Saturday, August 31, 2019

Biography of John Donne

Biography of John Donne John Donne was an English poet, satirist, lawyer and priest. He is considered the pre-eminent representative of the metaphysical poets. His works are noted for their strong, sensual style and include sonnets, love poetry, religious poems, Latin translations, epigrams, elegies, songs, satires and sermons. His poetry is noted for its vibrancy of language and inventiveness of metaphor, especially compared to that of his contemporaries. Donne's style is characterised by abrupt openings and various paradoxes, ironies and dislocations.These features, along with his frequent dramatic or everyday speech rhythms, his tense syntax and his tough eloquence, were both a reaction against the smoothness of conventional Elizabethan poetry and an adaptation into English of European baroque and mannerist techniques. His early career was marked by poetry that bore immense knowledge of British society and he met that knowledge with sharp criticism. Another important theme in Donn e’s poetry is the idea of true religion, something that he spent much time considering and theorising about.He wrote secular poems as well as erotic and love poems. He is particularly famous for his mastery of metaphysical conceits. Despite his great education and poetic talents, Donne lived in poverty for several years, relying heavily on wealthy friends. He spent much of the money he inherited during and after his education on womanising, literature, pastimes, and travel. In 1601, Donne secretly married Anne Moore, with whom he had twelve children. In 1615, he became an Anglican priest, although he did not want to take Anglican orders.He did so because King James I persistently ordered it. In 1621, he was appointed the Dean of St Paul's Cathedral in London. He also served as a member of parliament in 1601 and in 1614. Biography Early Life Donne was born in London, into a Roman Catholic family when practice of that religion was illegal in England. Donne was the third of six children. His father, also named John Donne, was of Welsh descent and a warden of the Ironmongers Company in the City of London. Donne's father was a respected Roman Catholic who avoided unwelcome government attention out of fear of persecution.Donne's father died in 1576, leaving his wife, Elizabeth Heywood, the responsibility of raising their children. Elizabeth was also from a recusant Roman Catholic family, the daughter of John Heywood, the playwright, and sister of the Reverend Jasper Heywood, a Jesuit priest and translator. She was a great-niece of the Roman Catholic martyr Thomas More. This tradition of martyrdom would continue among Donne’s closer relatives, many of whom were executed or exiled for religious reasons. Donne was educated privately; however, there is no evidence to support the popular claim that he was taught by Jesuits.Donne's mother married Dr. John Syminges, a wealthy widower with three children, a few months after Donne's father died. Two more of his sisters, Mary and Katherine, died in 1581. Donne's mother, who had lived in the Deanery after Donne became Dean of St. Paul's, survived him, dying in 1632. Donne was a student at Hart Hall, now Hertford College, Oxford, from the age of 11. After three years at Oxford he was admitted to the University of Cambridge, where he studied for another three years.He was unable to obtain a degree from either institution because of his Catholicism, since he could not take the Oath of Supremacy required of graduates. In 1591 he was accepted as a student at the Thavies Inn legal school, one of the Inns of Chancery in London. On 6 May 1592 he was admitted to Lincoln’s Inn, one of the Inns of Court. His brother Henry was also a university student prior to his arrest in 1593 for harbouring a Catholic priest, William Harrington, whom Henry betrayed under torture. Harrington was tortured on the rack, hanged until not quite dead, then was subjected to disembowelment.Henry Donne died in Newgate prison of bubonic plague, leading John Donne to begin questioning his Catholic faith. During and after his education, Donne spent much of his considerable inheritance on women, literature, pastimes and travel. Although there is no record detailing precisely where he travelled, it is known that he travelled across Europe and later fought with the Earl of Essex and Sir Walter Raleigh against the Spanish at Cadiz (1596) and the Azores (1597) and witnessed the loss of the Spanish flagship, the San Felipe. According to Izaak Walton, who wrote a biography of Donne in 1658: .. he returned not back into England till he had stayed some years, first in Italy, and then in Spain, where he made many useful observations of those countries, their laws and manner of government, and returned perfect in their languages. —Izaak Walton By the age of 25 he was well prepared for the diplomatic career he appeared to be seeking. He was appointed chief secretary to the Lord Keeper of the Great Seal, Sir Thomas Egerton, and was established at Egerton’s London home, York House, Strand close to the Palace of Whitehall, then the most influential social centre in England.Marriage to Anne More During the next four years, he fell in love with Egerton's niece Anne More. They were married just before Christmas in 1601, against the wishes of both Egerton and George More, who was Lieutenant of the Tower and Anne's father. This wedding ruined Donne's career and earned him a short stay in Fleet Prison, along with Samuel Brooke, who married them, and the man who acted as a witness to the wedding. Donne was released when the marriage was proven valid, and he soon secured the release of the other two.Walton tells us that when Donne wrote to his wife to tell her about losing his post, he wrote after his name: John Donne, Anne Donne, Un-done. It was not until 1609 that Donne was reconciled with his father-in-law and received his wife's dowry. After his release, Donne had to accept a reti red country life in Pyrford, Surrey. Over the next few years, he scraped a meagre living as a lawyer, depending on his wife’s cousin Sir Francis Wolly to house him, his wife, and their children. Because Anne Donne bore a new baby almost every year, this was a very generous gesture.Though he practised law and may have worked as an assistant pamphleteer to Thomas Morton, Donne was in a constant state of financial insecurity, with a growing family to provide for. Anne bore twelve children in sixteen years of marriage (including two stillbirths—their eighth and then, in 1617, their last child); indeed, she spent most of her married life either pregnant or nursing. The ten surviving children were Constance, John, George, Francis, Lucy (named after Donne's patroness Lucy, Countess of Bedford, her godmother), Bridget, Mary, Nicholas, Margaret, and Elizabeth.Francis, Nicholas, and Mary died before they were ten. In a state of despair, Donne noted that the death of a child woul d mean one less mouth to feed, but he could not afford the burial expenses. During this time, Donne wrote, but did not publish, Biathanatos, his defence of suicide. His wife died on 15 August 1617, five days after giving birth to their twelfth child, a still-born baby. Donne mourned her deeply, and wrote of his love and loss in his 17th Holy Sonnet. Career and Later Life Donne was elected as Member of Parliament for the constituency of Brackley in 1602, but this was not a paid position.The fashion for coterie poetry of the period gave him a means to seek patronage and many of his poems were written for wealthy friends or patrons, especially Sir Robert Drury, who came to be Donne's chief patron in 1610. Donne wrote the two Anniversaries, An Anatomy of the World (1611) and Of the Progress of the Soul, (1612), for Drury. In 1610 and 1611 he wrote two anti-Catholic polemics: Pseudo-Martyr and Ignatius his Conclave. Although James was pleased with Donne's work, he refused to reinstate hi m at court and instead urged him to take holy orders.At length, Donne acceded to the King's wishes and in 1615 was ordained into the Church of England. Donne was awarded an honorary doctorate in divinity from Cambridge in 1615 and became a Royal Chaplain in the same year, and was made a Reader of Divinity at Lincoln's Inn in 1616. In 1618 he became chaplain to Viscount Doncaster, who was on an embassy to the princes of Germany. Donne did not return to England until 1620. In 1621 Donne was made Dean of St Paul's, a leading (and well-paid) position in the Church of England and one he held until his death in 1631. During his period as Dean his daughter Lucy died, aged eighteen.In late November and early December 1623 he suffered a nearly fatal illness, thought to be either typhus or a combination of a cold followed by a period of fever. During his convalescence he wrote a series of meditations and prayers on health, pain, and sickness that were published as a book in 1624 under the tit le of Devotions upon Emergent Occasions. One of these meditations, Meditation XVII, later became well known for its phrase â€Å"for whom the bell tolls† and the statement that â€Å"no man is an island†. In 1624 he became vicar of St Dunstan-in-the-West, and 1625 a prolocutor to Charles I.He earned a reputation as an eloquent preacher and 160 of his sermons have survived, including the famous Death’s Duel sermon delivered at the Palace of Whitehall before King Charles I in February 1631. Death It is thought that his final illness was stomach cancer, although this has not been proven. He died on 31 March 1631 having written many poems, most only in manuscript. Donne was buried in old St Paul's Cathedral, where a memorial statue of him was erected (carved from a drawing of him in his shroud), with a Latin epigraph probably composed by himself.Donne's monument survived the 1666 fire, and is on display in the present building. Writings Early Poetry Donne's earliest poems showed a developed knowledge of English society coupled with sharp criticism of its problems. His satires dealt with common Elizabethan topics, such as corruption in the legal system, mediocre poets, and pompous courtiers. His images of sickness, vomit, manure, and plague reflected his strongly satiric view of a world populated by all the fools and knaves of England. His third satire, however, deals with the problem of true religion, a matter of great importance to Donne.He argued that it was better to examine carefully one's religious convictions than blindly to follow any established tradition, for none would be saved at the Final Judgment, by claiming â€Å"A Harry, or a Martin taught [them] this. † Donne's early career was also notable for his erotic poetry, especially his elegies, in which he employed unconventional metaphors, such as a flea biting two lovers being compared to sex. In Elegy XIX: To His Mistress Going to Bed, he poetically undressed his mistress an d compared the act of fondling to the exploration of America.In Elegy XVIII, he compared the gap between his lover's breasts to the Hellespont. Donne did not publish these poems, although did allow them to circulate widely in manuscript form. â€Å"†¦ any mans death diminishes me, because I am involved in Mankinde; And therefore never send to know for whom the bell tolls; It tolls for thee.. † — Donne, Meditation XVII Some have speculated that Donne's numerous illnesses, financial strain, and the deaths of his friends all contributed to the development of a more somber and pious tone in his later poems.The change can be clearly seen in â€Å"An Anatomy of the World† (1611), a poem that Donne wrote in memory of Elizabeth Drury, daughter of his patron, Sir Robert Drury of Hawstead, Suffolk. This poem treats Elizabeth's demise with extreme gloominess, using it as a symbol for the Fall of Man and the destruction of the universe. The poem â€Å"A Nocturnal upon S. Lucy's Day, Being the Shortest Day†, concerns the poet's despair at the death of a loved one. In it Donne expresses a feeling of utter negation and hopelessness, saying that â€Å"I am every dead thing†¦ re-begot / Of absence, darkness, death. This famous work was probably written in 1627 when both Donne's friend Lucy, Countess of Bedford, and his daughter Lucy Donne died. Three years later, in 1630, Donne wrote his will on Saint Lucy's day (13 December), the date the poem describes as â€Å"Both the year's, and the day's deep midnight. † The increasing gloominess of Donne's tone may also be observed in the religious works that he began writing during the same period. His early belief in the value of scepticism now gave way to a firm faith in the traditional teachings of the Bible. Having converted to the Anglican Church, Donne focused his literary career on religious literature.He quickly became noted for his sermons and religious poems. The lines of these se rmons would come to influence future works of English literature, such as Ernest Hemingway's For Whom the Bell Tolls, which took its title from a passage in Meditation XVII of Devotions upon Emergent Occasions, and Thomas Merton’s No Man is an Island, which took its title from the same source. Towards the end of his life Donne wrote works that challenged death, and the fear that it inspired in many men, on the grounds of his belief that those who die are sent to Heaven to live eternally.One example of this challenge is his Holy Sonnet X, Death Be Not Proud, from which come the famous lines â€Å"Death, be not proud, though some have called thee / Mighty and dreadful, for thou art not so. † Even as he lay dying during Lent in 1631, he rose from his sickbed and delivered the Death's Duel sermon, which was later described as his own funeral sermon. Death’s Duel portrays life as a steady descent to suffering and death, yet sees hope in salvation and immortality thro ugh an embrace of God, Christ and the Resurrection. StyleHis work has received much criticism over the years, especially concerning his metaphysical form. Donne is generally considered the most prominent member of the Metaphysical poets, a phrase coined in 1781 by the critic Dr Johnson, following a comment on Donne by the poet John Dryden. Dryden had written of Donne in 1693: â€Å"He affects the metaphysics, not only in his satires, but in his amorous verses, where nature only should reign; and perplexes the minds of the fair sex with nice speculations of philosophy, when he should engage their hearts, and entertain them with the softnesses of love. In Life of Cowley (from Samuel Johnson's 1781 work of biography and criticism Lives of the Most Eminent English Poets), Johnson refers to the beginning of the seventeenth century in which there â€Å"appeared a race of writers that may be termed the metaphysical poets†. Donne's immediate successors in poetry therefore tended to regard his works with ambivalence, with the Neoclassical poets regarding his conceits as abuse of the metaphor. However he was revived by Romantic poets such as Coleridge and Browning, though his more recent revival in the early twentieth century by poets such as T.S. Eliot and critics like F R Leavis tended to portray him, with approval, as an anti-Romantic. Donne's work suggests a healthy appetite for life and its pleasures, while also expressing deep emotion. He did this through the use of conceits, wit and intellect—as seen in the poems â€Å"The Sun Rising† and â€Å"Batter My Heart†. Donne is considered a master of the metaphysical conceit, an extended metaphor that combines two vastly different ideas into a single idea, often using imagery. An example of this is his equation of lovers with saints in â€Å"The Canonization†.Unlike the conceits found in other Elizabethan poetry, most notably Petrarchan conceits, which formed cliched comparisons betwe en more closely related objects (such as a rose and love), metaphysical conceits go to a greater depth in comparing two completely unlike objects. One of the most famous of Donne's conceits is found in â€Å"A Valediction: Forbidding Mourning† where he compares two lovers who are separated to the two legs of a compass. Donne's works are also witty, employing paradoxes, puns, and subtle yet remarkable analogies.His pieces are often ironic and cynical, especially regarding love and human motives. Common subjects of Donne's poems are love (especially in his early life), death (especially after his wife's death), and religion. John Donne's poetry represented a shift from classical forms to more personal poetry. Donne is noted for his poetic metre, which was structured with changing and jagged rhythms that closely resemble casual speech (it was for this that the more classical-minded Ben Jonson commented that â€Å"Donne, for not keeping of accent, deserved hanging†).Some s cholars believe that Donne's literary works reflect the changing trends of his life, with love poetry and satires from his youth and religious sermons during his later years. Other scholars, such as Helen Gardner, question the validity of this dating—most of his poems were published posthumously (1633). The exception to these is his Anniversaries which were published in 1612 and Devotions upon Emergent Occasions published in 1624. His sermons are also dated, sometimes specifically by date and year. LegacyDonne is commemorated as a priest in the calendar of the Church of England and in the Calendar of Saints of the Evangelical Lutheran Church in America on 31 March. Sylvia Plath, interviewed on BBC Radio in late 1962, said the following about a book review of her collection of poems titled The Colossus that had been published in the United Kingdom two years earlier: â€Å"I remember being appalled when someone criticised me for beginning just like John Donne but not quite man aging to finish like John Donne, and I felt the weight of English literature on me at that point. The memorial to Donne, modelled after the engraving pictured above, was one of the few such memorials to survive the Great Fire of London in 1666 and now appears in St Paul's Cathedral where Donne is buried. Donne in Literature In Margaret Edson's Pulitzer prize-winning play Wit (1999), the main character, a professor of 17th century poetry specialising in Donne, is dying of cancer. The play was adapted for the HBO film Wit starring Emma Thompson. Donne's Songs and Sonnets feature in The Calligrapher (2003), a novel by Edward Docx.In the 2006 novel The Meaning of Night by Michael Cox, Donne's works are frequently quoted. Donne appears, along with his wife Anne and daughter Pegge, in the award-winning novel Conceit (2007) by Mary Novik. Joseph Brodsky has a poem called â€Å"Elegy for John Donne†. The love story of Donne and Anne More is the subject of Maeve Haran's 2010 historica l novel The Lady and the Poet. An excerpt from â€Å"Meditation 17 Devotions Upon Emergent Occasions† serves as the opening for Ernest Hemingway's For Whom The Bell Tolls. Marilynne Robinson's Pulitzer prize-winning novel Gilead makes several references to Donne's work.Donne is the favourite poet of Dorothy Sayers' fictional detective Lord Peter Wimsey, and the Wimsey books include numerous quotations from, and allusions to, his work. Donne's poem ‘A Fever' (incorrectly called ‘The Fever') is mentioned in the penultimate paragraph of the novel â€Å"The Silence of the Lambs† by Thomas Harris. Edmund â€Å"Bunny† Corcoran writes a paper on Donne in Donna Tartt's novel The Secret History, in which he ties together Donne and Izaak Walton with help of an imaginary philosophy called â€Å"Metahemeralism†.Donne plays a significant role in Christie Dickason's The Noble Assassin (2011), a novel based on the life of Donne's patron and putative lover, L ucy Russell, Countess of Bedford. Donne in Popular Culture John Renbourn, on his 1966 debut album John Renbourn, sings a version of the poem, â€Å"Song: Go and Catch a Falling Star†. (He alters the last line to â€Å"False, ere I count one, two, three. â€Å") Tarwater, in their album Salon des Refuses, have put â€Å"The Relic† to song.The plot of Neil Gaiman's novel Stardust is based upon the poem â€Å"Song: Go and Catch a Falling Star,† with the fallen star turned into a major character. Bob Chilcott has arranged a choral piece to Donne's â€Å"Go and Catch a Falling Star†. Van Morrison pays tribute to the poet on â€Å"Rave On John Donne† and makes references in many other songs. Lost in Austen, the British mini series based on Jane Austen's Pride and Prejudice, has Bingley refer to Donne when he describes taking Jane to America, â€Å"John Donne, don't you know? ‘License my roving hands,' and so forth. † Las

Friday, August 30, 2019

Danger And Opportunity Essay

Albert Einstein said that unless we change our â€Å"modes of thinking† about political issues, we are headed toward â€Å"unparalleled catastrophe.† Do you agree or disagree with this statement?  I would have to say that such truer words have never been spoken before. If we as a global community continue to think in the same mindsets that we have in the past, then we will never be able to work together to accomplish goals such as eradication of diseases, homelessness, and other social problems. Not only will social problems continue to be rampant, but attitudes such as hatred and fear will continue to prevail, thus causing barriers to be raised and prevent joint cooperation and negotiations in order to solve social, economic, and political problems. According to Hauss, we as a global community, tend to view the political process in win-lose or zero-sum terms. It is because of this way of thinking that leads us to resort to violence as a way to solve disputes rather than talking them out in civil discourse. According to Einstein, we are drifting towards the unparalleled catastrophe of nuclear war. (Hauss, 2012) We continue to break ourselves down into groups normally based along nationality, religion, social status, and other categories instead of just being human. As we break ourselves up into these groupings, we tend to take upon ourselves a different identity instead of one common identity. With these different identities are different values and beliefs, which may not mesh with another group’s identity. This can and normally does lead to differences of opinions between groups, making it difficult, if not nearly impossible to find a common denominator. A good example would be the civil war that occurred after the death of then Yugoslavian president Marshal Josip Tito. Upon Tito’s death in May of 1980, Yugoslavia was thrown into chaos as the different ethnic groups wanted their share of the proverbial pie. This led to the civil war between the Serbian, Croatians, and the Bosnians which began with the Croatians and Slovenians declaring their independence in 1991, followed shortly by Macedonia. The civil war in the FRY (Former Republic of Yugoslavia) lasted until the Dayton Peace Accords were signed in November of 1995 by the leaders of Bosnia-Herzegovina, Croatia, and the Former Republic of Yugoslavia. It is  because of differences in the way groups think, that if left unchanged, will lead to what Einstein describes because of the barriers we put up, making the ability for all groups to work together as one cohesive unit extremely difficult. REFERENCES Hauss, Charles, (2012) Comparative Politics: Domestic Responses to Global Challenges: Eighth Edition.

Literary Criticism Paper

An archetype Is a reoccurring pattern of Images, symbols, or a situation. The hero archetype Is one who tries to fulfill a necessary task and tries to restore Justice to a society. The hero will commonly go through the hero's journey in search for truth and information on restoring Justice to a society. All archetypal heroes share certain characteristics. In 1984, by George Orwell, Winston follows the hero's cycle because there is nothing told of his childhood, he looses favor with the Party, and Winston is not burled after all.Throughout the book ‘We are told nothing of his holding† (Garry 1 1 ) besides the few memories or dreams he shares with Julia or himself. After waking up crying one morning, Winston shares a memory of his childhood Tijuana; he recalls the time him and his sister and mother spent most of their days in underground shelters, hiding from air raids. Many times, Winston and his family went without food. From starving one day, Winston stole chocolate from his mother and sister and ran away, never seeing them again.Winston constantly dreams about his mother and Is convinced he murdered her because he stole her chocolate and left her there to starve. However, his subconscious Is his only road to the truth. Although the reader is given small memories on his childhood â€Å"nothing remained of his childhood except a series of bright-lit tableaux occurring against no background and mostly unintelligible† (Orwell, 3). Implying, the reader is not really told anything of his childhood besides the subconscious memories and few unclear images In 1984, the God Is represented through Big Brother.This Is true because Big Brother Is perceived as the ruler of Oceania and he Is a very high figure to the people. Big Brother's face is constantly being broadcasted and he is even stamped on he coins. Thus, Winston â€Å"Later loses favor with the gods and/or his subjects† (11) by wanting to do many rebellious acts and hateful thoughts. Fo r example, Winston begins to have sex with Julia, which was only, â€Å"a blow struck against the Party† (126).Implying there was no true emotion towards Julia and Winston and Julia only had sex to rebel against the Party because having sex Is a major crime In Oceania. Also, Winston looses his support towards the Party shown when he wrote â€Å"Down with Big Brother† in his diary. Again, signifying his hatred towards the society and writes to mind people of the better times in Oceania and writes about what it used to be and what it can still become. Towards the end of the book Winston and Julia are surrounded by troops of the Thought Police.From there Winston is taken to the horrid Room 101 where he Is tortured. Room 101 holds the person's greatest fear and for Winston It Is rats. As the rats come closer to his face he yells, â€Å"Do It to Julia! Do It to Julia! Not me! Julia! I don't care what you do to her. Tear her face off strip her to the bones. Not me! Julia! N ot me! † (286). It is here Winston betrayals Julia and fully egging to believe and love Big Brother and the Party. Winston did not only betrayal Julia, but he also abandons himself.Winston follows the hero cycle because â€Å"His body is not buried, but nevertheless† (1 1 Meaning the Ministry of Love broke and tortured his mind and will and mentally killed him but Winston Is still physically living. Hang out with Julia. However, he is essentially a slave because he cannot express any of his own feelings of rebellion, including to himself in the privacy of his mind. Winston was a very mentally strong character who understood the corrupt world he ivies in while nobody else does.During the beginning of the book he does not find any pleasure in Big Brother and as the story progresses he starts to love Big Brother. His goal is to change society's means and gain the freedom of thought back. However, he is a bizarre hero because he is middle-aged, has an average intelligence, and is very weak. He is a hero, although, with different heroic characteristics. Finally he is a hero because, Winston childhood is a mystery, his support for the Party is lost, and he becomes a walking slave for the Party and Big Brother.

Thursday, August 29, 2019

What is a key fact from the chapter Essay Example | Topics and Well Written Essays - 250 words

What is a key fact from the chapter - Essay Example The Bill dictated that slavery would not be allowed on new territories acquired from Mexico but could only be allowed in territories that already supported slavery. The Southerners took a hard line and refused to compromise despite the fact that the Northerners had already compromised (150-151). President Taylor’s plan to admit New Mexico and California immediately into the Union after discovery of Gold Mines in the region were futile because each side, the North and the South, were suspicious of each other (152). Lewis Cass’s support for â€Å"popular sovereignty† lost him popularity with the Democrats and he subsequently lost the elections (152). An attempt to bring both sides to compromise and arrive at an agreement proved futile when the Omnibus Bill failed as a package but passed when the provisions were presented separately (154). Any leader who supported either side exclusively lost elections as is evident in William H. Seward’s bid in 1858 (165). D uring the war the prejudices and malice in the Union States were evident after President Lincoln was accused of war crimes and his wife accused of being a spy (169). Eventually, the Northern States won and one would have expected the North to engage in revenge. However, the situation was rescued by the nationalism and prudence of President Lincoln for he preached unity instead of revenge (177). Although, the Union States won the war it is evident that both sides had arguments that were not completely objective with sections filled with malice, prejudice and hatred. These vices are the ones that threatened to divide the country were it not for President’s Lincoln’s sincere sentiments of American unity. In essence, the key fact is that the war could have been avoided if both sides had employed practicality and agreed to

Wednesday, August 28, 2019

Hamlet Essay Example | Topics and Well Written Essays - 500 words - 11

Hamlet - Essay Example For Hamlet his controlling power is his words, they are not only his way of to express himself but also his weapon, in many situations he has come across as the king of wordplaying. However because of his contradicting nature his word might also lead to arresting him. Since he is an observer, his analysis may lead to exhaustion resulting in being indecisive. His words at point also lead him to not being able to take revenge for his father’s death. At some point Hamlet’s character portrayed madness too, he was in love with Ophelia but he would also end up abusing her verbally. It would almost seem like Hamlet is under the influence of a mask, so he can actually decide and pick the kind of character he would want to play. The most prominent quality in the nature of Fortinbras was his ability to prove his words through his actions. Even if some matters would not require him to react he would take an action without having to think twice about the consequences.Often in the play Fortinbras took decisions based on his emotions and did not think about what his action may cause. As compared to all the other main characters in the play Fortinbras barely speaks. Fortinbras has a strong emotional bonding with his family which is something thats differs him and Hamlet. It is this affection of his that leads Fortinbras to not welcome war. He could be easily manipulated by displaying respect and loyalty for his family. Fortinbras for sure is a soldier but he never believes in slaughtering and murdering people brutally. He is probably the only character who took the initiative to help repair the damaged. His action and his ability to speak his mind leads him to become a framing character. Calling Laertes hot-headed won’t be something wrong, his father’s death has caused him to feel so much anger and many people thought that his anger is his biggest strength. He has a very charismatic personality enough to appeal anyone, he is also

Tuesday, August 27, 2019

Do managers take decisions for the good of the organisation or do they Essay

Do managers take decisions for the good of the organisation or do they behave the way they do for other reasons - Essay Example In the process of evolution, it is highly likely that the business developed from a one man enterprise or family business to a partnership, then to a public limited or private limited company. Ultimately it branched out from a local to regional and regional to international undertaking. It is highly probable, even inevitable, that the evolution and change in outside form also bring about changes in the internal handling of business decisions and operational practices. This becomes necessary as the tasks of managing the different aspects of the business become too complex and heavy for one man or a number of partners to manage alone. Ultimately as the business expands, it has to reinvent itself as a model of modern business enterprise. This will invariably involve the assignment or scheduling of tasks to professionally hired managers, with expertise in production techniques, Human Resources, marketing and sales, finance and accounting etc. Each departmental head becomes a prized resou rce, responsible for meeting his departments and workers goals and assignments. Authority and responsibility become interlinked, but seldom has it been seen that the upper management is taken to task for targets not achieved or a failed project. Rather, more often than not it is the middle and lower management and supervisors/ workers that are made to bear the brunt of the axe and the shame associated with it. This state of affairs often makes one stop and think- do managers take decisions for the good of the organization or do they behave the way they do for other reasons? This paper will argue that the interests of the organization are not always uppermost in the minds of the managers, rather, as they gain and wield power- managers tend to collude with each other for their own collective benefit, while in many cases insisting that failure was because of the ineptitude of people on the lower rungs of the ladder. I would rather state that managers keep their own interests uppermost in their mind at every turn. They are interested in their own survival, going as close to the top as they can, and toppling others who they consider as competition. The lower management or their subordinates are just pawns in the game (Rosen, 1988). The Evolution of the Modern Business Enterprise If we look at the evolution of a modern business, we see that it is quite likely to have its beginnings as a sole proprietorship or family business, in which every family member has a share of responsibilities. Or it could have started as a partnership, where two or more partners pooled together their skills, resources and business acumen to offer products and services to the general populace or those that needed their wares. The disadvantage here was that of unlimited liability, or cases where even their personal property could be attached to repay debts if the business failed. In time this led to the evolution of the corporate form of business ownership. As the Industrial Revolution swept through Europe and the Americas, investment was needed from both public and private sources to raise capital for infrastructure and the laying of railroads, transport and communication, factories and warehouses. The beginning of assembly line production at the Ford Motor Company meant that things could now be mass produced after breaking down the process into a series of steps. Then F.W.

Monday, August 26, 2019

Analysis the article by using what you have learned from lectures

Analysis the by using what you have learned from lectures - Article Example Formal power, however, is unlikely to spur such satisfaction as workers feel that they are only being maintained in the workplace because of their contributions. Formal power also does not encourage a corporate culture that is in support of team work and interdependence among workers. When formal power is in use, employees are much more likely to seek different ways of improving their personal skills and seeking to be more capable than their co-workers in order to be noticed. Interdependence in an organizational workforce can be attained through the distribution of resources and skills, and advanced technology that rearranges work functions as is common in assembly lines. Interdependence is also spurred by having similar goals and the rewarding of various teams or groups instead of singular individuals. This will in turn inspire group effectiveness in various functions of an organization. It will also spur the workers to develop a workplace commitment that will inspire the improvement of overall organizational behavior. Organizational behavior is descriptive of the way that workers behave in any given organization. To realize organizational goals like the creation of a corporate culture that inspires constructive organizational behavior, the management has to ensure that individual responsibilities of every worker are managed well and coordinated. Structure is an important tool in this regard as it deals with identifying formal communication channels, and illustrates how different activities conducted by different employees are connected. In the makeup of an organization, any structure that is not well managed is likely to be confronted with discrepancies. Generally, organizations have to compete aggressively in the present global competitive environment to merit organizational commitment from their workers. Even though it has been supposed that there are personal differences among an organization’s workers

Sunday, August 25, 2019

Investigator Scenario Case Study Example | Topics and Well Written Essays - 250 words

Investigator Scenario - Case Study Example The two scenes pose a great risk to me as an investigator. Firstly, the culprits might have been armed robbers who may still be in the neighborhood during our investigations. Despite this risk, I will conduct my investigations professionally by applying forensic investigation technique of tire track (Joe and John 122). This process involves matching the tire patterns of the impounded vehicle’s tire with those at the first crime scene. The two tire patterns will be similar if and only if the impounded car was used by the suspects. However, the impounded vehicle can only be subjected to a search if forensic investigations link it with the first crime. The vehicle can also be subjected to a search if its owner’s information match with those of the individual captured in the surveillance camera. The main suspect to this case would be the last users of the impounded car. The person captured in the surveillance camera also has a case to answer in connection to the robbery. Information contained in databases of vehicle registration authority and person’s registration authority would enable the police to arrest the

Saturday, August 24, 2019

The Impact of E-Commerce Technology on the Air Travel Industry Essay

The Impact of E-Commerce Technology on the Air Travel Industry - Essay Example If I were the primary decision maker in these airline companies, I would come up with brilliant ideas to ensure that my airline company adopts a measure aimed at making it to enjoy a competitive advantage over its competitors. Having realized the inefficiencies of travel agents, I would ensure that I introduce the use of modern Information Communication Technology (ICT) in my company. This is a new innovation that would help us to realize a tremendous growth in our services. When all the activities are done in compliance with the new system, it would be much easier for the company to expand its client base and be able to reach a large number of potential clients than it could otherwise manage. In other words, I would advocate for the full adoption of SABRE system. This is an advanced technology that would be of much help to my organization. Once every activity is computerized, it becomes much easier for the airline to improve the quality of its services. At the same time, it would avail information to our clients wherever they are. Thus, it becomes much easier for them to plan their trips and make online reservations whenever they feel to do so. Automating our services would definitely put us in the right path of enjoying a competitive advantage over our rivals. Rather than advocating for the adoption of ICT, I would emphasize the role of novelty. Meaning, any changes to be effected would have to be novel and beneficial to the organization. They should be highly advanced to seal any loophole that might be experienced. If this happens, we would definitely be in the right path of out doing all our competitors before emerging as the best alternative airline in the market. In my opinion, the automation of airline services is commendable. It is a worthwhile initiative aimed at improving the quality of service delivery by the airline company. SABRE technology is one of its own kind. Meaning, it had to be

Friday, August 23, 2019

Village Hotels Essay Example | Topics and Well Written Essays - 250 words

Village Hotels - Essay Example Since it has beaches everyone likes to visit these hotels. Â  The new married couples or the one who wants to enjoy their relationship frequents these village hotels. They are a source of primary income for the village hotels. They provide all facilities and offers discounts that make the hotel fares reasonable. Hawaiian hotels are very famous for couples. They provide everything from good food to excellent service and guide the tourists regarding historical places. Â  Village hotels provide special facilities for businessmen. They provide them conference halls, auditorium, dining halls, etc. Wedding and grand parties are one of the important sources of income. Hotels provide all the facilities needed. The fares depend on the number of people coming to the party or space available in the hotel. Â  Village hotels have to make special arrangements in summer and on Christmas. During summer most of the people want to spend time with their families. Since summer vacations would be declared children would love to visit new places. The resorts offer special discounts for them. Places like Thailand, Goa, Hawaii, etc., are the most preferred village hotels. Â  Everyone has their own taste and prefers them very much.

Thursday, August 22, 2019

Finale Paper Outline Assignment Example | Topics and Well Written Essays - 500 words

Finale Paper Outline - Assignment Example Complication is another principle of interpersonal communication. In this principle, it should be understand that communication involves a number of variables, making even simple request very complex. Lastly, interpersonal communication is contextual and therefore, can never be done in isolation. In every communication, there are aspects such as psychological, cultural, rational, situational, and environmental factors involved, determining the context in which an individual could speak (Goman, 2014). Other than the principles, there are various barriers to effective interpersonal interaction. These include physical barriers, emotional, and cultural and language barriers. Dependent on the situation involved each of the above aspects limit effective interpersonal interaction. For new couples, it is important that you limit the occurrence of such aspects in order to enhance and sustain the relationship (Sullivan, 2010). Despite avoiding the barriers to effective interaction, it is evident that conflicts still arise. In such instances, it is important that you avoid the win-loss situations. None should be a winner or a loser (Luquet, 2007), but instead any decision reached should be for the benefit of both parties. Another means of resolving conflicts in a relationship and most especially for the newly married, is to avoid conflict causing situations. Conflict causing conflicts are usually instances in which there is lack of appropriate communication channels between a wife and a husband (Sethi and Manisha, 2009). The most appropriate means of resolving such conflicts include appreciating the differences that exist between the individuals. Words indeed have power, and therefore, it is important to choose the words used very wisely. Words can never change reality; however, they can change the perception to reality. Words form a link between liking an individual and disliking the

Music and Racial Formation in Leroi Jones’ Essay Example for Free

Music and Racial Formation in Leroi Jones’ Essay In many ways, music is inseparable from culture. In the context of those cultures that have been dominated and marginalized by others, music takes on a special significance. Leroi Jones’ Blues People fit into the framework of trying to understand the role that music plays in the cultural lives of people who belong to displaced communities. In his book, he identifies the ways in which genres in music culture develop, which may be linked to Omi and Winant’s (1994) conception of racial formation. As Omi and Winant (1994) observed in their seminal theory on racial formation, â€Å"We define racial formation as the sociohistorical process by which racial categories are created, inhabited, transformed, and destroyed† (p. 55). The authors debunk the accepted notions that race is either biological or an illusion, suggesting instead that it is a distinctly sociological phenomenon. Race is also identified as based on a power hierarchy, definable in terms of â€Å"the pattern of conflict and accommodation which takes place over time between racially based social movements and the policies and programs of the state† (p.78). This model of racial formation may be applied to Jones’ text, particularly in terms of their assertion that â€Å"racial formation is a process of historically situated projects in which human bodies and social structures are represented and organized† (pp. 55-56). In Blues People, the author examines how the process of being enslaved affects the people of Africa, situating the racial conflict in terms of geographical as well as historical contexts. Jones’ thesis rests on the concept of difference. He outlines the manner in which the slavery of Africans in America was different from other kinds of slavery. An important point that Jones raises is that slavery was prevalent in Africa as well, long before the whites arrived. He likens the process to the way in which the Greeks treated their slaves, showing us that in every other system of slavery, the enslaved people were allowed to retain their sense of cultural identity, but not so in the case of African slaves on the American plantations: Melville Herskovits points out, â€Å"Slavery [had] long existed in the entire region [of West Africa], and in at least one of its kingdoms, Dahomey, a kind of plantation system was found under which an absentee ownership, with the ruler as principal, demanded the utmost return from the estates, and thus created conditions of labor resembling the regime the slaves were to encounter in the New World. † But to be brought to a country, a culture, a society, that was, and is, in terms of purely philosophical correlatives, the complete antithesis of ones own version of mans life on earth that is the cruelest aspect of this particular enslavement. (p. 1) As Jones points out, it was extremely difficult for Africans, who later became â€Å"African-Americans,† to retain a sense of cultural identity in a foreign culture that refused to give any validity to something it did not understand. According to Omi and Winant, racial formation may also be linked to the â€Å"the evolution of hegemony, the way in which society is organized and ruled† (p. 56). In such a hegemonic society driven by concepts of hierarchy and social superiority, the identity of a marginalized class may become problematic. Jones opines that music such as jazz and blues was in some ways the only medium through which Africans could try and retain a sense of who they were. In this context, the integration of music into their existence as slaves allowed Africans to retain a sense of the past, and also come to terms with the effect that the process of being enslaved had had on their psyches. Cultural domination was an insidious process of identity-negation, and music culture was one of the prominent ways through which the enslaved people could enable themselves to survive within a hostile foreign culture. In Blues People, an interesting aspect of performance is brought in when the author shows us a ‘typical’ American reaction to the African native in the form of an excerpt from the actress Frances Anne Kemble’s Journal of a Residence on a Georgia Plantation: The only exception that I have met with yet among our boat voices to the high tenor which they seem all to possess is in the person of an individual named Isaac, a basso profundo of the deepest dye, who nevertheless never attempts to produce with his different register any different effects in the chorus by venturing a second, but sings like the rest in unison, perfect unison, of both time and tune. By-the-by, this individual does speak, and therefore I presume he is not an ape, orangoutang, chimpanzee, or gorilla; but I could not, I confess, have conceived it possible that the presence of articulate sounds, and the absense of an articulate tail, should make, externally at least, so completely the only appreciable difference between a man and a monkey, as they appear to do in this individual ‘black brother. ’ (pp. 2-3). The actress’ biased and judgmental perception of the natives places them in such a position as not to be considered human at all. Interestingly, she examines their tones of voices as indicative of the degree to which they are ‘human,’ or not; they all have voices of a high tenor. She says this is the manner that one might say that all dogs bark, or all lions roar. Language is almost completely redundant in this context. Unable to understand the languages of Africa, Kemble contents herself with ruminating on the tones in which the foreigners speak. The ‘exception’ to the other slaves is determined by Kemble on the basis of the fact that he has a bass voice, while the others use higher tones of voice. Even in this exception she says that it is only the absence of a tail that reluctantly, albeit wonderingly, forces her to accept that he is a human being and not an animal. Even under this extreme racial perspective, it is the musical tones of voice that the actress and performer relies upon to make her judgments.

Wednesday, August 21, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an