability, there are non-current liabilities and current liabilities. In group portion, the sum of current liabilities in 1.1.2011 is RM 313731000 which increased to RM 310156000 in twelvemonth terminal 2011. In 2012, the sum of current liabilities additions once more to RM 242404000. In company portion, the sum of current liabilities in 1.1.2011 is RM 51892000 and lessening to RM 45407000 in twelvemonth terminal 2011. In 2012, the sum of current liabilities drops once more to RM 45070000. The sum of net current asserts/liabilities in group portion in 2012 are RM 30644000 whereas in company portion 2012, the sum of net current asserts/liabilities are RM 18431000. The non-current liabilities in group portion 1.1.2011 are RM 214236000 and increase to RM 1189560000. In 2012, the sum encouragement once more to RM 1220240000. In company portion, the non-current liabilities in 1.1.2011 are RM 4265832000 and hike up to RM 4486410 00. In 2012, the non-current liabilities are RM 456608000. After add with non-controlling involvement, RM 15319000, the entire equity is RM 1235559000 in 2012 group portion. In group portion 2012, the entire equity and liabilities are RM 1693199000 whereas in company portion 2012, the entire equity and liabilities are RM 501716000. The chief rule of MFRS 132 is a fiscal instrument that is non an plus should be confidential as either a fiscal liability or an equity instrument harmonizing to the substance of the contract, but non its official signifier. The determination to make should be at the clip instrument is chiefly known. Fiscal plus and fiscal liability should be do up for and the net sum reported when, and merely when, an entity has a officially enforceable right to countervail the sums and intends either to unclutter up on a net footing, or to acknowledge the plus and settle the liability at the same time. Equity instrument is contract that evidences a residuary involvement in the assets of an entity after subtracting all its liabilities. The statement of alterations in equity will uncover all constituents of equity demoing in item the gap balance, addition and diminution and the shutting balance. Equity comprises portion capital and militias. Additions and lessenings to retained net income non disclosed in the other comprehensive income. Statements of alterations in equity of WTK Company besides divide into group and company. In twelvemonth terminal of 2012, the group of statements of alterations in equity, the entire equity is RM 1235559000 whereas in twelvemonth terminal of 2011 is RM 1204973000. In twelvemonth terminal of 2012, entire equity attributable to the proprietors of the company is RM 1220240000 whereas in twelvemonth terminal of 2011, entire equity attributable to the proprietors of the company is RM 1189560000. The portions capital, portions premium, and exchequer portions are RM 219007000, RM 45708000, and negative RM 7570000 severally in twelvemonth terminal of 2011. In twelvemonth terminal of 2012, the portions capital and portions premium are the same as in 2011. The exchequer portions are negative RM 8062000. The maintained net incomes in 2011 are RM 931358000 whereas in 2012, the maintained net incomes are RM 962176000. In 2011, entire other militias, foreign currency interlingual rendition modest y, just value accommodation modesty, and non-controlling involvements are RM1057000, RM 685000, RM372000, and RM 15413000 severally. Entire other militias, foreign currency interlingual rendition modesty, just value accommodation, and non-controlling involvements are RM 1411000, RM 1299000, RM 112000, and RM 15319000 severally in 2012. In company portion, the entire equity in 2011 is RM 448641000 whereas the entire equity is RM 456608000 in 2012. The portions capital, portions premium, and exchequer portions in 2011 are RM 209007000, RM 45708000, and negative RM 7570000. In 2012, the portions capital and portions premium are the same as in 2011. The exchequer portions are negative RM8062000. The maintained net incomes in 2011 are RM 190579000 whereas in 2012 are RM 199445000. Entire other militias, capital modesty, and just value accommodation are RM 917000, RM 400000, and RM 517000 severally in 2011. In 2012, entire other militias, capital modesty, and just value accommodation modesty are RM 510000, RM 400000, and RM 110000 severally. Additions such as reappraisal excess and adjust in just value of fiscal assets available for sale are recognized in other comprehensive income and disclosed discretely as militias. Revaluation excess on depreciable non-current plus is known in other comprehensive income and accredited to the reappraisal modesty. The depreciation charge wining to the just value accommodation of the plus will be higher, and an sum equal to the extra depreciation is to be transferred from the reappraisal modesty to retained net incomes. If the plus were to be sold before it was to the full depreciated, the staying balance on the reappraisal for that punctilious plus is besides transferred to retained net incomes. Interest, dividends, additions and losingss associating to an instrument classified as liability should be reported in the income statement. This means that dividends payments on preferable portions classified as liabilities are treated as disbursals. On the other custodies, distributions such as dividends to owner of a fiscal instrument classified as equity should be charge straight aligned with equity. The outgo of an entity’s ain equity instrument that is has required cherished portions is deducted from equity. Derive or loss is non recognized on the purchase, sale, issue or revocation of exchequer portions.

Saturday, September 28, 2019

Our hearts fell to the ground Essay

Colin Calloway has done a masterful job of selecting and presenting an array of speeches, letters, documents, and drawings that tell compelling stories about the Plain Indians in the 1800’s. His introduction alone has just the right level of information and links basic themes and events to the documents presented in the text. In short, a model of how an introduction should be done. Colin Calloway’s intentions were to focus on the humanistic study of the Plain Indians views on how the West was lost. It provides us with the actual perspectives of Indian people who lived through those times of manifestation and assimilation. From the Lewis and Clark expedition to the building of railroads, he attempts to explain the traumatic changes of the Native Americans during the nineteenth century. He opens our eyes from what earlier historians whose work seems now outdated, preferring to rescue elements of their work. The narratives are divided into fourteen chapters, which supply historical document and secondary essays placing these documents within their historical context. Each chapter unfolds 1 OUR HEARTS FELL TO THE GROUND to show the tragedy the Plains Indian had to endure from the white settlers and their greed for land and prosperity. From the slaughter of whole tribes, the out break of the unseen killer, and the forced assimilation through the reservation systems were only a few explanations for why the Indians numbers dwindled in the 1800s. It was not until the middle of the twentieth century that the reality of their suffering showed up in history books. Any writings prior only portrayed the Native American as savages and rebellious people, almost to a romance climax. Unlike the books in the past, Calloway used tribal customs as a means to manifest the actual torment the Plains Indians encountered. The Native Americans were regarded as â€Å"people without history†, when in fact the Indians recorded their history by songs, dances, stories, legends, and visual records on buffalo robes known as winter counts. Calloway reveals to the reader the Ways the Native American used the winter counts as a mnemonic  device passed from one generation to another marked with pictographs that recorded noteworthy events in tribal life that took place each year. It was these customs that enabled 2 OUR HEARTS FELL TO THE GROUND elders to chronologically pass on their heritage to ensure the survival of their tribe. Calloway disclosed through speeches of the Native American that they were generally peaceful and friendly people who wanted peace and not war with the white man. Most speeches contained disagreement but acceptance of the white man ways, from the breaking of treaties to the inconceivable slaughter of their buffalo. The American Native hoping to maintain their hold on what little land and culture remained to them tried to accept the ways of their new neighbors. After reading this book I have a new perspective about the Native American. Unlike before, when I heard the word Indian I thought of them as savages of the Wild West for the most part. I now think of them as intelligent, prideful, and humane people who just wanted to be left alone to live the life they were accustomed to. Bottom line, if it was not for the white settlers forcing their way of life onto the Native Americans, they would not of reacted as they did. The settlers left them no choice!

Friday, September 27, 2019

Business Environment Assignment Example | Topics and Well Written Essays - 2250 words

Business Environment - Assignment Example Coca Cola daily servings have increased from an average of nine servings at the inception to more than 1.8 billion daily servings per day. Coca Cola employs more than 150,000 people globally and is the leading provider of sparkling beverages, fruit juices and ready to drink coffees and teas (Coca Cola 2013). Indeed, Coca Cola is the largest global beverage company with operations and production facilities spanning six operating regions that include North America, Latin America, Europe, Eurasia and Africa, Pacific and Bottling investments. Coca Cola is geared at refreshing the world through inspiring moments of optimism through its actions and brands (Coca Cola 2013). The company aims at creating value and making a difference through its brands and activities. On the other hand, Calypso Soft Drinks Ltd is committed to the produce and supply of fruit juices and soft drinks in the United Kingdom and offers a variety of beverages such as ice lollies, mineral water ice cubesm, aqua juices , juicy aids, juicy waters, and freezepops (Coca Cola 2013). Calypso Soft drinks aims at satisfying its wide range of clients that include wholesalers, supermarkets, caterers and schools in the UK. The goals, mission and objectives of Calypso Soft Drinks Ltd is to create delicious soft drinks and freeze products that refresh and are tasty to the consumers (Calypso Soft Drinks 2013). ... Coca Cola vision 2020 acts as the framework for creating the long-term destination of the business operations through understanding market trends and forces that will shape the nature of business operations in the future (Coca Cola 2013). The vision of Coca Cola is to attain sustainable and quality growth through meeting the needs of the stakeholders (Coca Cola 2013). For instance, the company is committed to creating a great workplace and empowering the employees through constant employee engagement, excellent training and development opportunities and open and inclusive employment policies (Sadler and Craig 2003). Coca Cola is committed to nurturing mutual relationships and creating value for its network of partners while at the same time remaining a lean and profitable organization. The company is committed to environmental conservation through helping ensure sustainable communities and minimizing environmental degradation through pollution (Sadler and Craig 2003). Impact of UK ec onomic system on Coca Cola Company The UK economic system is favorable for Coca Cola business operations. The UK is currently experiencing economic recovery from the adverse economic and financial crisis that were experienced after the collapse of the housing boom in 2008 (Langdana 2009). The UK is a mixed economy with both state and private sector contributing to the overall growth and prosperity of the economy (Sadler and Craig 2003). The UK is the seventh largest economy in the globe in terms of purchasing power parity and nominal gross domestic product. Some prominent economic sectors include livestock industry, agriculture, pharmaceutical, and oil and gas industries (Bamford and Grant 2000). The UK

Thursday, September 26, 2019

Crime control strategies Essay Example | Topics and Well Written Essays - 250 words - 1

Crime control strategies - Essay Example According to Otis Rice, the legacy of the civil war, and the weakness of institutions such as the church, education system, the isolation of the family, and the impotence of the law led to the origin of those feuds with an example being the Hatfield-McCoy feud (King, 2013). The occasional revenge in retribution to the evil done by each rival side shortly set the wheel in motion. John Ed Pearce adds that much of the feud violence never reached the courts. This is because they had little or no trust, for them, thus ended up settling the matters themselves (King, 2013). He adds most of the settlers were of aristocratic background, who had fled harsh English laws and oppression, and had found a new way of life of which they wanted nobody to infringe on them. Therefore, they fought for what they saw as justice themselves a case being the Martin-Tolliver feud in Kentucky. In conclusion, revenge, poor justice system, need for self-rule and political factors made the family feuds and conflicts had to resolve hence their longevity. The quest for freedom and the thought of crushing anybody, which threatened it be it laws or neighboring society, made the feuds escalate to an extent of a legendary

Social Awareness Assignment Example | Topics and Well Written Essays - 750 words

Social Awareness - Assignment Example The wife would rest her hand on her husband’s shoulder when she wanted him to stop so they could go inside a store. The husband would always let his wife enter a store first before him. Either of them would shake their head if they did not like the other’s suggestion. The non-verbal signals did not appear to make the interaction between the two of them difficult even without words. 4. Their non-verbal communication made it easy for me to think they are married. I think couples who are married are always close to each other. Couples who are not married do not just hold hands. They have their arms around each other’s waist or on each other’s shoulders. This is why I formed this impression about them very fast. 1. The next interaction I observed was in the grocery store. It was also noisy at this place. There were noises coming from the cash register, public announcement system, music and grocers. I see a lot of families today. It is a Sunday. I chose a family of three. The father was carrying a baby and pushing a grocery cart. The mother was holding a pen and checking off of a list. I heard the baby crying so I chose them to observe. 2. There were many signals for non-verbal communication I saw. The baby was crying and the father was moving the baby up and down his arm. I think this was his way to make the baby quiet. The baby did not stop. The mother was frowning. She got a pacifier from the baby bag and gave it to the father. I watched the father’s mouth form the word â€Å"Sshh†. I think the noise of the mall made the baby uncomfortable. The behavior of the baby affected the mother. She started choosing things faster. 3. The interaction was informal. I decided this because the woman and man stood close to each other. Also, the woman touched the man’s hand or shoulder many times. She passed grocery things to him quietly and he put them in the cart. They looked very comfortable with each other. 4. I quickly

Wednesday, September 25, 2019

Different Proportion of M&M Candies in Each Colour between Two Sample Research Paper

Different Proportion of M&M Candies in Each Colour between Two Sample Proportions - Research Paper Example There were 1535 blue candies in the bag out of 7356 candies and the proportion of blue candies is 0.2087. The 95% Confidence Interval is (0.1994, 0.218). There were 1587 orange candies in the bag out of 7356 candies and the proportion of orange candies is 0.2157. The 95% Confidence Interval is (0.2063,0.2251). There were 1320 green candies in the bag out of 7356 candies and the proportion of green candies is 0.1794. The 95% Confidence Interval is (0.1707, 0.1882). There were 925 yellow candies in the bag out of 7356 candies and the proportion of yellow candies is 0.1257. The 95% Confidence Interval is (0.1182, 0.1333). There were 990 red candies in the bag out of 7356 candies and the proportion of red candies is 0.1346. The 95% Confidence Interval is (0.1268, 0.1424). There were 999 brown candies in the bag out of 7356 candies and the proportion of brown candies is 0.1358. The 95% Confidence Interval is (0.128, 0.1436).The sample size in estimating the proportion is 438. In testing w hether the given sample proportion of blue candies (0.2087) matches with the population proportion 0.24 of blue candies. The hypothesis is rejected (Z=-6.291) since the observed value is less than the expected value -1.96. Hence there is a significant difference between the sample proportion and population proportion. In testing whether the given sample proportion of orange candies (0.2157) matches with the population proportion 0.2 of orange candies, the hypothesis is rejected (Z=3.3754) since an observed value is greater than the expected value 1.96. Hence there is a significant difference between the sample proportion of orange candies and population proportion of orange candies. In testing whether the given sample proportion of green candies (0.1794) matches with the population proportion 0.16 of green candies, the hypothesis is rejected (Z=4.5492) since the observed value is greater than the expected value 1.96.

Tuesday, September 24, 2019

Solving a Complex Problem at EMC Research Paper Example | Topics and Well Written Essays - 750 words

Solving a Complex Problem at EMC - Research Paper Example Analysis of the situation in the Plasti-brack product line The problems with the Plasti-brack product line are numerous. The reject rate lies between 12 and 20% which is very high and is obviously costing the company since it takes money and time to correct defects. When customers buy products that are defective it can affect the company’s business in terms of the public perception as one unsatisfied customer can lead to a loss of other customers. The molding dies are very old which means that they have been bought and stored for too long. This implies that the company is holding too much of this type of inventory. There is a problem with the dies which means that they have to be replaced. New plastic injection die cost between $25,000 and $30,000 each. This means that it will cost the company between $150,000 and $180,000 to replace the six dies. The company will only be able to get these within six weeks from the date of order which means quick action is required in terms of the best way forward. The M101molding machine has a record of high unscheduled repair and downtime requiring minor adjustments several times per week. Replacing or repairing this machine should lead to a significant reduction in backlog. The advantages and disadvantages of replacing or overhauling the machine need to be analyzed before making a decision. Additionally, the availability of funds is another factor that should be considered in making the decision. The purchasing manager has also indicated that there are resins of better grade that can be used. They cost between 10 and 15% more than the one which is currently in use with the more expensive one – the RP625 being able to reduce some of the scrapped parts generated by the MG251. However, he is not sure how the RP515 which is the cheaper one would do. A decision is therefore required and since waste is an issue the RP625 may be ideal. Another matter for consideration is that a new shift will mean a shift premium of 1 5% or overtime work at time and a half. New shift will mean employing additional staff and this cost money. It is possible that the six weeks back log may be resolved by quick changeover and a reduction in machine down time. However, current productivity levels need to be determined. The set up times which is the die changeover time for both blanking and molding is four (4) hours on average which means that more than half the work time is spent on just setting up. If this can be reduced it would benefit the company tremendously since it would increase production. Tom Tucker has indicated that it would cost $10,000 to modify dies with quick clamps in order to reduce set up times to between half hour and one hour. This reduction in set up time would lead to twice the production levels per day. Diagnosis of the problem In addition to the frequent downtime in machine M101 which is a major problem, it appears as if the die changeover time is the main reason for the back log. Once somethi ng is done in relation to machine M101 then the problems associated with Machine Group 251 for which it is apart may be completely resolved. The die changeover currently takes an average of 4 hours. Reducing this time should double daily production levels. Therefore, overtime may not be an major issue in resolving the backlog issue. Plan for resolving the problem The problem

Monday, September 23, 2019

Are The Degree Programs In Business Administration Sufficiently Essay

Are The Degree Programs In Business Administration Sufficiently Rigorous Academically, Compared To Other Programs - Essay Example Whereas the word, "doctoral" is in most cases used only to describe a PhD program, there are several other degrees which are doctoral degrees, and this include the Doctor of Business Administration (DBA), Doctor of Jurisprudence (JD), Doctor of Medicine (MD), Doctor of Psychology (PsyD) and Doctor of Education (EdD). Although the degree is a platform for the advancement in careers relating to research, consulting, or business administration, most students who undertake the PhD programs promote specializing in a critical dimension such as accounting, finance or marketing (Cass 8). Students wishing to improve their academic careers because, the PhD is the doctorate that is commonly pursing this. On the other hand, the Doctor of Business Administration, also known as DBA, is formulated to equip business executives with skills required in pursuing business, as well as public administration careers, which entails enhanced research skills, along with their qualifications. Apart from that, some of these programs can serve as go between in careers within academia. The Doctor of Business Administration is intended to present business executives with requirements needed to succeed in conducting business, as well as public administration careers that require more developed research skills, along with their qualifications. On the other hand, some of these DBA programs may serve as pathways into careers within academia (Cass 9). The comparability of these two programs is more than their diversity, however, the main difference between a business PhD program and a DBA program originates in the way the two programs are oriented, along with the desired outcome. A PhD program focuses on the development of a new theory, while, on the other hand, DBA, focuses on applying theoretical knowledge in order to make progression of a business practice. Another stunning difference between a PhD and a doctoral is that, although all PHD degrees are doctorates, not all doctorate degrees quali fy to be PhDs (Crocker 45). PhD programs are meant to describe programs whose priority is on research, while, on the other hand, the purpose of doctoral programs is to master research program, as well as professional practices. Even so, both DBA and PhD programs require innovative research in the formation, as well as defense of a thesis. However, there is a difference in the DBA program, with some of them being more driven towards knowledge application, while others are driven towards knowledge creation. The same reasoning applies to PhD programs whereby some programs in business like Doctor of Management and Executive Doctor of Management follows this path (Crocker 46). The designation "doctor," denoting mastery of a certain subject, came from Italy in the early 1100s. However, the current form of the PhD came from the Germany university system in the 19th century, which was established to demonstrate that the student with a degree had accomplished original research in a field wor k; and this was incorporated by Americans in its own universities in the late 1800s. Contemporary PhD students are expected to spend an average of eight and half years in graduate school, making theses which are hundreds of pages long, while at the same time, performing research and mastering the literature of his or her field, regularly in preparation of a career in teaching in the university

Sunday, September 22, 2019

The occurence of the earthquake Essay Example for Free

The occurence of the earthquake Essay The occurrence of the earthquake hazard and the highest level of vulnerability is centred upon the economically developing nations. Discuss the truth of this statement and make recommendations concerning how LEDC’s might manage the earthquake hazards. Earthquake hazards are one of the three geological hazards that occur. Earthquakes have lots of energy that cause destruction on the planet. There are up to 3000 earthquakes per year and about 30 cause serious damage. Most of the damage occurs in LEDC’s because poor infrastructure and housing is not earthquake proof. The way forward is to manage earthquakes hazards in LEDC’s so when they do strike the area is not likely to suffer lots of damage and loss of life. The earth is made up of many different plate tectonics, some large like the Pacific plate and some small like the Nazca plate. Most activity happens are plate boundaries and there are three types of boundaries. Destructive plate boundaries are where one plate the less dense Nazca (sima) is sub ducting under another more dense plate, South American (sial). Conservative plate boundaries merely slide place each other and are quite inactive. Earthquakes are very rare here compared to destructive plate boundaries. There is also constructive plate boundaries, where plates are pulling apart and sea trenches and ridges appear. When friction builds up between the two plates moving towards each other cause friction to release and cause an earthquake. LEDC have highest amount of vulnerability due to the amount of poor infrastructure and poor emergency response. The seismic gap theory helps scientists accurately predict where an earthquake is going to occur, however they cannot say when. Istanbul in Turkey is on the 1500 km fault line called the San Antonio. Scientists are able to say that Istanbul will be the next spot because of the accurate prediction of the Izmit Bay Earthquake. It is before Istanbul on the fault line and scientists said it was next in 1998 and in August 1999 their predictions came true. It was a magnitude of 2. 4 and lasted for approximately 45 seconds. Just because Turkey is considered an LEDC’s doesn’t mean that it has a more likely chance of an earthquake occurring. Japan is seen as a MEDC and is a hotspot for earthquakes as it is the meeting point for plates such as the Pacific from the East and the Eurasian from the west. Kobe has an earthquake in 1995 and caused mass destruction to the area. It caused 4,500 deaths and upto 100,000 people were made homeless. It was seen as the most costly disaster in history because Kobe is a developed city and its infrastructure and buildings collapsed in the disaster. 56,000 buildings were destroyed and many electricity and gas lines were disrupted. It came as a shock when so many buildings collapsed as back in 1981 new building regulation were introduced. To make buildings earthquake proof it is only a couple of percentage of the total cost of the building so it is worth it. However many of the buildings in Kobe are old and the cost of upgrading them would be between $50-100 billion. Mexico is also a hotspot for many earthquakes as it is on the meeting point of the plates. The subduction of the Cocos Plate under the North American plate has created the mountain range in Mexico is also the cause of many eartquakes and volcanoes. Mexico City has a large population of 8. 8 million inhabitats. The city has a problem as it is built on a lake. The area has been drained, but when an earthquake occurs liquefaction happens and this is where buildings sink in the muddy soil. One building is considered the safest in the world and it is located in New Mexico, Mexico. Torres Major has foundations that are 3 times as deep as the Empire Building at 60m. These steady foundations go into the hard bedrock beneath and absorb the energy from the earthquake. The designer Dr Leonardo Zeevaert when took the project on considered ways in which he could make the building as earthquake proof as possible. Shock absorbers were added to the buildings so that when the earth shock the building would move with it. This was to prevent the building becoming to stationary and beening shock to death when a earthquake occurs. Although Mexico City has one of the safetest building much of the rest of the city has no such luck. More than 1,000 private homes need more attention, but they have no where else to go, so the work cannot take place. There is also severe overcrowding in the city which has caused 32 apartments in the city to be crammed with 450 people. This has caused the problem of families knocking down supporting walls to make the apartments bigger. Knocking down walls has caused the buildings’ stability to weaken and more chance of collapsing. There is also the problem that there is no building regulations and no education to the local people about how to make homes safer, which should be the government’s priority. LEDC’s are more likely to suffer building damage because of poor construction and unreliable building materials. In Istanbul, Turkey the country should try and get ready for the earthquake that is predicted to come, however they are not. There has been an increase in the number of buildings both illegal and legal due to the increase of population that are migrating to the capital. 50% of the new builds are illegal as the contractors are more concerned about money and profits than safety. It is predicted that if the earthquake happens about 70% of the buildings will be flattened due to the vibrations. It would be recommended that for places like Turkey, to rigorously enforce building regulations. There should be an improvement in the way buildings are designed such as having deeper foundations or added cross bracing for more stability. The way in which concrete is mixed is also important in helping the structure be sturdier. Overall lots of damage has occurred in LEDC’s because of lack of money in building better and more earthquake proof buildings. In the future places like Turkey that are bound to have an earthquake should have more inspectors to enforce and insure better housing is built. Although Mexico has built the safest building in the world, they have neglected much of the private houses in which the poorest of people live. If there is an earthquake in the near future Mexico and other LEDC countries will still have the same destruction as they did before.

Saturday, September 21, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an