Wednesday, August 26, 2020

Market Strategy of Blue Cross Blue Shield Assignment

Market Strategy of Blue Cross Blue Shield - Assignment Example Favorable examination shows that in any event, during the monetary emergency of 2008, the association has been heavenly a direct result of their high client value and premiums. Medicinal services is one the components that were consistently strong. Taking a gander at the budget reports, the organization made yearly deals of $75.7 million. This permitted the organization to use itself in the business.  One of the significant qualities of the association is its capacity to have a solid client base bolstered by its mechanical foundation. The framework is intensely upheld by its plan of action and seeing how innovation can serve its needs. In any case, the key advantage that the Blue Cross accomplished was the way that it permitted its clients to the openness of data absent a lot of postponement. In an industry where data is indispensable, this association had the option to oblige the necessities of their developing clients just as furnish data that was consistent with HIPAA and ACA.  One of the significant qualities, as referenced previously, was the way that it had a solid client and income base. The premiums that were being gotten from the association really saddled development and permitted the organization to get a solid limit as an organization.  One of the significant difficulties of the organization was to extend its private and open cloud with consistence. It was obvious that the hazard the board associated with the protection business is a colossal central point.â Blue Cross had an enormous situation of extending their IT framework limits by keeping up old records and making space for new clients. Moreover, the company’s evaluating group had the option to guarantee the authenticity of system passwords inside their own IT framework. With regards to distributed computing, numerous flavors are available.

Saturday, August 22, 2020

While the Wheel Keeps Spinning A Gradual Descent into Delightful Madness

While the Wheel Keeps Spinning A Gradual Descent into Delightful Madness Presentation: When Life Is at Stake Though it is really difficult to state that the theme of betting is new to the vast majority of the world writing would be an extensive stretch, it's a given that Ellison adds a particular touch to it, making his story †that is, the account of a man who is gradually plunging into franticness †unimaginably clear. Rather than admonishing over the issueAdvertising We will compose a custom exposition test on While the Wheel Keeps Spinning: A Gradual Descent into Delightful Madness explicitly for you for just $16.05 $11/page Learn More Watching the Lead Character: Through Misery Lens When comprehending what the story is going to end with, it is very stunning to see that it begins from a run of the mill setting in the most ordinary spot ever. Recounting to an account of a man whose spouse is continuously passing on while he can't do a thing about it, the story promptly sets a desolate foundation. Despite the fact that it is commonly viewed as t hat the hero loses his brain during the time spent the game: â€Å"His confidence in a bingo game transforms into franticness that closes with violence† (Thomas, 2008, 98). Notwithstanding, it tends to be contended that the character begins his plummet into franticness a lot prior †to be progressively careful, from the earliest starting point of the novel. â€Å"I ain’t crazy† (Ellison, n.d., 469), he says, as though attempting to persuade himself. Ellison just sets the disposition for the remainder of the story, yet additionally shows that the character will be before long experiencing a progression of changes. Getting away from the Tight Grip of Despair Another hover of franticness starts at where Ellison clarifies that the protagonist’s spouse is critically ill. Committing an incredible piece of the story to building up these two characters and the connections between them Ellison clarifies that her being unwell adds to the lead character’s torments. Another turn of craziness begins as the creator uncovers that the lead character drinks a considerable amount. Be that as it may, the significant point, which is for all intents and purposes the passage to madness for the main character, begins with an abrupt continuous flow blasting under the weight of the liquor exhaust: â€Å"The bottle murmured once more. He shut his eyes [†¦] and seeing the train coming, and running back as quick as he could go, and hearing the whistle blowing [†¦]† (Ellison, n.d., 470). One of the most realistic scenes in the book, this one specifically shows the perusers how far the lead character’s craziness can go.Advertising Looking for paper on american writing? How about we check whether we can support you! Get your first paper with 15% OFF Learn More A Playing of Fortune: Take Him Where the Wind Blows Slowly picking up energy, the frenzy of the lead character shows itself in the most clear manner during the game. One c an see it picking a quicker pace in each and every sentence: â€Å"He watched the wheel spinning past the numbers and encountered an explosion of magnification: This is God! This is the actually really God! He said it for all to hear, ‘This is God!’† (Ellison, n.d., 473). At long last, as the lead characters go comes to partake in the game, he loses command over his sentiments, and crap hits the fan: â€Å"’Who am I?’ he screamed† (Ellison , n.d., 475). As the franticness advances, the unrest goes into a considerably progressively serious stage. It is very impossible to miss that the eminence of franticness that grasps the lead character is spilled out as a senseless tune: â€Å"Shoot the alcohol to him, Jimmy kid! /Clap-applaud clap† (Ellison, n.d., 476). The pace of the whole story by one way or another helps to remember a music beat, which begins at the slowest pace: â€Å"The lady before him was eating cooked peanuts† (Ellis on, n.d., 469), advances to the quickest one: â€Å"He faltered down the passageway and up the means to the stage† (Ellison, n.d., 471) and closes with the slowest pace once more: â€Å"he didn't see the man’s moderate wink† (Ellison, n.d., 477). The Moment the Earth Stood Still One must give Ellison kudos for being incredibly unpretentious with the completion of the novel. It is very unconventional that creator doesn't state that the lead character kicks the bucket. Ellison doesn't have to express the agonizingly self-evident; rather, he grows much more subtleties and passes on the unpretentious message of misery, making the last shoot the whole novel through: â€Å"He just felt the dull torment detonating in his skull, and he knew even as it sneaked out of him that his karma had abandoned the stage† (Ellison, n.d., 477). It is likewise very particular that for a second, the main character gets in contact with the real world, just to comprehend that he w ill be dead in the following couple of seconds. An appalling peak to a terrible story, the completion leaves the feeling that a fragile instrument abruptly turned out badly lastly broke into pieces.Advertising We will compose a custom exposition test on While the Wheel Keeps Spinning: A Gradual Descent into Delightful Madness explicitly for you for just $16.05 $11/page Learn More Conclusion: Watch the Wheel Spinning Though King of the bingo game can't be known as the most exciting read, it certainly has a one of a kind energy and a particular touch to it, which makes the peruser sink into the fictional universe, underestimating it. In spite of the fact that told in a concise way and pointing at the most fundamental minutes and subtleties, the story despite everything causes the crowd to identify with the lead character. With the assistance of explicit pacing, the writer adds a sharp edge to the portrayal, bringing the peruser into the nonexistent reality. Allow the game to start. Re ference List Ellison, R. (n.d.) King of the bingo game. Recovered from https://www.csus.edu/indiv/m/maddendw/King%20Bingo%20Game.pdf Thomas, P. L. (2008). Perusing, getting the hang of, educating Ralph Ellison. New York, NY: Peter Lang.

Wednesday, August 19, 2020

rolltreppe

rolltreppe Chris Peterson once said, rfong is a good photographer, and in order to do that you have to be really creepy. (Umthanks?) It is that Machiavellian attitude which capacitates this blog and this miniature visual ode to my favorite MIT band, Rolltreppe. Ive been living under a rock for the last four years thanks to course 6, and didnt find out about these guys until I went to saxophonist Dylans Emerson Scholar recital. Dylan, with whom I did FAP (Freshman Arts Program) almost four years ago, is about to graduate with a course 6 degree, numerous musical accolades, and a penchant for dual-wielding saxophones. Rolltreppe describes itself as a live funk and electro swing combo group. Its repertoire ranges from jazz standards: To funky arrangements of other classic songs (here is a subset of the group at Dylans Emerson recital): To crazy original compositions (here they are winning MITs battle of the bands): To various combinations of the above mashed into each other: They are all (obviously) engineers as well. MIT is a breeding ground for unfairly multitalented folks. Try to catch them next time youre around MIT! They recruited Peter15 (keys, composition) when he was a prefrosh because he was just that good, but since CPW has come and gone, you can settle for meeting them at orientation. Stay classy!

Sunday, May 24, 2020

Essay on My Philosophy of Education - 733 Words

Philosophy of Education Jean-Paul Sartre said, â€Å"Man is nothing else but what he makes of himself† (Myra, David, 402). According to him, personality is made by him/herself according to environment, religion, or society and everyone has a different belief and idea such as how they want to behave toward others or what I want to be on their own through their experience or life. Everyone has his or her own belief, philosophy, and dream but also I have my own concept. My philosophy of education revolves around why I want to be a teacher, my own philosophy of education, and what I want to do in future. After reading the nonfiction book by Torey F Hayden †The Child, Sheera† I was influenced to be a childhood special education†¦show more content†¦It made me feel relieved. This good opportunity makes me confirm that I like children and I want to be a teacher. Because of above reasons, I want to be a teacher. To be the ideal teacher whom I want to be, I will focus on the philosophies of Existentialism and Progressivism. Existentialism is one of the big support philosophies in my belief. Existentialists believe that the human being is not affected by the environment, but establish their own independence. According to the existentialism as an educational philosophy, subject matter takes second place to helping the students understand and appreciate themselves as unique individuals who accept complete responsibility for their thoughts, feelings, and actions. (Myra, David, 402) I really want students to have and say own opinions with complete self-confidence. It builds them own characteristics. In Japan, people prefer not to say their opinion and they regard that it is a good attitude. Because of this tendency, most Japanese can’t express their opinion. Thus, I strongly believe this is an important philosophy. In addition, progressivism also supports my belief. Progressivists also believe individuality. Believing that people learn best from what they consider most relevant to their lives, progressivists center the curriculum around the experiences, interests, and abilities of the students. (Myra, David, 398) This idea is completely opposite idea of the essentialists. According toShow MoreRelatedMy Philosophy On The Philosophy Of Education844 Words   |  4 PagesIn mathematics, as in life, everything must be brought to the simplest of terms. I base my teaching philosophy on the foundation that every student is capable of learning mathematics. I will strive, as a teacher, to ensure that my students are able to have a strong foundation of mathematical skills when they leave my classroom. Some students believe that they are not mathematically gifted; therefore, incapable of learning mathematics. I believe to the contrary, all students with motivation, sustainedRead MoreMy Philosophy On Philo sophy Of Education852 Words   |  4 PagesMy Philosophy of Education My philosophy of education is founded on a belief that all students have a desire to learn and to feel accepted. Learning takes place when students are able to have their specific needs meet inside the classroom, to feel accepted in the environment, and find the learning to be meaningful. I believe that before learning can take place a proper educational environment must be present inside the classroom. In order to make any classroom work I believe you need meet three criteriaRead MoreMy Philosophy Of Education As A Education864 Words   |  4 Pagesdifferent philosophy of education, and what purpose education serves in a child’s life. The five philosophies of education that we recognize are: Essentialism, Perennialism, Progressivism, Social Reconstructionism, and Existentialism. I would most recognize my philosophy of education as Essentialism. Essentialism has been a dominant influence in American education since World War II. It focuses on core curriculum of traditional academic topics. I believe that the purpose of education is teachingRead MoreMy Philosophy of Education824 Words   |  4 Pages13 February 2011 My Philosophy of Education I believe that progressivism educational philosophy most closely matches my educational ideals. In my opinion based on the progressivism educational philosophy, the purpose of education is to enable students to learn useful knowledge that has meaning to them in the future. Thus, the most useful education for students is the skill of â€Å"learning how to learn†. When students understand the methodsRead MoreMy Philosophy Of Education And Education1038 Words   |  5 PagesMy Philosophy of Education When trying coming up with a personal philosophy of education, I had to ask myself what the purpose of education is. To me, the purpose of education is to teach students knowledge that is needed to make it through school and to succeed in the world after graduation. Anyone can go into teaching, but not every teacher can teach. Teachers go above and beyond to introduce methods, philosophies, and strategies to help their students learn, as well as, retain the informationRead MoreMy Education Philosophy 1511 Words   |  6 PagesPersonal Mission Statement Education is the imparting and acquiring of knowledge and skills through teaching and learning. As an educator, my personal mission statement is to master my subject area in order to serve as a role model for my students thereby producing students who thoroughly understand the subject matter, and who develop holistically. In order to achieve this goal I must have a set education philosophy with a strong Christian worldview. I must also have a general understanding of theRead MoreMy Philosophy Of Education1056 Words   |  5 PagesPhilosophy of Student Engagement My philosophy of education is that every child should receive high quality education that is inclusive, relevant and meaningful to their life. I am a firm believer of making pedagogy relatable to my students. My vision is driven by my personal experiences with the American school system. I was what is thought of as â€Å"A child at risk†. I am an immigrant, black, Muslim student. My life is transactional as I am a part of multiple marginalized groups. Most of my teachersRead MoreMy Philosophy Of Education And Education864 Words   |  4 PagesPhilosophy of Education Children are the future and their education is the key to our society’s success. When considering this, I realize I have an immense responsibility as an educator. The main focuses of my teaching are active learning, building character within students, and providing meaningful curriculum. I want to create a comfortable setting where every student feels safe to learn. In many ways, my philosophy agrees with the holistic approach to education. I feel this challenges the studentRead MoreMy Philosophy on Education814 Words   |  3 PagesMy Philosophy of Education I think when I made the decision to become a teacher I was not thinking the seriousness of this decision. When we become teachers we also become the molder that will shape our student to be successful in life. But when you decide to become a teacher in a Christian school you are not only shaping this student to be successful in life but we are also shaping their Christian mind to do things with a feeling knowing that they are shape and where made by the image of GodRead MoreMy Philosophy Of Education1015 Words   |  5 Pagesimmediately sparked my interest in becoming an educator and share my personal beliefs on the important aspects of education. In addition to this, I will present various traits I believe are essential and critical for teachers to successfully fulfill their role as an educator. During my elementary years, I developed an urge to frequently ask many questions during the school day. Being able to question anything was astonishing to me. This was because my parents were unable to answer my questions and help

Wednesday, May 13, 2020

Create the value Free Essay Example, 2500 words

The degree to which customer perceive a new product or service as superior to similar existing products determines the relative advantage. A product or a service that provides an advantage over an already product offering is said to be greater than the existing market alternatives. Thus, the product is said to be great in terms of value as compared to other market products. b) Compatibility: The compatibility of the inventive product and service offering with the current backgrounds, behavior and routine patterns of consumers also affects its acceptance by the public. A product’s or service’s compatibility measures how closely it relates to needs, value systems and norms, lifestyles, culture, etc. when the levels of compatibility are high rate diffusion is going to be high. Is going to be; and likewise lower the compatibility, the lower the diffusion rate. c) Complexity The levels of complexity in a commodity, buying and usage affect the rate diffusion process of the product. An established innovative of a product is quickly diffused when there exist an ease of understanding, buying and usage of a product. We will write a custom essay sample on Create the value or any topic specifically for you Only $17.96 $11.86/pageorder now When it is easier to understand the usage a commodity, the more likely It’s going to be accepted and liked by consumers. However, it’s of paramount importance to note that technological complexity is a barrier to the diffusion process. Users tend to resist adoption of new products and innovation in the market because of fear of complexity in the purchase and consequent usage of the new product. High technological firms easily understand this d) Trialability: This is the ease with which the service or a product can be tried and tested. This aspect critically determines the rate of acceptance of a new product. When the degree of trialability is considerably high, the rate of the diffusion process is also high. This simply because it gives chances to  try the product or a service. Evaluation is then done it on whether r to accept or reject the product. Trialability can be encouraged by providing free samples, or providing smaller packs and smaller-than-average sizes. e) Observability of a product This is the ease with which the a product commodity is observed. Observability aspect of the innovative product refers to the rate in which a product beneficial attributes can be imagined, seen as well as perceived by a willing consumer. A product that possess a high degree of observability has greater the chances of the innovativeness. There certain attributes that adversely affect diffusion rate of innovation and subsequently the adoption.

Wednesday, May 6, 2020

Urbanisation has changed the face of Mumbai Free Essays

After living in this busy metropolis, this island of islands for about 17 years I’ve realised one thing – your senses are automatically heightened. Whether it’s your eyes that are constantly alert in the fast paced traffic or your ears that are forced to hear a cacophony of trains, vendors and honking cars. Your mouth and taste buds that have grown accustomed to Mumbai’s spicy, flavoursome cuisine. We will write a custom essay sample on Urbanisation has changed the face of Mumbai or any similar topic only for you Order Now And of course, we’ve all had the chance to travel in a packed local train, scared that we’d get pick-pocketed, it’s like we’re born with a heightened sense of touch too. But I perceive Mumbai to be a â€Å"city of smells†. By this, I don’t imply that ours is a city full of stench and smog, no it’s much more than that! Like each home has a distinct smell of its own, Mumbai has these particular aromas and scents that define the city and give it character. The moment you step into Mumbai, your impression about the city could vary, depending on whether you’re an optimist or a pessimist. A pessimist would complain about the foul odour that comes from the slums, (You should know that Mumbai is home to one of the largest slums in Asia – Dharavi, so that’s a lot of stink! , the amount of vehicular pollution and smoke from cigarettes, the malodour of overflowing sewage etc. An optimist, on the other hand would enjoy the sterile, sanitised smell of malls, hotels which are plenty in Mumbai. Or you could be a realist like me and believe the city has a dual identity with motley collection of fragrances and odours. But tha t’s a discussion for later. Urbanisation has changed the face of Mumbai entirely – quaint little bungalows with terracotta tiled roofs are replaced with high rises made of chrome and glass. Niwas-es† and ‘Sadans’ are pulled down to make way for ‘Towers’ and ‘Heights’. However there still are some remaining gardens and patches of green like the Hanging Gardens, Jijamata Udyan, the Sanjay Gandhi National Park to name a few. Mumbaikars still visit these parks to get a whiff of nature. And how can I forget the numerous â€Å"Chaafa† or champa trees with their sweet smelling flowers! Ironically this fast pace of industrialisation and development hasn’t improved the condition of public toilets in the city. Most Mumbaikars still cringe at the stink that comes from our city’s ‘shauchalayas’. The part of Mumbai that I enjoy the most is the sea. As a child, I’d know that we were passing by some â€Å"Chowpatty† or beach by the crisp saltiness in the air. Mumbai’s fish markets smell of the salty sea too – it’s the smell of freshly caught fish. Most times these markets give off the odour of rotting fish – an odour I still find repulsive. And then there is the floating smell of sukka bombil or Bombay duck dried in the sun near the coast! Another way of knowing that you’re near a crowded beach is the inescapable smell of chaat. The aroma of herbs, garam masala, the tang of squeezed lemons in a plate of bhelpuri or sev puri are enough to set the juices going in your mouth! You’d also smell vadapavs being friend and pav bhaaji being prepared – taka-tak – two dishes that originated in Mumbai. And then there is the smell of piping hot ‘cutting chai’, (The term cutting chai is said to have originated in Mumbai too! ) sold at tea stalls at every nukkad of Mumbai. Every meal in India usually ends with â€Å"paan†. Another common feature on the streets and many walls of Mumbai are paan stains which have their own disagreeable stink. Sometimes I can tell which part of Mumbai I’m in only by the distinctive redolence of that part. I know my train is passing through Andheri when I get a whiff of baked biscuits because the Parle G factory is very close to Andheri station. I know that my taxi has taken a turn at King’s Circle because of the aroma of freshly ground coffee beans and the local cafes serving original south-Indian filter coffee. For that matter I still associate the aroma of freshly baked bread, cakes and cookies from the string of bakeries in my very own Orlem. Travelling in local trains has become a part of the daily routine of a large number of Mumbaikars. More than often these trains are overcrowded, filled with more passengers than can fit in. Now it’s not the sea of bodies that I have an issue with, it’s the smell of human sweat that’s the problem! At such times I dream of Mumbai during the monsoon. There is nothing more beautiful, more gratifying than rains in the city! It gives us Mumbaikars relief from the summer heat, the air smells fresh and clean. The smell of wet mud right after a shower is almost magical. Yes, such earthy fragrances are a part of Mumbai too! How to cite Urbanisation has changed the face of Mumbai, Papers

Tuesday, May 5, 2020

Proper Etiquette in the Business setting Essay Example For Students

Proper Etiquette in the Business setting Essay Proper EtiquetteAmerica is an image driven country. Management is aware of how they and their employees represent that image on behalf of the company. An employees value to will be largely determined by how successful they are at projecting that image. Business etiquette is concerned with correct behavior and practices according to social convention. In the social realm, there are certain amount of etiquette that needs to be followed when dealing with business partners, co-workers and vendors. This is something that is a must any successful business. Because the office phone is one of the most commonly used pieces o office equipment and the main source of communication between an organization and its customers, it is imperative that you use proper business etiquette.A few tips when answering the office phone; always answer in three rings or less, answer with your name and the name of the company, make business call during regular office hours, and return calls in 24 hours or less. In addition, when using cell phones and pagers, always put them on vibrate so that it will not disturb others in your work area. Emails have become the main source of communication for most organizations today. Know that how you use your e-mail, company e-mail address and employers technology is a serious issue! Sending non-business related e-mails, jokes, forwards or chain letters on company time to friends or coworkers reflects on your lack of professionalism. Be careful who you cc (carbon copy) do not broadcast your every thought to all persons in yo ur organization.When forging new business relationships and solidifying established partnerships, the level of professionalism and courtesy you relay in your business e-mail communications will always gain clients over the competition. Many companies have gone with the idea of shared workspaces. In most situations, it is because of economical reasons. Showing consideration to colleagues in an open plan office will only work if you all adopt a mutual respect for each other. Keep your desk tidy. This is especially important if you are sharing an open plan desk and show courtesy when using any shared spaces. Be careful when having conversations. Dont speak too loudly in shared workspaces. Remembering that not everybody will share exactly the same values as you, adopt a policy of treating people how youd like to be treated yourself. This is an essential benchmark to ensure a harmonious workspace. At first thought, when you hear the term business attire it seems fairly simple. The thoughts of business attire are far from simple. Business attire can be broken down into three very different categories: business formal, business professional, and business casual. Business formal attire is more than your everyday work attire. This category is used for dressy evening events such as awards ceremonies and formal dinners. Men should wear a dark suit with a French cut shirt and silk tie or bowtie. Cufflinks and silk pocket squares that coordinate with the tie are optional accessories. The shoes should be black and also coordinate with the overall appearance of the outfit. Women should wear a conservative dress or suit with a skirt. Women must take care in choosing a dress or suit that conservatively fits his/her body and style. Business professional is considered attire that sets you aside as a professional. For men and women this means a well coordinated suit and accessories. Suits sh ould be a solid or pinstripe dark color complimented with a solid or striped white shirt. Ties are to be silk with a solid color or simple design. All suits should be accompanied by a belt; with a simple buckle; or suspenders. Women should have a simple skirted suit. These suits should be solid, neutral, and low key in color. No matter whether a dress or skirted suits, it should reach at or just below the knee. The accompanying blouse should be simple cotton or silk. The color of the blouse should be a solid color that coordinates with the suit. Makeup and perfume should be very light and subtle. Lastly shoes should be plain, solid and dark in color. Business Casual attire simply means you do not have to wear a suit to work.For some men and women this could mean a polo shirt, collared shirt, or sweater and khaki pants. For others this could mean you have an opportunity to add a splash of color or wear a casual suit to the office. This is not a time for you to wear lounging clothes t o work. Hand in hand with attire comes the subject of grooming. Grooming practices are extremely important no matter what the attire that accompanies it. Avoid all mistakes when it comes to the area of grooming. The most well thought out and well planned attire can be destroyed by lack of grooming. All clothing should be cleaned, pressed, zipped, closed and not frayed or falling apart. Due to the possible allergies of colleagues and clients keep perfume and cologne at a minimum level. Makeup and jewelry should be subtle and discreet. Fingernails should be kept cut and clean. No matter what your status is in life your appearance should matter. Appearance not only includes the clothing you wear but also your physical wellbeing. As you shop for your career life keep in mind the type of job you have, the company you represent and your core values. John Steinbeck: Experiencing the Dust Bowl EssayTo notify the waiter that you are finish eating, place your knife and fork diagonally across the plate. The person who invites the guest should pay the bill. Not only is it courteous to allow your guest to order first, it can also be used as a signal to your waiter. The signal can be given by clearly telling the waiter, please allow my guest to order first. Here are some general rules for proper dining etiquette: Do not place your elbows on the table. Often say please and thank you. Do not start eating until everyone at the table has been served. If you must leave during the meal, leave the napkin on the chair. Try to avoid sending food back to eliminate you as coming off as pretentious or insulting your host. If you must reciprocate with an invitation, choose a restaurant of similar quality. Do not underestimate the value of the need to know proper business dining. It is about being professional not being perfect. Todays success strategy is by way of entertaining. More and more business is conducted over the dining table. It is essential that you, as the business professional, feel confident in all dining situations because it can make or break your career. In the social realm, there is a certain amount of etiquette that needs to be followed when dealing with business partners, co-workers and vendors. It is essential that in the business world, it remain professional and not have too much of a crossover into the social world. However; when promoting cordiality the mix should remain more social than business. The three main things that need attention are thank-you notes, gift giving and office parties. A thank-you note is something simple and nice to send to someone who has given you a gift, invited you to dinner, or you have closed a major deal. There are rules in sending thank-you notes they are as follows:1.Notes should always be hand written; this makes it more personal and shows your gratitude. Dont use pre-printed or fill-in-the-blank thank you cards. Thats narrowly better than not sending a note at all. 2.Notes must be sent within 24 hours of the event or receiving the gift. 3.The note should be brief, personal and simple. 4.The note should be organized into three parts:a.Thank the person for the specific gift or eventb.If there is any other business state it nextc.State if necessary if you intend to meet again, or if any information will be sent at a later time. 5.Dont include fewer than three sentences in any note. 6.Dont talk about yourself. This is about the gift, not your life. Gift giving is another area of being cordial. Gift-giving can be tricky and there are rules that should be followed in the business world. A gift should not cost more than $25, they should be in taste and reflect the personality of the receiver. In an office setting it is not necessary to give everyone a gift unless you just want to however; some may feel that you dislike them or if they know that some have received gifts and other have not. Perfumes and colognes are personal and should be avoided at all costs. Christmas parties generally come each and every year. It is expected that everyone attend the party even if its just for a half-hour. Of course there are rules that apply in this situation as well they are as follows:1.Dress appropriately; there is nothing worse than being labeled as the woman with the low cut dress, too high split, or too short of a dress. If its a man wear a tie, or at least a dress shirt. Polos, jeans, khakis are not appropriate attire. 2.If alcohol is being served, watch how much you drink. Do not embarrass yourself by being so drunk that everyone has videotaped you being the office idiot who cannot hold their liquor. Please maintain some type of self-respect. 3.Do not under any circumstances flirt with any co-workers, supervisors or your boss. This is considered to be in very poor taste. 4.If there are accounts or situations that are confidential within the company keep it that way. Just because you are at a social gathering does not mean you get to gossip about business dealings or whose work is not up to par. 5.Keep in minds that if you are a supervisor then maintain that same repertoire; becoming too familiar with those who work under you can cause issues later on. 6.Since it is a party, have fun. There will be time for business on Monday, when you all return to work. Keeping a careful eye on all of the rules and making sure they are followed are essential to surviving in the business world. In order to have a successful reputable business using proper etiquette is a must. Spectators observe not only your etiquette skills but how you interact with all levels of people, in all situations. Reference PageDrafke, M. (2009). The Human Side of Organizations. (10th ed.). Upper Saddle River,New Jersey: Pearson Education, Inc. http://www.worketiquette.co.ukwww.netmanners.comhttp://smallbizbee.com/index/2010/03/12/4-tips-practicing-proper-videoconferencing/http://www.thank-you-note-samples.com/http://www.emilypost.com/communication-and-technology/notes-and-letters/99-thank-you-notes-to-send-or-not-to-sendhttp://www.businessmanagementdaily.com

Wednesday, April 1, 2020

A Quiz About Semicolons in Run-In Lists

A Quiz About Semicolons in Run-In Lists A Quiz About Semicolons in Run-In Lists A Quiz About Semicolons in Run-In Lists By Mark Nichol Replacing a semicolon functioning as a weak period (one separating two independent clauses that are so closely related that dividing them into distinct sentences weakens their impact) with a comma is a grammatically indefensible error known as a comma splice. But various strategies for replacing a semicolon deployed as a strong comma (one separating items in a run-in list that are themselves lists) with actual commas are valid and sometimes it’s necessary to correct improper use of semicolons. Devise a solution for supplanting semicolons in the following sentences with commas, and compare your revisions to mine: 1. â€Å"Issues include workplace environments; hiring, training, and promotion practices; and management styles.† 1. The order of the items in this run-in list can be altered so that the complex item (a list element that is itself a list) trails the others; the structure of the final phrase in the following revision clearly identifies it as a single item parallel in structure to the first two without semicolons as signal markers between the three larger elements: â€Å"Issues include workplace environments, management styles, and hiring, training, and promotion practices.† (However, avoid this solution if list items deliberately organized chronologically or by some other scheme of logic would be put into disarray by the revision.) 2. â€Å"Issues include workplace environments; management styles; hiring, training, and promotion practices; and outsourcing and the use of part-time and contingent workers.† This extended version of the previous example is easily modified as well, without altering the syntax of the revision shown above. Represent the simple first and second list items and the complex third item as a list, as in the example above, and insert the conjunctive phrase â€Å"as well as† before the next two items: â€Å"Issues include workplace environments, management styles, and hiring, training, and promotion practices, as well as outsourcing and the use of part-time and contingent workers. 3. â€Å"There can also be organ deformities, including heart defects; heart murmurs; genital malformations; and kidney and urinary defects.† If it weren’t for the subordinate clause â€Å"including heart defects,† no semicolon would be necessary in this sentence. So, to avoid retaining the mostly excessive semicolons, find another way to include the additional information outside of a traditional in-line list. Retain the phrase as a parenthesized phrase, but, as in the previous example, employ â€Å"as well as† and separate the remaining list elements with commas: â€Å"There can also be organ deformities (including heart defects), as well as heart murmurs, genital malformations, and kidney and urinary defects.† 4. â€Å"Damage can be minimized by shielding the testes, ovaries, and/or uterus; surgically moving ovaries out of the irradiation field; or altering the treatment schedule.† The presence of a verb at the head of each list item sufficiently distinguishes the items, so semicolons are unnecessary: â€Å"Damage can be minimized by shielding the testes, ovaries, and/or uterus, surgically moving ovaries out of the irradiation field, or altering the treatment schedule.† If the items in a semicolon-laden run-in list share a verb, try assigning a distinct verb to each item so that you can replace the semicolons with commas. 5. â€Å"The plant sucks in 785 million gallons of water a day; coal-fires it to temperatures up to 1,000 degrees Fahrenheit to turn it into highly pressurized steam; then pipes the steam into a giant turbine that spin magnets inside wire coils to produce power.† Semicolons are employed to distinguish list items that are complex, as defined above, not those that are wordy. Despite the length of the three items in this sentence’s list, semicolons are excessive; separate the items with commas: â€Å"The plant sucks in 785 million gallons of water a day, coal-fires it to temperatures up to 1,000 degrees Fahrenheit to turn it into highly pressurized steam, and then pipes the steam into a giant turbine that spin magnets inside wire coils to produce power.† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:When to Capitalize Animal and Plant NamesDeck the HallsMankind vs. Humankind

Saturday, March 7, 2020

Deconstruction of a Kerrang Double Page Spread Essays

Deconstruction of a Kerrang Double Page Spread Essays Deconstruction of a Kerrang Double Page Spread Essay Deconstruction of a Kerrang Double Page Spread Essay There is only one image on this double page spread, which is of Oli Sykes from the band Bring Me The Horizon , and it takes up only one page, the left side, of the spread. The camera shot shows the singer from just above the waist sitting at a reflective table. He is wearing what I presume to be a black jacket with a white top. The image has been shot in black and white so it gives the effect that this interview is a formal, serious one and it takes up one whole page of the double page spread. There is nothing bright on both pages so the whiteness of his top really stands out.Oli s expression is serious and his lips are slightly pursed. You can see on the table that he s sitting at, a wine glass but it has been blurred so that the reader automatically focuses on him. The lighting looks as though its coming from a the left of him as there are shadows on the right side of his face. Use of Layout: Each page of Kerrang! is just shorter than an A4 page. There is a little dead space on this double page spread and there are three columns that take up just over half of the right page. The page is text-led as the interview takes up more space.The only pull-out quote from the interview acts as the title and is in bold, white font. The subheading is yellow and all of the text is on a black background so that it stands out. The limited colour palette mainly consists of 3 colours, black, white and grey, but there is the odd splash of yellow text. Again, the whole interview has been placed on a black background because the text is mainly white and small, so this makes it easier to be read. On this double page spread there are 3 different fonts. The title of the interview ir and the star instead of actually being between the interviewer and interviewee.The caption used to anchor the main image is Facing the Future which is appropriate as Oli feels as though his bands reputation, as well as his own, will change after what has happened. There are quite a few screamers within the interview as he makes argues his point to the interviewer and the reader. The sentences aren t really that long but they re not short either. There have been 11 questions asked in the interview but only 5 of them have been answered with 1 to 4 word sentences. The average paragraph in the interview is about 6 or 7 sentences long.The sentence construction is compound, not too simple and not too hard to understand even though the subject is a complicated one. Brand Identity: The magazines brand identity is about rock music and anything related. News Articles such as this one wouldn t be shown on world wide news like the BBC. In the music industry, rock star incidents aren t really that important to broadcast on TV whereas news such as Britney Spears losing custody of her children is, because of the fact that she s more famous and more people know who she is.The target audience of this article must consist of people who are actually interested in the band Bring Me The Horizon , the true fans and those who idolise Oli Sykes for his musical talent and character. I think that if someone who didn t know who this band was or the lead singer, picked up this issue of Kerrang! and read this article, they would quickly misjudge him for what he was accused of doing and stereotype every other person in rock to be a trouble maker.

Thursday, February 20, 2020

English 102 Literature Essay Example | Topics and Well Written Essays - 1250 words

English 102 Literature - Essay Example The chapter opens with Mill's rhetorical question of where should the line of control be drawn between "the authority of society" and individual "sovereignty". Mill provides the answer to this question in the very next sentence saying that what concerns the individuals should "belong" to them and society has a control on that part "which chiefly interests" it. Here, Mill does not, however, elaborate on what could be those areas of society's interest. After ruling out the possibility of the society being based on a 'contract', the author still thinks that the individuals owe the other members of the society "a return for the benefit" of the protection that the society provides. The individuals cannot be allowed to harm other people's interests. Rather they should play their part in protecting them against injury. If individuals act in a way that mars other people's welfare, even if they are not illegal, they may be "punished by opinion." Here, public opinion is suggested to be a subst itute for law when necessary. Mill writes, "These conditions society is justified in enforcing at all costs to those who endeavor to withhold fulfillment". When a person's conduct affects only his interests, however, Mill says, that person should be allowed "to do the action and stand the consequences". There is no justification for society's meddling. After setting After setting the boundary line for the society, Mill goes on to clear his standpoint by saying, "It would be a great misunderstanding of this doctrine to suppose that it is one of selfish indifference, which pretends that human beings have no business with each other's conduct in life, and that they should not concern themselves about the well-doing or well-being of one another" he declares that "It is equally the business of education to cultivate" in the students the feelings of compassion for the fellow human beings and the sense of responsibility to the society. Individuals are indebted to each other. They should help and encourage each other in bringing about the best of themselves. But no individual should dictate terms to another simply because "He is the person most interested in his own well-being" and also because he better understands his circumstances that make him behave in a certain way than anyone else or the society in general. Others can offer their a dvice and suggestions but cannot take any decision on behalf of the person. If the individual allows others to take his decisions, then that might cause greater harm than if he takes a decision against the popular belief. Next, Mill talks about the freedom of opinion. Suppression of public opinion by the government can only lead to concealment of truth. By this Mill does not mean that public opinion is never wrong or biased, but at least the opinions that are wrong can be challenged to arrive at the truth. Here, Mill uses an interesting adjective that is, "self-regarding" which means concerning solely the individual, and advocates that in these self-regarding matters the government or the society has no right to interfere. However, sensing attack against this viewpoint, Mill immediately clarifies saying that this should not stop a well wisher of an individual from warning him against the harm he might cause himself by behaving in certain way even if it is about the self-regarding affairs. Similarly, every individual has the right to and duty of cautioning any individual against the possible

Tuesday, February 4, 2020

Management and Information Systems Individual Portfolio Report Essay

Management and Information Systems Individual Portfolio Report - Essay Example First, the contribution of each project to the achievement of the portfolio is considered to justify the adoption of the portfolio. Secondly, the manager examines the performance effectiveness of each project in the portfolio. Thirdly, the developer of the portfolio reviews the negative impact of the project on the performance of other projects in the company (Fritz and Schiefer, 2009). Finally, the manager contemplates the dependent and independent projects in a specific portfolio. Ginsters Company operates in a demanding market due to the increased competition in the region. In addition, the company’s operation costs tend to increase because of the long distribution chain. Development of a reliable and appropriate management portfolio for the distribution channel is essential in enhancing the performance of the organisation (Mail Online, 2010). Ginsters Company produces and distributes Cornish pastry, which is in the food industry. The food industry is among the most sensitive sectors in various economies. Management of various processes in the industry requires an appropriate approach to the ethics. There are various ethical issues in the food industry (Strbac, 2008). First, the manufacturing process of the food should embrace cleanliness and health of the consumers (Laudon and Laudon, 2002). In addition, various manufacturers of food products in the world should embrace good practices in their distribution channels in order to enhance the value of the food. Second, the marketing, manufacturing and distribution of the food product are major ethical issues. In this case, the manufacturing process adheres to various ethics such as cleanliness in the systems and use of appropriate raw materials (Fritz and Schiefer, 2009). In addition, the distribution channel should uphold the freshness of the food product in order to promot e health among the consumers. Thirdly, the environment is a sensitive ethical issue in the food

Monday, January 27, 2020

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an