Wednesday, July 31, 2019

Attachment, Loss and Bereavement

This essay describes and evaluates the contributions of Bowlby, Ainsworth, Murray-Parkes, Kubler-Ross and Worden, as well as later theorists, to their respective fields. I demonstrate how I already work with some of these models, highlighting my strengths and areas for development. I emphasise some influences on Bowlby’s work, leading to his trilogy Attachment 1969; Separation 1973; and Loss, Sadness and Depression 1980; demonstrating how attachments in infancy may shape our attachment styles in later life.Pietromonaco and Barrett posit â€Å"A central tenet of attachment theory is that people develop mental representations, or internal working models that consist of expectations about the self, significant others and the relationship between the two. † (Pietromonaco and Barrett, 2000, 4:2, p156). I illustrate how this internal working model is developed via the relationship between infant and primary caregiver, demonstrating that maternal deprivation can create a †˜faulty’ internal working model, which may lead to psychopathology in later life.I also demonstrate how these internal working models influence our reactions to loss and bereavement in adulthood and their potential impact on the counselling relationship. In addition, I explore the multi-layered losses experienced by HIV+ gay men and finally draw some conclusions. Freud’s view on the infant’s attachment to its mother was quite simple â€Å"the reason why the infant in arms wants to perceive the presence of its mother is only because it already knows by experience that she satisfies all its needs without delay.† (Freud, 1924, p188 cited in Eysenck, 2005, p103).In contrast, behaviourists believed that feeding played a central role in the development of attachment. (Pendry, 1998; Eysenck, 2005). These theories were termed ‘secondary-drive theories’. In 1980, Bowlby recalled â€Å"this [secondary drive] theory did not seem to me to fit the facts †¦. but, if the secondary dependency was inadequate, what was the alternative? † (Bowlby,1980, p650 cited in Cassidy and Shaver, 1999, p3).Bowlby’s theory was influenced by his paper â€Å"Forty Four Juvenile Thieves†, where he concluded a correlation exists between maternal deprivation in infancy, leading to affectionless psychopathology and subsequent criminal behaviour in adolescents. (Bowlby, 1944, 25, p19-52). This led to him researching the impact of loss on children displaced through war and institutionalisation, resulting in ‘Maternal Care and Mental Health’ (1952), where he confirms a link between ‘environmental trauma’ and resultant disturbances in child development.As a result of this research, Bowlby concluded â€Å"it is psychological deprivation rather than the economic, nutritional or medical deprivation that is the cause of troubled children. † (Bowlby in Coates, 2004, 52, p577). He was further influenced by L orenz who found that goslings would follow and ‘attach’ themselves to the first moving object they saw. This following of the first moving object was called ‘imprinting’. (Lorenz, 1937 cited in Kaplan, 1998, p124).Clearly babies cannot follow at will – to compensate for this, †Bowlby noted that ‘imprinting’ manifested itself as a spectacularly more complex phenomenon in primates, including man, which he later labelled ‘attachment’. † (Hoover, 2004, 11:1, p58-60). He also embraced the work of Harlow and Zimmerman who worked with infant rhesus monkeys demonstrating that not only did the need for attachment give them security, but that this need took priority over their need for food. (Harlow and Zimmerman 1959 cited in Green and Scholes, 2003, p9).Dissatisfied with traditional theories, Bowlby embraced new understandings through discussion with colleagues from such fields as developmental psychology, ethology, cont rol systems theory and cognitive science, leading him to formulate his theory that the mechanisms underlying the infant’s tie to the mother originally emerged as a result of evolutionary and biological pressures. (Cassidy and Shaver, 1999; Green and Scholes, 2003).Defining his attachment theory as â€Å"a way of conceptualising the propensity of human beings to make strong affectional bonds to particular others.† (Bowlby, 1979 cited in Green and Scholes, 2003, p7), he posited â€Å"that it is our affectional bonds to attachment figures that engage us in our most intense emotions. † and that â€Å"this occurs during their formation (we call that ‘falling in love), in their maintenance (which we describe as ‘loving) and in their loss (which we know as ‘grieving’), (Green and Scholes, 2003, p8), thereby replacing the secondary-drive theory with a model emphasising the role relationships play in attachment and loss. (Waters, Crowell, Elliot t et all, 2002, 4, p230-242).Disregarding what he called Freud's ‘cupboard love’ theory of attachment, he believed instead that a child is born ‘biologically pre-disposed’ to become attached to its mother, claiming this bond has two essential features: the biological function of securing protection for survival and the physiological and psychological need for security. (Green and Scholes, 2003; Schaffer, 2004). Sonkin (2005) describes four features to this bond: secure base, separation protest, safe haven and proximity maintenance.The concept of a secure base is fundamental to attachment theory and is used to describe a dependable attachment to a primary caregiver. This secure base is established by providing consistent levels of safety, responsiveness and emotional comfort from within which the infant can explore his or her external and internal worlds and to which they can return, thus providing a sense of security. Separation protest is exhibited as a si gn of the distress experienced upon separation from an attachment figure, who may also be used as a safe haven to turn to for comfort in times of distress.When safety is threatened, infants attract the attention of their primary caregiver through crying or screaming. Maintaining attention and interest, e. g. vocalising and smiling, and seeking or maintaining proximity, e. g. following or clinging, all serve to promote the safety provided by the secure base (providing of course that parents respond appropriately). (Holmes, 1993; Cassidy and Shaver 1999; Becket, 2002; Green and Scholes, 2003).Proximity seeking is a two way process, for example child seeking parent or parent seeking child. (Weiss in Murray-Parkes, Stevenson-Hinde and Marris, 1991; Becket, 2004; Sonkin, 2007). Bowlby also recognised ‘unwilling’ separation caused by parents who were phsycially present but not able to respond, or who deprived infants of love or ill-treated them, left them with a sense of imme nse deprivation and that this unwilling separation and resultant loss leads to deep emotional distress. (Green and Scholes, 2003).At a recent conference, the Centre for Attachment based Psychoanalytical Psychotherapy (CAPP) asserts â€Å"Early interactions with significant others in which there are fundamental failures of empathy, attunement, recognition and regulation of emotional states, have been shown to cause the global breakdown of any coherent attachment strategy, thus engendering fears of disintegration and threatening psychic survival. In the face of such experiences, powerful dissociative defences may be employed, encapsulating overwhelming feelings of fear, rage and shame. † (CAPP, 2007).Together with Robertson and Rosenbluth, Bowlby demonstrated that even brief separation from the mother has profound emotional effects on the infant. Their research highlighted a three stage behavioural response to this separation: protest – related to separation anxiety; des pair – related to grief and mourning; and detachment – related to defences. (Robertson, Rosenbluth, Bowlby, 1952 in Murray-Parkes, Stevenson-Hinde and Marris, 1991). Ainsworth, Blehar, Waters and Wall (1978) later established the inter-relatedness between attachment behaviour, maternal sensitivity and exploration in the child.Under clinical settings, they sought to observe the effects of temporary separation from the mother, which was assessed via the ‘strange situation’ procedure. This study involved children between the ages of 12 to 18 months who experienced separation from their mother, introduction to an unfamiliar adult and finally reunion with their mother. Ainsworth et al reasoned that if attachment was strong, mother would be used as a secure base from which the infant could explore, thereby promoting self-reliance and autonomy. Upon separation, infants usually demonstrated separation anxiety.Upon re-union, the mother’s maternal sensitivity and the child’s responses were observed, thus providing a link between Bowlby’s theory and its application to individual experience. The trust/mistrust in the infant’s ability to explore their world from the secure base is re-inforced by Erikson’s (1965) examination of early development and the child’s experiencing of the world as a place that is nurturing, reliable and trustworthy (or not). Influenced by Ainsworth’s previous work in Uganda, the ‘strange situation’ led to the classification of secure or insecure attachment styles in infants.Insecure styles were further grouped into insecure/avoidant and insecure/resistant (ambivalent). (Pendry, 1998; Holmes, 2001; Eysenck, 2005). Main and Solomon later added a fourth attachment style – insecure/disorganised. (Main and Solomon, 1986 in Cassidy and Shaver, 1999, p290). Throughout all of these interactions, an ‘internal working model’ is developed, the cultivat ion of which relies on the dyadic patterns of relating between primary caregiver and infant (Bretherton, 1992, 28, p759-775), comprising the complex monitoring of internal states of primary caregiver and infant.  (Waters, Crowell, Elliott et al, 2002, 4, p230-242).According to Schore â€Å"These formative experiences are embedded in the developing attachment relationship – nature and nurture first come together in mother-infant psychobiological interactions. † (Schore, 2001, 17, p26). Over time, this leads to the infant’s ability to self-monitor their emotions (affect regulation), but until such time, Bowlby posited the mother acts as the child’s ego and super-ego †She orients him in space and time, provides his environment, permits the satisfaction of some impulses, restricts others.She is his ego and his super-ego. † (Bowlby, 1951, p53 cited in Bretherton, 1992, 28, p765). Bowlby concluded a healthy internal working model is â€Å"a worki ng model of an attachment figure who is conceived as accessible, trustworthy and ready to help when called upon†, whilst a ‘faulty’ model is â€Å"a working model of an attachment figure to whom are attributed such characteristics as uncertain accessibility, unwilllingness to respond helpfully, or perhaps the likelihood of responding hostilely. † (Bowlby, 1979, p141).Ainsworth suggests that positive attachment is more than explicit behaviour â€Å"it is built into the nervous system, in the course and as a result of the infant’s experience of his transactions with the mother. † (Ainsworth, 1967, p429), thus supporting Bowlby’s theory. Later descriptions of attachment styles describe secure attachment as â€Å"the development of the basic machinery to self-regulate affects later in life†, (Fonagy, Gergely and Jurist, 2002 cited in Sarkar and Adshead, 2006, 12, p297), whilst insecure attachment â€Å"prevents the development of a proper affect regulatory capacity.† (Sarkar and Adshead, 2006, 12, p297).This is supported by Schore (2003) who alludes to developmental affective neuroscience to set out a framework for affect regulation and dysregulation. Based on research into the development of the infant brain, he reviews neuro-scientific evidence to confirm the infant’s relationship with the primary caregiver has a direct effect on the development of brain structures and pathways involved in both affect regulation and dysregulation.The research and evidence suggests the internal working model begins as soon as the child is born and is the model upon which future relationships are formed. The quality of the primary caregiver’s response to infant distress provides the foundation upon which behavioural and cognitive strategies are developed, which in the longer term influence thoughts, feelings and behaviours in adult relationships. (Cardwell, Wadeley and Murphy, 2000; Pietromonaco and Barrett , 2000, 4:2, p155; Madigan, Moran and Pederson, 2006, 42:2, p293).A healthy, secure attachment to the primary caregiver would therefore appear essential for a child’s social, emotional and intellectual development, whilst interruption to this attachment would appear to promote the premise of psychopathology in later life. Whilst some evidence exists to demonstrate internal working models can be modified by different environmental experiences, (Riggs, Vosvick and Stallings, 2007, 12:6, p922-936), the extent to which they can change remains in question.Bowlby himself postulated â€Å"clinical evidence suggests that the necessary revisions of the model are not always easy to achieve. Usually they are completed but only slowly, often they are done imperfectly, and sometimes done not at all. † (Bowlby, 1969, p83). Whilst change may be possible, the unconscious aspects of internal working models are deemed to be specifically resistant to such change. (Prior and Glaser, 2006) . We can safely assume therefore, that in the majority of cases, internal working models tend to persist for life.I concur with Rutter’s criticism of Bowlby's concept of ‘monotropy’, i.e. Bowlby’s belief that babies develop one primary attachment, usually the mother, (Rutter, 1981 cited in Lucas, 2007, 13, p156 and in Eysenck 2005), accepting instead that infants form multiple attachments. This is supported by a study by Shaffer and Emmerson (1964) who concluded infants form a ‘hierarchy’ of attachments, often with the mother as the primary attachment figure, although nearly a third of children observed highlighted the father as the primary attachment figure. (Schaffer and Emmerson, 1964 in Cassidy and Shaver, 1999, p44-67).Collins, Dunlop and Chrysler criticise Bowlby’s ‘lens’ in that it was â€Å"limited by his own cultural, historical and class position. Bowlby’s culturally biased assumptions and empiricist metho ds of inquiry concentrated on individualised detachment and loss as part of the normal course of mourning loss, which perpetuated the Western tradition of preserving the autonomous individual self as the normal goal of development. † (Collins, Dunlop and Chrysler, 2002, p98), leading them to conclude Bowlby’s assumptions ignored other cultural practices (as did Ainsworths), with which I agree.They also suggest Bowlby’s concept of maternal deprivation was perhaps exploited to get women to return to the home post World War II – â€Å"Characterised as a choice, this ‘homeward bound’ movement was supported by the various governments, whose maternalist and pronatalist ideology of the 1930s continued into the post-war period to provide a rationale for sending women home to reproduce †¦ maternalism and the maternal deprivation hypothesis provided one conceptual framework for pronatal ideology as it intersected  with the demands of governments and industrialists. † (Collins, Dunlap and Chrysler, 2002, p102).We must also remember that Bowlby’s observations â€Å"were based on children who had been separated from their primary caregivers during the Second World War† (Lemma, 2003 cited in Lucas, 2007, 13, p156), and that these procedures â€Å"were based on behaviours that occurred during stressful situations rather than under normal circumstances. † (Lucas, 2007, 13, p156) [this latter criticism also applies to Ainsworth’s work].Nonetheless, in highlighting the damaging effects of institutionalised care on young children, Bowlby’s strengths lie in drawing attention to the role attachment, attachment behaviour and attachment behavioural systems play in a child’s development and the subsequent potential consequences of disruption to the bond between infant and primary caregiver. I concur with Cassidy and Shaver’s (1999) criticisms of the strange situation in that there a re too many unconsidered variables for a firm theory to be established at the time of Ainsworth’s writings, accepting their view that she did not consider the mood nor temperament of the child.Nonetheless, Ainsworth et al have provided a tool with which to measure attachment styles in infants, which is still in use today. Later research by George, Kaplan and Main assesses adult internal models through the use of the Adult Attachment Interview. This classification of adult attachment styles promotes the idea of models extending into adulthood as a template for future relationships. (George, Kaplan and Main 1985 cited in Pendry, 1998).Hazan and Shaver continued this line of research identifying patterns of attachment behavior in adult romantic relationships, concluding the same four attachment styles identified in infancy remain true for adult relationships. (Hazan and Shaver 1987 in Cassidy and Shaver, 1999, p355-377). Although theoretically rooted in the same innate system, a dult romantic attachment styles differ from parent-child bonds to include reciprocity of attachment and caregiving, as well as sexual mating.  (Hazan and Zeifman, 1999 in Cassidy and Shaver, 1999, p336-354).The literature on bereavement has become inseparable from Bowlby’s theory of attachment and, following from this, the way in which people react to the loss of this attachment. On reflecting on losses in adult life, Weinstein (2008) observes Bowlby’s persistence of formative attachments and how the pattern of protest, despair and detachment that follows a baby’s separation from its primary caregiver is re-activated and presented in full force in adult loss.Weinstein writes â€Å"The ability of the adult to cope with attachment in intimate relationships to negotiate independence, dependency and inter-dependency; and to manage loss is all about how successfully they coped with separation as an infant. As a baby they had to retain their sense of their mother e ven in her absence and now as adults, as part of the mourning process, they strengthen their own identity with the support of the internalised object. † (Weinstein, 2008, p34).According to Murray-Parkes (1996), the intensity and duration of this grief is relative to what is lost and the grief process is an emotional response to this loss. Murray-Parkes joined Bowlby at the Tavistock Centre in 1962. Together they presented a paper linking the protests of separation highlighted by Robertson, Rosenbluth and Bowlby (1952) in young children separated from their mothers, to grief in adults. (Bowlby and Murray-Parkes, 1970 in Murray-Parkes, Stevenson-Hinde and Marris, 1991, p20).Around the same time, Murray-Parkes visited Kubler-Ross who was conducting her own research into death and dying. This work was later published in ‘On Death and Dying’ (1969) which examines the process of coming to terms with terminal illness or grief in five stages: denial; anger; bargaining; de pression and acceptance. Murray-Parkes later produced a four-phase grief model consisting: shock or numbness; yearning and pining; disorganisation and despair; and re-organisation.In contrast to the passive staged/phased approaches by Kubler-Ross and Murray-Parkes, and perhaps more in line with Freud’s concept of having ‘to do grief work’, Worden developed a four-staged, task-based grief model: â€Å"to accept the reality of the loss; to work through the pain of grief; to adjust to an environment in which the deceased is missing; and to emotionally relocate the deceased and move on with life. † (Worden, 2003). All three models are deemed to be therapeutically useful in that they recognise grief as a process and provide a framework of descriptors for ‘normalising’ grief reactions.That said, they are clearly prescriptive and caution should be exercised in taking any of these prescriptive stages, phases or tasks literally. It is equally important to recognise the uniqueness of individual responses to loss and to avoid prescribing where a client ‘ought’ to be in their grieving process. Since these models were never designed as a linear process, it is likewise important not to steer clients through these stages. This is supported by Schuchter and Zisook (1993), who assert â€Å"Grief is not a linear process with concrete boundaries but, rather, a composite of overlapping, fluid phases that vary from person to person.† (Schuchter and Zisook, 1993 in Stroebe, Stroebe and Hansson, 1993, p23).I agree with Servaty-Seib’s observations â€Å"the stage/phase approaches emerged solely from a death-loss focus †¦ Worden’s work was an important development in the understanding of the process of coping adaptively with bereavement as each task is clearly defined in an action-oriented manner. † (Servaty-Seib, 2004, 26:2, p125). Stroebe and Schut’s dual process model brings together death- loss focus and task-based models. (Stroebe and Schut, 2001 cited in Servaty-Seib, 2004, 26:2, p125).In my work at Positive East, I work with HIV+ gay men experiencing multi-layered loss. My philosophy is to build and maintain a therapeutic relationship within a safe, confidential, contained space where clients can explore their issues. The archetype ‘working towards a model of gay affirmative therapy’ (Davies and Neal, 1996, p24-40) provides me with a framework within which to explore gay culture and to apply an assenting approach to the work, which I believe promotes empathy and helps me to work in the best interests of the client.Conducting my own assessments, I complete a full client history, genogram and timeline, which provides a comprehensive insight into clients attachments and losses. It is important to acknowledge the social context within which multi-layered loss takes place (e. g. heterosexism, homophobia, HIV-related stigma) as well as recognising that indiv idual attachment styles may influence individual reactions to these losses and may also impact on the counselling relationship.Losses experienced by HIV+ gay men include loss of identity, health, appearance, mobility, self-respect, career, financial security, relationships and intimacy. (Riggs, Vosvick and Stallings, 2007, 12:6, p922-936; Koopman, Gore-Felton, Marouf et al, 2000, 12:5, p663-672; Fernandez and Ruiz, 2006, p356). Corr, Nabe and Corr (1997) describe these losses as the cognitive, affective and behavioural responses to the impact of the loss. In identifying attachment styles in HIV+ adults, Riggs, Vosvick and Stallings (2007) found that 90% of gay and bisexual HIV+ adults recruited into their study demonstrated insecure attachment.They suggest the diagnosis of HIV produces a strong trauma reaction, impacting on adult attachment style. In the same study, they found that HIV+ heterosexual adults were more likely to be secure, whereas gay and bisexual adults were more like ly to be fearful, preoccupied, avoidant; or dismissing, respectively. This led them to conclude that gay and bisexual people must therefore contend with societal forces that their heterosexual counterparts do not.They hypothesise â€Å"A diagnosis of HIV may be reminiscent of the coming out process, particularly with respect to concerns regarding stigma and disclosure, and thus may provoke similar fears about rejection by loved ones and society as a whole that contribute to greater attachment insecurity. † (Riggs, Vosvick and Stallings, 2007, 12:6, p931). This is supported by Koopman, Gore-Felton, Marouf et al (2000) who cite attachment style as a contributing factor associated with the high levels of stress experienced by HIV+ individuals.They comment â€Å"From this perspective, perceived stress is likely to be greater among [HIV+] persons having a highly anxious attachment style because their hypervigilance in interpersonal relationships leads to misinterpreting othersâ⠂¬â„¢ behaviours as rejecting or critical of themselves. † (Koopman, Gore-Felton, Marouf et al, 2000, 12:5, p670). This would suggest that HIV+ gay men with insecure attachment style may experience difficulties in developing and maintaining relationships, which, in turn, may impact on the therapeutic relationship.Additionally, according to Kelly, Murphy, Bahr et al â€Å"Dependable and supportive attachments play a crucial role in adjusting to HIV infection. Lack of such attachments and social support has been shown to be a significant predictor of emotional stress among HIV+ adults. † (Kelly, Murphy, Bahr et al, 1993, 12:3, p215-219). This has significant implications for the psychological well being of HIV+ gay men whom, considering their perceived attachment difficulties, may experience difficulties in forming such supportive relationships.In examining the suitability of the common grief models when working with this client group, I accept Copp’s criticism of the Kubler-Ross model for its focus on psychosocial dynamics â€Å"to the exclusion of physical, and to a lesser extent, spiritual dimensions. † (Copp, 1998, 28:2, p383). I also agree with Knapp’s criticisms of the staged/phased grief models espoused by Kubler-Ross and Murray-Parkes. Knapp observes â€Å"while both of these models may be applicable to those experiencing a singular loss, neither model takes into  consideration the multiplicity of losses thrust upon the seropositive gay male population.These men experience overlapping losses, resulting in them being at differing stages with respect to different losses. † (Knapp, 2000, 6:2, p143). Knapp offers a similar criticism of the Worden model in that â€Å"task models fail to account for the continuity of loss in the lives of seropositive gay men. † (Knapp, 2000, 6:2, p143), with which I also concur. In addition, all three models incorporate an end point, which suggests the completion of a cycle, th ereby pre-supposing some sort of finality.These models are therefore limited in their application to my own work, since, as new losses take the place of old, my clients find themselves in a continual cycle of loss without the comfort of such an end point. Processing the loss of the ‘pre-infected self’ and re-defining the ‘HIV+ self’ often means working with the stage of identity vs role confusion in Erikson’s (1965) psychosocial model. Additionally, where partners stay together, a revisiting and re-negotiation of the adult stage of intimacy may be required since intimacy is often disrupted and sometimes lost due to HIV infection.This stage is also revisited by clients where a partner chooses to end the relationship with a HIV+ partner. Working through the loss of the partner (usually due to fear of infection); as well as other significant relationships (usually due to HIV related stigma); is also key to the work. To support this work, I use the †™multi-dimensional’ grief model by Schuchter and Zisook (1993), adopting four of their five dimensions: emotional and cognitive responses; emotional pain; changes in relationships and changes in identity.  (Schuchter and Zisook, 1993 in Stroebe, Stroebe and Hansson, 1993, p26-43).I have also used Worden’s grief model in supporting a HIV+ client whose HIV infected partner committed suicide. This work is clearly demanding and is informed by the client’s internal working model of self and other. Due to perceived stigma and fear of rejection, it is not unusual for the client’s attachment behavioural system to be activated throughout the therapeutic relationship. Recent research highlights the mirroring of Bowlby’s theory within such a relationship.Parish and Eagle (2003) and Sonkin (2005) draw attention to the manifestation of clients seeking proximity maintenance to the therapist; experiencing distress when the therapist is not available; seeking a safe haven when in distress; and using the therapist as a secure base. To cater for this, I strive to provide a secure base in therapy, ensuring I remain boundaried, punctual and professional, informing clients of any breaks and provide opportunities for clients to explore their anxieties. Clients in particular distress may also contact the agency, who in turn may contact me.My experience has taught me that clients with avoidant attachment styles take time to build trust in the therapeutic relationship. I have also found the avoidant attached usually need permission/re-assurance to grieve their losses, whilst the anxiously attached require permission/re-assurance to stop grieving their losses. I am cognisant that the therapeutic relationship promotes attachment yet at the same time acknowledge the paradox in severing this attachment at the end of therapy. Ending sensitively is therefore crucial. I recognise that clients may develop co-morbid conditions such as alcohol and recreati onal drug abuse.In line with the BACP ethical principles of beneficence, non-maleficence and self-respect (BACP Ethical Framework, 2007), I use supervision to monitor any emerging signs of such abuse, where a decision may be reached to refer these clients to external agencies or other, suitably experienced, internal counsellors. In assessing my strengths and areas for development, I am now much more aware of how early attachment experiences and internal working models impact on how clients process their losses as well as their potential impact on the counselling relationship and process.I have extensive experience of working with loss and bereavement, which is underpinned by my specialist training and practice at Positive East, as a bereavement counsellor with the Bereavement Service and as a counsellor providing support to those bereaved through homicide at Victim Support. I believe a healthy, secure attachment to a primary caregiver is necessary for a child’s social, emotio nal and intellectual development. In turn this promotes the development of a healthy internal working model, disruption to which may lead to psychopathology in later life.Whilst the internal working model tends to persist through the life course, I believe it can be modified by divergent experiences, but acknowledge this change may be difficult. Whilst I have extensive experience of working with loss, I now appreciate how early formative attachments influence our reactions to such loss and how these reactions may impact on the therapeutic relationship. Popular grief models clearly fall short in addressing the multi-layered losses experienced by this client group, demanding instead the integration of what is currently available.The high level of insecure attachment style demonstrated in HIV+ gay men may be due in part to the unique challenges they face within the context of HIV related stigma and negative social experiences. Finally, I believe my knowledge of theory and sensitive app lication of skills has proved to be an effective strategy in working competently, sensitively and safely with this client group. Nonetheless, I recognise the need for continuous professional development and aim to attend workshops on attachment; and mental health and HIV during the summer.

Tuesday, July 30, 2019

Effects of speech and language difficulties in children Essay

Speech, communication and language development are always at the heart of each and every child’s learning as well as the link to other areas of the child’s development. Without these skills in speech, language and communication, a child will not reach their full potentials. According to a report by the Charity ICAN, one out of ten children, about three children in every classroom have difficulties in communication that may require a help from a specialist (http://www.ican.org.uk). With this number of children with communication difficulties, it is very vital to have practitioners who are more knowledgeable to support these kids in speech, language and communication skills. It is very evident that there is an increasing number of children who are entering the education environment with language and speech problems. This speech will highlight some of the main causes of language and speech difficulties along with the effects this can have on the other areas of the child’s development. It will also highlight on the major measures to be taken to effectively boost the children’s communication skills. The effects of language and speech difficulties There are many factors that can cause difficulties in language and speech in children, these include: Childhood illness- a child with chronic ear infection can have a lot of difficulties in language and speech development. In this infection persist, there will be fluids in the ear and this will impact on the child’s hearing. This affects how a child will process the language and hence result in delayed language and speech skills acquisition. Use of bottles and dummies- A prolonged use of bottles and dummies by kids can adversely affect their language, speech and communication skills. Before kids learn to say a word or a sentence, they explore their voices through producing different sounds and noises. So, with a prolonged use of bottles and dummies will make the children adapt the sounds of these bottles and they will hence be using their voices less often. The teat from the dummy or bottle can also disrupt the tongue and lips movement at the front of the mouth and this leads to a distorted speech. Complications in using the oral muscles-children communications skills can also be affected by oral motor disorders. A kid with a oral motor disorder will find it very difficult in using their tongue, jaw and lips’ muscles. This will result in much difficulty in speaking as well as feeding. Developmental difficulties- this will affect the kids with Autistic Spectrum because they will find it very difficult to understand verbal or non-verbal skills. Birth difficulties- Dysathria is a condition that affects the muscles that are used for speech and hence leading to language and speech difficulties. This is mostly caused by changes to the brain during pregnancy and also at birth. Lack of simulation-kids learns through watching others. They copy language by observing the behavior and actions of the others around them. If the kids do not receive adequate simulation, they will end up having difficulties in communication skills. The literacy runs an initiative that is titled, â€Å"talk to your baby† so as to support early language simulation. They state that, â€Å"lack of early language stimulation can lead to language delay, and sometimes literacy and learning difficulties that then extend well beyond early literacy development and can be extremely costly or difficult to remedy.† Impacts of language, speech and communication skills Language, speech and communication skills are very vital for promoting other areas of learning. A child’s with communication difficulties, their overall development will be affected. The impacts of child’s language and communication difficulties vary depending on the individual needs of the child along with the severity of these difficulties. The following areas could be adversely affected. Play- play is vital for children’s development, structuring their confidence as they learn to think about problems, to explore and also to relate to others. When a child gets older, they start using languages to relate to others in the games. The other children start incorporating rules to the games. For a child to play the game he/she must follow the rules, but if they had difficulties in communication, they will obviously be left out and hence this would lead to low self esteem and loss of confidence. This will also affect the child’s Personal, Social and Emotional Development. Friendships- a child with difficulties in communication will find it very difficult in mingling with the others and hence their friendship with other children will be much compromised and this will lead to losing a lot from the others. Literacy- difficulty in understanding and processing language can lead to delays in acquisition of phonic and reading skills. Adapting the communication methods for these kids Since different children will have varying level of severity, there are different methods that can be employed to individual children to support their problems. Praise the childeren’s efforts- praising a child on what they have done well will raise the child’s self esteem and confidence, hence boosting their participation. Guided activity-Every time you talk with a child with this difficulty, always use a simple language or phrases. Slow down communication- give the child time to listen, think and work on what has been said. Rushing a child may make them think that they have failed. Children will be more likely to answer questions if they feel comfortable and are given the opportunity to participate. Use of visual aids-this could be a very successful strategy for training children with communication difficulties. In everyday’s communication, hand actions and gestures could support a conversation and also engage a child. Visual aids could be used to help children in understanding the day to day routine and making decisions. Conclusion To conclude, I would say it would be important for us to adapt the communication methods for the kids that are well suited for them to develop their good language, speech and the overall communication skills. Adaptation paper Effects of speech and language difficulties in children The choices made The main reason that I chose this topic is because everyone here has come into contact with a child with language, speech or overall communication skills difficulties. So it is very vital for us to understand the difficulties that these kids pass through so that we could be able to help them out of this problem. This is so because we are now the adults that these young ones are looking for help. Hence, it is very vital if we understood these difficulties so that we shall be able to help these children. Through this, I was sure that we shall understand how the language and speech difficulties can really impact on the young one’s overall development. Through this we shall be able to identify the extent of the problem and administer the best possible solutions. Also, one day we were all kids. We have seen many kids grow and hence through this we know the many requirements of a child in learning and the acquisition of communication skills. So I decided to choose on this topic to boost our knowledge on caring for these kids and also to be responsible adults. This is a topic that people think that they know everything that should be done but I had to dig out to come up with facts about it so as to substantiate on what others knew. For instance, on how language, speech and communication will impact on the overall development of the child, one could point out the social, personal and emotional development. This looks at how a child will develop self esteem and confidence and also at how children make decisions and choices. It is really important to learn the ways in which these communication problems could be modified because a kid with a communication and language difficulty may find it vey difficulty to express their preference and needs, and this makes it very difficulty to make their own choices and decisions. So the development of acceptable communication skills is very reliant on the help from the adults like most of my audience. Children may refrain from engaging or entering social institutions where they have difficulties in interacting and participating to the fullest this can adversely affect the their social and emotional difficulties. So it is very vital that I could address this issue. References http://www.ican.org.ukhttp://www.literacytrust.org.uk/talk_to_your_baby/about(http://media.education.gov.uk/MediaFiles/B/1/5/%7BB15EFF0D-A4DF-4294-93A1-1E1B88C13F68%7DTickell%20review.pdf) http://www.istockphoto.com Source document

Responding to Social, Economic and Political Systems Essay

Social, economic and political systems greatly vary across nations, with the minor and major differences dependent on the very foundations of the social, economic and political structures of these nations. For instance, a third-world country with a predominantly Muslim population has various social, economic and political systems to a first-world nation largely composed of Christians, or the opposite can also be true as well. To a certain extent, these systems develop from the most fundamental needs of the people from their collective experience. Since there is a great deal of differences from among the collective experiences among people, there are also corresponding differences in the way in which these people address these experiences, which is why there has been varieties in the social, economic and political systems worldwide.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Moreover, these systems do not remain in a stagnant stage. Rather, social, economic and political systems also undergo certain changes through certain times, whether periodic or constant change. It can also be said that because of these developments in these systems, there has also been a seeming overlap among them inasmuch as terms such as socio-political and socio-economic systems have emerged. In more recent times, changes in the social systems have taken place largely because of the improvements in the economic status of the nation. Changes in the social systems were also likely the results of the recent events which took place in a particular state. For example, the emergence of India as an economic powerhouse in terms of its capability to produce a large number of outsourcing employees has corresponded to a shift in the social status of the Indians, making those employed as outsourcing agents more informed and well-aware of the latest technological advancements.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   China, on the other hand, has been a growing market in the international economy precisely because of its continuous development in international trade due to its cheap goods from cheap labor. China’s cheap labor stems from the fact that the large population of that nation easily provides available manpower in the production lines. The cases of India and China are only some of the many examples which illustrate the idea that social and economic developments oftentimes comes hand-in-hand. Thus, it can be safe to assume that social, economic and political systems may intertwine with one another, bringing about consequent changes to the other while having a direct impact on the status of that system.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   These systems, for the most part, cast direct and indirect influences on the performances of certain organization or agencies operating within a specific location or across several parts from around the world. Direct influences may include but is not entirely limited to political, economic or social systems of a specific nation. The same can also be said of indirect influences although it can further be considered that indirect influences may come from sources external to the regional location where the organization is operating.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For example, political systems can give either stringent or loose regulations on the operations of an agency depending on the context in which the agency is operating. A profit-oriented agency can directly be influenced by political regulations which limit the target market and the employment policies of that agency for instance. Social systems, too, hold a great deal of influence on the overall performance of an agency profiting from the sales of a certain product. In the case of a populated community, chances of marketing a certain product may be relatively higher than marketing goods within a less populated community.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Yet it should also be noted that agencies which are non-profit by nature are equally influenced by social, political and economic systems as well. Since the existence of non-profit agencies do not depend largely on the financing that they can derive from their operations, it can nevertheless be argued that the social, economic and political systems of a specific state can have a different bearing to agencies which are primarily profit-oriented.   A certain state regulation on marketing goods may very well apply to profit agencies. However, non-profit agencies may experience no impact by these state enforced marketing regulations. What largely influences the operating of non-profit agencies in terms of social, economic and political systems can be observed from the very way in which these systems restrict the activities of these non-profit agencies. These non-profiting related restrictions may come in many forms such as restrictions on the scope of the agency’s operation as well as the extent of the agency’s behavior with respect to the existing state laws.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A country under a liberal democratic system will essentially enforce limited regulations on agencies such as non-profit ones so as to give these agencies an organizational type of civil liberties, giving more freedom for these non-profit agencies to exercise their functions and purposes. With these things in mind, the social and political systems of a liberal democratic state will significantly increase the participation of non-profit agencies in exercising their functions, thus giving way to servicing more clients or individuals with the services the agency provides. On the other hand, a nation under an authoritarian regime will most likely restrict the operations of a non-profit agency, placing its activities under close scrutiny of the authorities.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From the examples given, it can be seen that the socio-political composition of a nation or, more specifically, of a government greatly affects a non-profit agency be it in terms of its capability to exercise its functions or its capacity to provide certain services to the people not even as a marketing scheme but as a servicing scheme.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Further, the economic system of a specific country can also influence both the internal and external decisions and actions of a non-profit agency. Japan was once a nation which isolated itself from the rest of the world, making any financial aid from foreign agencies less likely to penetrate the funds of the non-profit agencies within Japan. Although to a certain extent these external financial aids from foreign organization may reach the funds of the non-profit agency in Japan, there could have been difficult obstacles prior to that. More recently, the economic prosperity of Japan and its opening of its borders to the world have nonetheless become contributive events to the welfare of several Japanese non-profit agencies which can make the most out of foreign financial assistance.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Moreover, non-profit agencies in third-world countries such as the Philippines can encounter the difficulty of mobilizing its services across communities precisely because these communities come in a large number. The necessity to address the needs of a specific number of constituents in a certain community should first be established. Otherwise it becomes more difficult for the non-profit agency to materialize its goals given the limited amount of resources. In general, the economic system of any given country or community greatly affects the manner in which a non-profit agency addresses this factor and in which the agency allocates its resources.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In essence, political, social and economic systems affect non-profit agencies and that these agencies would have to make the most of what is available in terms of resources. Certain restrictions may be present, yet these things test the integrity of any non-profit agency. Reference Reiner, T. A., & Wolpert, J. (1991). The Non-Profit Sector in the Metropolitan Economy. Economic Geography, 57(1), 23-33.

Monday, July 29, 2019

Polyeurethanes Research Paper Example | Topics and Well Written Essays - 750 words

Polyeurethanes - Research Paper Example Some of these chains can be very small, while others can extend to incorporate many monomers on orders of hundreds to thousands. The length and complexity of the chain also affects the chemistry and how the compound will interact under specific conditions. For example, as the chains get longer, chemical properties such as melting point and boiling point increase with resistance and hardening, but chain mobility decreases (Mark 3-24). As a result, this impacts the mold ability of the polymer. One of these polymers that our society has adopted across many industrial and commercial applications is Polyurethane. Polyurethane is a polymer, which consists of repeating units of a core structure containing: urethane groups in addition to benzene rings and the carbon chain. The polymer was first synthesized in Germany by chemist, Otto Bayer, in 1937. The primary complex of chemicals, which are used, is isocynate and polyol. These chemicals size, purity, and quality all influence how fast the reaction will go to completion, as well as the chemical forces will affect the properties of the compound. The reaction is catalyzed to begin the polymerization reaction by tertiary amine compounds. Polyurethane is classified in a group of other compounds known as reaction polymers. The properties of polyurethane can change based on the types of monomers, which are substituted into the carbon chain. When in a solid form, polyurethane is a flammable material and can have some side effects with exposure to humans. It can cause eye and lung irritation, but is not a known carcinogen (Ashida 5-9). Commercially, polyurethane has become an important type of epoxy, which is used in a wide variety of applications in the manufacturing industry as well as products and services. Because of the multiple substituents that can occur in the polymer, it can have the properties of rubber, but still be tough enough to withstand great amounts of force as well as endure high temperatures. It was origina lly designed to supplement rubber, and eventually replace it. Now, it is used in many commercial applications. It is used to help hold upholstery and dashboards in vehicles. The â€Å"harder† variants of this material are used in shoes, as adhesives and coatings as well. One of the more typical applications of this was the discovery that this polymer could be used as foam. The synthesizing of the foam compound of polyurethane is a bit different than the standard compound. It involves a reaction with carbon dioxide and water, which is what it gives it the high degree of mold ability. One important fact that has to be noted about this particular reaction is that it is an exothermic reaction, meaning that high amounts of heat are released upon the catalyzation of the polymerization reaction. As a result the use of the foam polymer has seen the most widespread use in terms of the other variations. It’s most common application is through the use of insulation in houses. Bec ause the foam is form fitting, it can block holes and unusual spaces, which conventional materials would fail to block. This has also made it a good sealant for tires. The use of the foam type of polyurethane also extends to use on airplanes, as soundproofing, use in electrical equipment, etc (Moore). Polymers and the basis of polymer science have had a large impact not only on industrial and commercial companies, but also in the daily lives of our

Sunday, July 28, 2019

The Athlete's Shack Wireless Upgrade Term Paper

The Athlete's Shack Wireless Upgrade - Term Paper Example 2 Assessment For catering the needs of the business for TAS, there is a requirement of secure and effective wireless network connectivity for all the 10 stores within the same area. There are no requirements for establishing connectivity on long distant stores. However, security is a primary concern, as data channels will be established in the environment. For addressing the security issue, Cisco provides rich features and adds an extra layer of security on the wireless networks. The embedded security technologies on a wireless architecture are now standardized, as they are available by default in all vendor manufactured wireless devices. Some of these technologies are WEP, WPA etc. Moreover, after securing the data in transit by encryption, we have also proposed a wireless intrusion prevention system that will continuously monitor and prevent the network from cyber threats. However, there is no guarantee of the network security, if the iPads are misused and stolen or snatched from o ne of the employees of TAS. For addressing human threats, acceptable use policy and password policies will be implemented. 3 Solution As the TAS environment requires wireless connectivity, ‘access points’ are required. ‘Access points’ are the device which is used to connect devices equipped with wireless technology. ‘Access points’ transmits and receive radio signals adjacent to a network hub over a limited distance. However, distant varies from different model types and wireless technology adopted. The TAS requirement is to provide access of network resources to the staff for connecting the iPads. Cisco delivers a borderless mobility experience which gives users access to the information and resources with the quality and performance. 3.1 Wireless connectivity of TAS sites TAS haw 10 stores within the same area, and there is no information regarding the distance of each of these sites with each other. When designing a wireless point to point c onnectivity, the distance is always considered due to limitation of wireless technology. Cost is also a major factor when implementing and designing a wireless network. There are two methodologies which can be adopted for connecting all 10 sites to provide Internet connectivity. 3.1.1 Wi-Fi 802.11/y It is a relatively new wireless standard defined by IEEE 802.11 standards with more enhanced capabilities as compared to 802.11n. It operates on 3.6 to 3.7 GHz on 54 Mbps with the distance of 3 miles (Parsons & Oja, 2009). The distance which is required to connect all of these 10 sites can be achieved by connecting via 802.11y Wi-Fi technology. However this technology is currently available only in United States of America. The hardware which is required to connect all these 10 sites is relatively of low cost. This is a low cost solution but it has certain limitations as it is available only in the United States. There are very few IEEE 802.11y complaint devices available. The router can be installed at any one end of either side to broadcast the signals

Saturday, July 27, 2019

Religious realism vs. anti-realism Essay Example | Topics and Well Written Essays - 500 words

Religious realism vs. anti-realism - Essay Example However, debate on religion realism and antirealism matters in the society today due to the fact that there are rising radicals in the two areas. For instance, religion relies more on supernatural powers, therefore it needs one to believe that there exists a natural being that they pray to. I take a realist position since on the issue I believe that there exists supernatural being providing spiritual carte despite the fact that science cannot prove that. Thus discussion on realist and antirealist is important since it will enlighten one and let them grow in faith. Therefore, with that knowledge it will be unlikely for one to be waivered form his or her believes. Moreover, antirealist believes that one cannot take theories to be true. Additionally, they give instances of scientific theories that have been proven not to be true. Thus, they believe that majority of theories are wrong and they should never be relied on. For they argue that the newton’s theory which had been used for quite some time, was proven not to be true with the recent technology. On the other hand, realist believe that non observable phenomena does really exist. For instance, people believe that there exists the black hole despite the fact that they have not seen it. The same way Christians believe in the existence of God who is supernatural and can hear at the same time answer their prayers. Despite their differences the antirealist and realists agree that once in religion, one has to engage in particular believes and practices that are meaningful and valuable in some way to the believers (Nuyen, 394). Realism is part of the society today, for instance, a number of people have not been to china but they believe that it does exist. It does not need one to travel to each and every part of the world to ascertain that it really does exist. Thus realism comes in handy since one is obliged to believe that the countries or various places do exist. Secondly, most people

Friday, July 26, 2019

Voice of the Customer Assignment Example | Topics and Well Written Essays - 250 words

Voice of the Customer - Assignment Example Customer loyalty is yielded by customer satisfaction through improvement of products and processes. Customer loyalty is similar to customer satisfaction since they both participate in bringing new customers and they are a tool an organization can use in fighting competition. However, customer loyalty develops over a long period as opposed to customer satisfaction that is immediate. Voice of customer refers to all the activities undertaken by an organization so that they get the response of their clients so that they can respond to their unmet demands. These activities are continuous since the demands of customers keep changing over time. The tools used for VOC include interviews, surveys observation and field report. These activities differ depending on the kind of product being offered by the organization. It helps the business to identify the necessities of their customers so that they can respond positively to their needs and hence create customer satisfaction and later customer loyalty. A satisfied customer has a high probability of becoming loyal although it is not a guarantee. A satisfied customer who requires the product often can become loyal but if he/she does not require the product often they may not become loyal. Changing needs may also limit a satisfied customer from being loyal to a

Thursday, July 25, 2019

Stock Control Using Visual Basic.net Essay Example | Topics and Well Written Essays - 4500 words

Stock Control Using Visual Basic.net - Essay Example The main vision of this project; is to achieve a method of a simple stock count of a mini market (corner shop), as these shops are still mainly managed and run in a traditional way. These groceries are in large numbers due to high demand; they have the potential of optimizing the business as well as deliver goods to customers on a continual basis. Therefore the project proposed is intended to assist the clients with an easy way to acknowledge the owner of the goods available and goods which a due to run out, so that they can place an order at the right time, with this method the client is able to reduce holding time as well as optimising cash flow. The delivered program will be able to store data of goods, which will be strategically sequenced by product line code (PLU). It will also have the ability to indicate when the stock is running low. As well have an easy and friendly way to operate.Since it’s a proven fact indeed that Inventory and Stock Control has a big impact on th e efficiency of the business, intensive research is to be carried out, to determine the problems of stock control that retail business is facing. Then the data collected will be critically analyzed and computed along with key retail- experienced staff that has been in the business that will then determine the need of the program. Steps to be taken to create the program are to be strategically planned and laid out on a data flow diagram (DFB) and data process diagram (DPD) to illustrate the contents.

Wednesday, July 24, 2019

Greek society Assignment Example | Topics and Well Written Essays - 250 words - 1

Greek society - Assignment Example Few philosophers show that historians have not understood the vital role played by women in Greek society. Women in Greek owed property and were respected in the society. By law, women were not prohibited to take part in activities of life (Burckhardt 67). Presence of water channel allowed ancient Greek to focus on trade. Access to Africa, Europe and Asia through see route allowed Greek to become commercial society. Extensive trade gave a touch of westernization in the society. Middleman became prosperous and new trends in weapon and armory were introduced (Burckhardt 71-72). Loans were given to ship owners as banking activity and financial transactions were part of ancient Greek life. Revolution in banking never stopped and different ways of commerce and trade were introduced (Sotiropoulos & Karamagioli 54). Arts were part of old society and marks of Greek arts are still visible in ancient civilization. Gender distinction played minimal role in ancient Greek as women also enjoyed freedom of practicing all visions of

Week 2 Hand-in Assignment -2 Example | Topics and Well Written Essays - 500 words

Week 2 Hand-in -2 - Assignment Example But how does that rectangular box, on the wall of the bank, in a private booth, or maybe in a convenience store, dispense all of that cash? What are the user requirements? The ATM is a classic example of the textbook definition of Chapter 4.1.1 â€Å"The functional requirements for a system describe what the system should do†. The European Community basically agrees in its ATM Protection Guidelines (2000). Although it is relatively old, the University of Maryland issued a very good document on this subject (1996). The following steps must be undertaken before the customer can receive his or her money. Any answers of no will cause a rejected transaction and the person will be turned away. 4. If valid, customer is prompted to enter his Personal Identification Number. Is it correct? (Depending upon the policies of the bank, the customer is given a number of chances [usually three] to enter the correct number). 6. If the answers to questions two, three or four or no, depending upon the type of machine and again the bank or network policy, an error message is displayed on the screen. The card is either returned or seized without printing a receipt. 11. If all questions other than Item Ten are â€Å"Yes†, then cash is dispensed, a receipt is printed, and the customer is reminded to remove his card. The ATM also notifies the customer bank of the transaction, along with any fees assessed. All of these steps are completed (most of the time) in a matter of seconds, probably less than two minutes. Some say the increased use of debit cards, twenty per cent in the last fifteen years (FED 2006), may spell the demise of ATM. Yet the recent credit card crunch and tightening of bank regulations have led to the use of more cash and that means the little boxes will continue to

Tuesday, July 23, 2019

Theme 3 Essay Example | Topics and Well Written Essays - 750 words

Theme 3 - Essay Example change process within an organization, and thus there is a lot that the management can do to enhance the success of the change process (MartinÄ iÄ , 2010:82). In arguing for the assertion by (Mullins 2010: 753), that the management has little it can do about resistance to change, it is apparent that the management cannot force change on the organizational stakeholders such as the employees, considering that change has to emanate from within (Shao-His, Ying-Fang & Shao-Wen, 2012:747). Whenever change is externally driven, it will result to resistance and where resistance is not apparent, the change process will be sabotaged by those opposed to it, or they may quit where it is apparent that change must occur. The problem with this is that, the organization may lose its valuable assets in the quitting employees (Phillips, 1983:191). Nevertheless, to argue against the assertion by (Mullins 2010: 753), it is apparent that the management can do a lot about resistance to change within an organization. This principle can be demonstrated well by the case â€Å"Remaking JC Penney’s Organizational Culture†, where Myron E. Ullman, who was appointed to the position of the chairman and CEO of JC Penney Corporation in 2004, had an elaborate plan on how he could introduce change to the organization, through making the organization a great work place for the employees (ICMR, 2007:2). However, he was faced with a lot of resistance, considering that the organization had a culture of rigidity and formal employee relationship spanning over the past 100 years (ICMR, 2007:2). The rigid rules of addressing the managers formally and dressing strictly in accordance with the organizational dress code had made the environment in the organization tense. This resulted to the inability of the organization to attract new talent or retain new recruits, while the employee turnover increased (ICMR, 2007:3). Nevertheless, after Ullman and the newly hired human resource manager, Michael Theilmann

Monday, July 22, 2019

Human Sexuality Essay Example for Free

Human Sexuality Essay William and Jessie both 23 years old have been dating for 3 years. They plan to get married in 2 years when they finish with graduate school. About three months ago William had an unplanned and alcohol induced intercourse with a colleague from work. The couple are in counseling and working on issues of trust and communication. Recently, they have started having sexual intercourse. Jessie says she is unable to climax like in the past. William says he is doing everything the same and thinks she still blames him. Looking at William and Jessie’s case, I believe that the possible societal and gender influences related to William’s and Jessie’s concerns are the male and female sexual scripts. According to Strong, DeVault, Sayad and Yarber (2008), â€Å"Sexual Scripts refers to the acts, rules, and expectations associated with a particular role† (p. 143). All humans are sexual beings; however we all are diverse in terms of our sexual definitions and script expectations. Sexual scripts are not innate, yet they are learned through culture and socialization (Strong et al. 2008). There are as many distinctive sexual scripts as there are people, nonetheless some of these scripts have common themes and can be recognized as a shared blueprint or trend in the larger society. Some male scripts that are relatable to Williams’s concerns are: Performance is a thing that counts. A man always wants sex and is ready for it and, sexual intercourse leads to orgasm. Society has this idea that is embedded in many people that sex to men is something to be accomplished (Strong et al. 2008). It is important for us to notice that in Williams situation, he is feeling like â€Å"less of a man†, in other words, his ego is bruised, because he cannot make Jessie climax. Additionally, there are sexual scripts allotted to women as well. Some female scripts relatable to Jessie’s concerns are: â€Å"The traditional male sexual scripts focuses on sex over feelings, the traditional female sexual script focuses on feelings over sex, on love over passion† (p. 41). Jessie apparently has issues during sex because she can’t get over the thought of Williams having sexual contact with another woman, especially when William is supposed become Jessie’s future husband. The sexual script that relates to this issue is that the woman does not want to have sex, sex is uncomfortable for her or not pleasurable for her. However due to female sexual scripts, women should not talk about sex (Strong et al. , 2008). Sexual scripts are similar to traditional gender roles; society holds men and women accountable for the roles and expectations that have been set for them and if we fail to live up to them, then we are failures at our gender. Moreover, there are indeed biological and psychological components of William and Jessie’s case. Starting with William, he can’t achieve to make Jessie Climax. Psychological causes include trust and communication related stress and anxiety, because he too busy trying to gain Jesse’s trust. Because of this William is most likely concerned about his sexual performance, trust issues and the guilt of having sexual intoxicate intercourse with his work colleague. For women in particular, emotional closeness is a main component in sexual desire (Strong et al. , 2008) and because William cheated with a colleague, she perhaps could have grown psychologically distant. As stated by Strong et al. (2008), â€Å"Desire is the psychological component of sexual arousal† (p. 92). According to the Masters and Johnson’s four-phrase model of sexual response, Kaplan’s tri-phasic model of sexual response and Loulan’s sexual response model, they all include desire and excitement as key elements to sexual response and pleasure and without these two elements, a person cannot truly experience the true satisfaction of sexual intercourse and an orgasm (Strong et al. , 2008). In relation to this case the developmental concerns related to the early adulthood stage according to Strong et al. 2008) are the following: Integrating love and sex, forging intimacy and making commitments. Integrating love and sex was not integrated when it comes to Williams’s infidelity. William was more so thinking with his penis rather than thinking about the love of his life Jessie. As the female, Jessie thinks more with her heart and values the love for William. The thought of betrayal from William, may possibly be disheartening and could hinder Jessie from climaxi ng during intimacy. In Jessie’s mind, loving William and having that solid connection with him was important to her. Furthermore this developmental concern strongly compares to the male sexual script with thoughts of sex over feelings, while the woman’s thoughts consist of feelings over sex. The key to integrating love and sex was missing because of Williams’s infidelity. Therefore uniting the two will take a longer process to connect. Forging intimacy and making commitments plays an integral part in the developmental concerns in this case as well. According to Strong et al. (2008) as a relationship become more meaningful, the degree of intimacy and interdependence increases. As adults become more intimate, most desire to develop their ability to make commitments. In relation to William and Jesse they are in a meaningful relationship, they were planning to get married and spend the rest of their lives with one another, before the infidelity occurred. It is my assumption the intimacy was on a higher level but after the infidelity occurred the intimacy decreased and the trust and communication issues began to form. During the early adulthood stage young adults begin to attend college and students began to meet lots of people in their age bracket. There will be opportunities during college where students attend plenty of social gatherings (frat/sororities houses and parties) and majority of the time alcohol and drugs are involved as well as risky sexual activities. Strong et al (2008) strongly believes that among college students, the use of alcohol is associated with an increased risk of unwanted intercourse, sexual violence and STDS. Since Jesse and William are in the early adulthood stage, it is a strong possibility William wants to venture out in a since before he gets married. Maybe he feels pressured and tied down to Jessie. Lastly, infidelity is common amongst the early adulthood population. Research by McAnaulty and Brineman (2007), states that 41% of the students identified having sexual intercourse with a person other than ones primary partner as constituting being unfaithful. More students (57%) identified dating/spending time with another as unfaithfulness. Infidelity can greatly affect committed relationships, because it could cause a lack of communication and trust worthiness. When relationships are broken, a lot of emotions occur such as lack of sleep, a decrease in appetite, anxiety and constant crying in some cases.

Sunday, July 21, 2019

Visual Information Encryption by D-H Key Agreement

Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement Visual Information Encryption by D-H Key Agreement and Visual Cryptography Abstract Visual cryptography provides secured digital transmission which is used only for one time. In order to make visual cryptography reusable Diffie and Hellman (D-H) key is used. The original images can be reuse by using this scheme. It is effortless and uncomplicated technique to execute the secret image for shadow images. The shadow images are the shrunken version of the original image, in which the secret image share is embedded. These are used to guard the data and secret images in the internet so that it is not accessed by any unauthorized persons. Visual cryptography divides the image into secret shadow images. After this these shadow images are distributed in the original image. Recovering of secret image is done by human visual system by piling all the shadow images. As this Visual cryptography is used only once D-H key agreement was used to make it reusable by using D-H key scheme in it. Objectives: Provision of security for hidden images Reusing of the original image is possible by this technology Images should be visible only to human visual system Literature Review In this project a visual cryptography scheme is used for encrypting the information. Visual cryptography is an encryption method which is used to hide the information in an image, decrypted can be done by human visual system. By using only this scheme the reusing is not possible. The image which is recovered after decryption will not be same as original image so it cannot be reused. For the reuse of the visual cryptography Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) can be used. In this both secret and symmetry-key representation can be used (Chao-Wen Chan and Yi-Da Wu, 2008). Visual cryptography is the scheme which facilities the secret sharing of the pictures or data. The pixels of the pictures or data that need to be transmitted secretly will be treated as an individual secret which can be shared using a secret sharing scheme. The picture is first split into two or more shared images the secret data are embedded. At the decryption side images are join ed on the transparent paper to get the secret picture or data. This is the way in which the first visual cryptography was started (Borivoje Furht, Edin Muharemagic and Daniel Socek, 2005). Using current methods the Visual cryptography scheme will allow the encoding of the secret image into shares; this is done in the form of transparencies. These shares are distributed to the participants, such that only the qualified subsets of participants can recover the secret image visually. This is done by superimposing the share images one over the other which are obtained from the original image (Carlo Blundo and Stelvio Cimato, 2005). In this scheme the devices are used for encoding of secret information and the decoding is done with human vision directly. For encoding, the visual cryptography will cryptographically encode the binary secret data into shares of the pattern which will be random. Then the shares are copied on to the transparencies with the same number of transparencies as shar es. The transparencies are distributed among the participants, one for each participant. The decoding of the data or picture is done only when all of the participants superimpose their transparencies (Alan Conrad Bovik, 2005). The importance of this scheme is that there is no need for data expansion. The resolution of the data will not be lost by using this scheme. By using this scheme the image will be secure against the most important cryptanalytic attacks. The computation complexity will be less since it involves only XOR operations. By using XOR operations the share images are combined to form the encrypted images. The authentication of the image will be based on the global visual effect, so local defects due to noise will not affect the final result. The most important aspect of this scheme is that the decoding of the secret data or image can be done with human vision without any decoding equipment (Kiyoharu Aizawa, Yuichi Nakamura and Shinichi Satoh, 2004). The previous techno logies that came into existing before visual cryptography are two-out-of two visual threshold schemes, two-out-of-n visual-threshold scheme. In a two-out-of two visual threshold scheme the secret can be any type of data (Abhishek Parakh and Subhash Kak, 2006, p.1). For an image comprising of white and black pixels, this image can be encoded as a binary string. In this scheme the 0 will represent a white pixel and 1 represents a black pixel and the result will be sent in two shares. The security problem by this is having only 50 percent of resolution will be obtained because the image is divided into only two shares and if the new shares of data are found the image can be decrypted very easily. A two-out-of-n visual-threshold scheme is more secure when compared with the first. In this scheme also the pixels are divided into two, but the shares will be n. By this the security will increase. When compared with the D-H key agreement the resolution of these schemes will be less and secur ity will also be less (Doug Stinson, 1999). The D-H key agreement is used to make possible the reuse of visual cryptography. The Diffie-Hellman key agreement used an interface known as D-H key interface. This interface is used for password based Encryption. These interfaces typically can be used by the programmer who is implementing a Cryptographic provider or who wants to implement a cryptography algorithm (David Flanagan, 2005). Diffie- Hellman Key agreement is also known as exponential key exchange. This key provides the solution to the key distribution problems, allowing two parties, never having met in advance to share key material for establishing a shared secret by exchanging messages over an open channel. This is a fundamental technique providing unauthenticated key agreement. The main goal of an authenticated Key establishment protocol is to distribute key of data. The established key should have precisely the same attributes as a key established face to face, it should be distributed uniformly at random from the key space, and an unauthorized entity will not be able to learn anything about the key (Alfred J.Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, 1997). D-H key agreement protocols involve the derivation of the shared secret information based on compatible D-H keys between the sender and recipient. The information is then converted into the cryptographic keying material for other algorithms. A variation of the Diffie-Hellman is used for converting the shared secret data into an arbitrary amount of keying materials (Manuel Mogollon, 2008). According to Michael Baake and John A G Roberts (2001, p.1) Toral Automorphisms will be represented by the uni-modular integer matrices, are investigated with the help of symmetries and also reversing symmetries group of matrices with a simple spectrum through their connection with unit groups in orders of algebraic number fields. The reversibility will derive the necessary conditions in terms of the distinctive polynomial and the polynomial invar iants. This shows that the Voiculescu- Brown entropy of the non-commutative toral automorphism arising from a matrix S in is at least half the value of the topological entropy of the corresponding classical toral automorphism. This is a new method used to prove the position limit laws in the theory of dynamical systems, which is based on the Chen-Stein method combined with the analysis of the homo clinic Laplace operator and some other homo clinic considerations (Massimo Franceschetti and Ronald Meester, 2002, p.2). The main use of this is to generate a disorder in the arrangement of digital images. The equation (1) define the two dimensional matrix. The new technology that can be used for the visual cryptography is adaptive order dithering technique. By using this technique the decrypted image size can be reduced and also the quality of decryption image can be improved. In this technique the technique will get adaptive to the data that is used (Nagaraj V. Dharwadkar, B.B. Amberker and Sushil Raj Joshi, 2009). From the above context it can be understood that visual cryptography is a scheme in which the secret data can be transmitted without getting decoded by others. Chapter 1: Introduction 1.1. Overview Visual Information system significantly enlarges the applications scope of information systems and typically deals with the general purpose multimedia operating system that is supported by multimedia hardware and high bandwidth network. Visual information system involves variety of facilities for efficient visual information presentation and visualization. This system actually provides inter related visual and multimedia information to support the operations, management and decision making functions in an organization. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization. With the increase in multimedia platforms, visual information has become more available (Clement H. C. Leung, 1997). In recent years, there has been a rapid growth of information technology for human to communication on the Internet. Since Internet is public, with the advancement of information technology, communication through inte rnet has increased rapidly. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibility of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission. In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This method is used to compute a common image for encryption and decryption with two parties (Chao-Wen Chan and Yi-Da Wu, 2008). The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exc hange values for the parties and phase2 is the originator and recipient that computes the functions in the given image (Blake Dournaee, 2002). DH key agreement has a nice property that it is not sensitive to off-line attacks but it is sensitive to man-in-the-middle attacks (Christian Gehmann, Joakim Persson and Ben Smeets, 2004). In Diffie and Hellman (D-H) key agreement method both the secret and symmetry key are represented in binary image. It is simple and easy to be implemented especially for shadow images. Thus, it can be applied in many electronic business applications. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities; this process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). Hence it can be stated that in order to safeguard the images visual cryptography and DH key agreement are used where the images are split into shadow images and sent which then will be combines and viewed by the human visual system. It is secured by encryption and decryption of images with a key to be presented. Visual cryptography is seen as a one time pad system that cannot be reused, in further sections of the study the implementation of Diffie and Hellman (D-H) key agreement method is researched in detail so that visual cryptography can be reused. 1.2. Aims and Objectives Aim: To research on visual information encryption by D-H Key agreement and visual Cryptography Objectives: Provision of security for hidden images Reusing of the technology again and again Images should be visible only to human visual system 1.3. Purpose of Study The main purpose of studying the Visual Encryption is to provide a unified overview of techniques for the encryption of the image and video data, ranging from commercial applications like DVD or DVB to more research oriented topic and recently published material. To serve this purpose of Visual Encryption has the different techniques of a unified viewpoint, it provide an extensive use of Visual Encryption. Digital visual data is usually organized in a rectangular arrays denoted as frames, the elements of these array are denoted as pixels. Each pixel is a numerical value specifies the intensity of the pixels (Andreas Uhl and Andreas Pommer, 2005). In the latest year, there has been a rapid growth of the information technology for the human to communication on the Internet. As Internet has become the open public, anyone can easily read information and perform the successful transmission of the information without protection. In order to provide the proper security to the information, V isual Information Encryption by D-H Key study is necessary (chao-Wen and Yi-Da Wu, 2008). Visual Information Encryption provides the secure connection and protects data from unexpected modification by hackers or other outsiders. In D-H key encryption a common password is required for all the attendees to participate in the same conference, which gives more security to the information (Encryption, 2008). Visual information Encryption provides the Encryption formats as a standard function. Thus, the main purpose of the study is to implement a visual secret sharing scheme through visual cryptography in order to avoid sensitive information being illegally read or modified because the observations made from the recent electronic business applications on the Internet reveal that the amount of data exchanged is small and the exchanged data requires secrecy. 1.4. Research Context With the rapid increase in visual information, the digital and video encryption approaches are widely studied upon various resources like visual net meetings. This application mostly requires ultra high security to keep the images and video dat confidential among users; nobody can retrieve the content without a key for decryption. Thus, from this point of view image encryption is considered as a basis for visual encryption. Visual Cryptography is a topic that finds its way into every nook and cranny of the networking world. Everyone has their own ideas of how it should work and their own understanding of how it does work. The problem with the encryption is that there are several different types, and these type works in several different ways. And most companies want encryption, they dont necessarily know what type of encryption they want, and what the difference are between the types. Here this is designed to give a good overview of the current encryption technology (Eric Quinn, 2009 ). The visual cryptography is mainly used in maintaining images secretly for not to be accessed by the unauthorized persons. By using this technology the images can be visual by the user but it cannot be accessed by unauthorized persons. As there is increasing growth in the computer networks and in distributed a computing application visual cryptography plays an important role in providing security (visual cryptography, 2009). In binary images scheme the visual cryptography helps in maintaining the secrecy for not providing authorization to intruders. The visual cryptography provides an infinite computation power that messages cannot be identified. This visual cryptography is in identification of bank customers, verification of electronic voting and anti spam bot measures for maintaining the secrecy to avoid intruders Visual cryptography provides a way for secretly maintaining the information and data. Visual cryptography is used in many applications for maintaining data secretly fo r not be authorized by the intruders (Nagaraj V. Dharwadhakar, Amberker and susil Raj Joshi, 2009). This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. This process provides confidentiality by dividing the secret digital image into several images that are healthier by the human visual system by those images together. Visual cryptography strategy is suggested to combine the key agreement scheme with a shadow image without building a secure connection. Thus, visual cryptology uses public key algorithm for having maintain secretly (Kiyoharu Aizawa, Yuichi nakamura and shinichi satoh, 2004). Many organizations are using this methodology for not having interruptions in data. Visual cryptography uses different encryption and decryption techniques and many authentications for not be accessed by unauthorized persons and maintains secrecy. In this research D-H key algorithm is us ed for having secrecy and privacy can be maintained. By implementation of new encryption schemes provides secrecy in an effective manner. 1.5. Research Method Qualitative approach is appropriate for this research method. Qualitative Research Practice starts with the premise that one can improve their research skills by seeing what researchers actually do in particular projects and by adding their actions and plans into their own research practice. It actually demonstrates the benefits of using practical methods from real-life knowledge and will be necessary reading for anyone interested in the process of doing social research (Clive Seale, 2004). It is a field of inquiry that explains discipline and subject matters. It is called as ethnographic research. It involves collection of narrative data in a natural setting in order to gain insights into phenomenon of interest. This research studies many variables over an extensive period of time to find out the way things are, how and why they came to be that way and what it all means. Qualitative researchers do not want to interfere or control anything. The most common method of data collection i nvolves participant observation (Michael Huberman Matthew and Miles, 2002). Qualitative analysis offers a cluster of very useful procedures like guidelines, techniques etc. It actually refers to the educational issues and the understanding of learning and cognition (Pamela S. Maykut and Richard Morehouse, 1994). Hence, it can be said that the secondary data is preferred for this research while searching the related information to it as the other approaches cannot provide a better data to the research. Chapter 2: Literature Review 2.1. Overview Visual Cryptography is a particular encryption method used to hide information in images in such a way that it can be decrypted by the human visual system if the correct key image is applied. This method was suggested by Naor and Shamir in 1994. Visual Cryptography applies two transparent images. One image consist random pixels and the other image consist of the secret information. In visual cryptography it is not possible to recollect the secret information from one of the images. Both transparent images and layers are involved to reveal the information (Kiyoharu Aizawa, yuichi Nakamura and shichi satoh, 2004). The simplest method to implement Visual Cryptography is to bring out the two layers against a transparent sheet. When the random image contains genuinely random pixels then it can be seen as a onetime pad system and will offer infrangibly encryption. In visual cryptography pixel is divided into white and black blocks. In this chapter, importance of visual cryptography is disc ussed and a New Visual information Encryption Scheme is proposed followed by the explanation of Security analysis on images with the previous technologies. 2.2. Visual Cryptography Visual Cryptography refers to a secret sharing method that will encrypt the secret message into a number of shares and does not require any computer or calculations for decrypting the secret image rather the secret message will be reconstructed visually by overlaying the encrypted shares the secret image will become clearly visible. Visual cryptography scheme on a set P of n participants can be defined as a method of encoding the secret image into n shares so that the original image will be obtained by stacking specific combination of shares onto each other. Visual cryptography technique was initiated by the Naor and Shamiri at Eurocrypt 94. It is a process used for separating one image into various shares. Visual cryptography solutions functions on binary inputs. Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It uses two images one image contains secret informati on, in visual cryptography it is not possible to retrieve the secret information from one of the images, both transparent images are required to reveal the information. To print two layers into the transparent sheet is the simplest way to implement Visual cryptography (jeng shying pan, Hsiang cheh Huang and L. C. Jain, 2004). If the random image contains random pixel then it can be seen as a onetime pad system and will offer unbreakable encryption. These two layers slide over each other until they are correctly aligned where the hidden information appears. This type of visual cryptography which restores the image by stacking some significant images together is known as extended visual cryptography. Generally, visual cryptography suffers from the deterioration of image quality. The basic two cryptography models consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to random dots when inspected individually and does not provide any information about the original clear text. By carefully aligning the transparencies the original message is reproduced (Borivoje Furht, Edin Muharemagic and Daniel socek, 2005). The original decoding is accomplished by the human visual system. Visual cryptography scheme is a visual secret sharing problem in which the secret message is viewed only in black and white pixels. Each pixel in the original image is represented by at least one sub pixel in each of the n transparencies or shares generated. Each share is comprised of collection of m black and white sub pixels where each collection represents a particular original pixel. The contrast of Visual Cryptography Scheme is the difference between the minimum number of black sub pixels in a reconstructed (secret) black pixel and the maximum number of black sub pixels in a reconstructed (secret) white pixel (Kiyoharu Aizawa, Yuchi Nakamura and Shinichi Satoh, 2004). The m ain instantiation of visual cryptographic realizes a cryptographic protocol called secret sharing. The important thing in secret sharing is it relies on a human visual system to perform the decryption. In a conventional secret sharing a secret shared among n participants can pull their shares and recover the secret but the subsets of the forbidden can obtain no information about that. Visual secret sharing schemes inherits all applications of conventional secret sharing schemes most notably access control. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. White box represents a single white or black pixel in the original image. Sub pixel assignments that would be given to shares #1 and #2 respectively. The number of sub pixels per share used to represent the original pixel is four Finally, the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black; however, the original white pixel takes on a grey scale. The structure obtained from either white or black pixel representation can be described by an n. Similar to the area of the secret sharing, more generally structures have been studied in the visual cryptography. The basic model of the visual cryptography consists of a sever al umber of transparency sheets. On each transparency a cipher text is printed which is identical from random noise. The hidden message is reconstructed by stacking a certain number of the transparencies and viewing them. The system can be used by anyone without any knowledge of cryptography and without performing any cryptographic computations. Naor and Shamir have developed the Visual Secret Sharing Scheme (VSSS) to implement this model [Naor95] (Mizuho Nakajima and Yasushi Yamaguchi, 2002). Thus, from the above discursion it can be stated that Visual cryptography is a special technique used to hide information in images in such a way that it can be decrypted by the human vision when the correct image is used. It is a simple and clear scheme that can partition the secret image into a number of shadow images and the dealers can distribute these shadow images to participants. The Visual cryptography scheme makes use of human visual system for recovering secret images by staking vari ous shadow images. 2.3. Importance of Visual Cryptography Visual Information system importantly elaborates the diligences scope of information systems and deals with the multimedia operating system which is supported by multimedia hardware and high bandwidth network. These are text oriented which provides reports, decision-making information and documents for all levels of hierarchy in the organization (Carlo Blundo and Stelvio, 2005). With the increase in multimedia platforms, visual information has become more available with the advancement of information technology; contact through internet has increased rapidly. Visual information system requires many kinds of facilities for effective visual information presentation and visualization. This system actually supplies inter related visual and multimedia information to support the operations, management and decision making functions in an organization. As internet can be accessed by everyone and anyone can easily access the information and transmit it without any protection there is possibil ity of grabbing the information as it became secondary data. So in order to avoid hacking of sensitive information, it should be encrypted before transmission (Yongfei Han, 1997). In order to protect the information Diffie and Helman (D-H) proposed a key agreement scheme that is implemented when two parties agree on a common session key. This key agreement also helps in improving the reusable process. This technique is utilized to calculate a common image for encryption and decryption with two parties. The D-H algorithm does not encrypt data or make a digital signature. This is exclusively used for the generation of shred secrets. The DH key agreement can be split into three parts; they are parameter generation that generates non secret public value and is expensive process, next is phase1generatres two key exchange values for the parties and phase2 is the originator and recipient that computes the functions in the given image. DH key agreement has a nice property that it is not sen sitive to off-line attacks but it is sensitive to man-in-the-middle attacks. There after Naor and Shamir proposed a methodology named visual secret sharing that provides secrecy to the information and avoids illegal activities (Jeng-Shyang Pan, Hsiang-Cheh Huang and L. C. Jain, 2004). This process is called as Visual Cryptography. This process provides secrecy by partitioning the secret digital image into several shadow images that are recovered by the human visual system by piling all those images together. It is secured technique where the data cannot be traced by others. In classic secret sharing, algorithms for splitting and sharing secret information are a stem of cryptography. In the most general case, their objective is to generate such parts for the data and that could be shared by multiple authorized persons. This problem of splitting information in a manner allowing its reconstruction by a certain n-person group interested in the reconstruction of the split information. Al gorithm solutions developed to achieve this objective and at the same time none of the groups of participants in such a protocol, whose number is lesser than the required m persons. It leads to opposing to read the split message. The algorithms for dividing information make it possible to split it into chunks known as shadows that are later distributed among the participants of the protocol. So that the shares of certain subsets of users collective together and these are capable of reconstructing the original information. There are two groups of algorithms for dividing information, namely, secret splitting and secret sharing. In the first technique, information is distributed among the participants of the protocol, and all the participants are required to put together their parts to have it reconstructed. A more universal method of splitting information is the latter method, i.e. secret sharing (Marek R. Ogiela and Urszula Ogiela, 2009). Thus, from the above discursion it can be sta ted that visual cryptography plays a vital role in securing the data and also in sharing the secret message as the data transferred through internet has been increased. rapidly. Advantages of visual cryptography Visual cryptography is simple to be implemented. Encryption incase of visual cryptography does not require any hard problem dependency. Specifically decryption algorithms are not required because a person aware of cryptography can easily decrypt the message. Cipher text can be Fax or e-mail in case of visual cryptography 2.4. Security analysis on images with the previous technologies The security analysis is the major aspect of the encryption. Analysis to the field of security will encounter the serious obstacle that deal is by nature not an exact science. The previous technologies which where there before the D-H key agreement encryption are manual encryption, transparent encryption, symmetric encryption and asymmetric encryption (Fedora Documentation Project, 2009). Visual cryptography can be seen as a one-time pad system. Then, it cannot be reused. Diffie and Hellman (D-H) key agreement method and Toral Automorphism (TA) such that visual cryptography can be reused. Both secret and symmetry-key are represented in binary image. The proposed scheme is simple and easy to be implemented for shadow images. Therefore, it can be used in many electronic business applications (Chao-Wen Chan and Yi-Da Wu, 2008). The Manual Encryption is a technique that will involve the use of encryption software. In this computer programs are used for encrypt various bits of information digitally. In this technique the encryption key is provided later in the process. The main security issues are the potential leakage through security insensible program and also the bad implementation may lead to re-encrypt with same key for same password (Bruice Schneier, 2007). Transparent Encryption is another type of computer software encryption. In this technique the data can be downloaded onto a computer to encrypt automatically. Every executable application and file created in the computer has an encrypted copy that can withstand power surges and protects information in case a computer is stolen. The security issues is the data which is automatically encrypted can be taken if the key provided is known (Cetin K. Koc, David Naccache and Christof Paar, 2001). The Symmetric Encryption is in which a letter or number coincides with another letter or number in the encryption code. This technique is commonly referred to as secret-key encryption. In this only single key is used for e ncrypting an