Skip to main content

2017 | OriginalPaper | Buchkapitel

Color Image Visual Cryptography Scheme with Enhanced Security

verfasst von : Prachi Khokhar, Debasish Jena

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Image encryption is one of the most promising fields of research in the conventional scientific society. Visual cryptography is a secured encryption technique which is used to encrypt a secret image based on share generation and superimposition rather than computing. This overcomes the burden of computation but the mammoth risk of attackers is superfluous to the passing of shares in sequence through the communication channel. However, this superimposing problem can be resolved by cracking some additional encryption algorithms alongside the visual cryptography. In this paper, we propose a highly secured visual cryptography scheme which uses encryption and error diffusion halftoning algorithms as intermediate steps in cryptography work. We have also done the comparative analysis in order to select the most optimum technique, among the available algorithms according to the requirement of the system. The proposed work has been tested on various formats of standard color images of varied resolutions and proven more secured than contemporary techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Naor, M. and Shamir, A., 1995. Visual cryptography. In Advances in Cryptology—EUROCRYPT’94 (pp. 1–12). Springer Berlin/Heidelberg. Naor, M. and Shamir, A., 1995. Visual cryptography. In Advances in Cryptology—EUROCRYPT’94 (pp. 1–12). Springer Berlin/Heidelberg.
2.
Zurück zum Zitat Naor, M. and Shamir, A., 1996, April. Visual cryptography II: Improving the contrast via the cover base. In Security protocols (pp. 197–202). Springer Berlin Heidelberg. Naor, M. and Shamir, A., 1996, April. Visual cryptography II: Improving the contrast via the cover base. In Security protocols (pp. 197–202). Springer Berlin Heidelberg.
3.
Zurück zum Zitat Lin, S.J. and Lin, J.C., 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition, 40(12), pp. 3652–3666. Lin, S.J. and Lin, J.C., 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition, 40(12), pp. 3652–3666.
4.
Zurück zum Zitat Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R., 1996. Visual cryptography for general access structures. Information and Computation, 129(2), pp. 86–106. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R., 1996. Visual cryptography for general access structures. Information and Computation, 129(2), pp. 86–106.
5.
Zurück zum Zitat Blundo, C., De Santis, A. and Naor, M., 2000. Visual cryptography for grey level images. Information Processing Letters, 75(6), pp. 255–259. Blundo, C., De Santis, A. and Naor, M., 2000. Visual cryptography for grey level images. Information Processing Letters, 75(6), pp. 255–259.
6.
Zurück zum Zitat Leung, B.W., Ng, F.Y. and Wong, D.S., 2009. On the security of a visual cryptography scheme for color images. Pattern Recognition, 42(5), pp. 929–940. Leung, B.W., Ng, F.Y. and Wong, D.S., 2009. On the security of a visual cryptography scheme for color images. Pattern Recognition, 42(5), pp. 929–940.
7.
Zurück zum Zitat Hsu, C.S. and Tu, S.F., 2008. Digital watermarking scheme with visual cryptography. IMECS, Hong Kong (March 2008). Hsu, C.S. and Tu, S.F., 2008. Digital watermarking scheme with visual cryptography. IMECS, Hong Kong (March 2008).
8.
Zurück zum Zitat Jena, D. and Jena, S.K., 2009, January. A Novel Visual Cryptography Scheme. In Advanced Computer Control, 2009. ICACC’09. International Conference on (pp. 207–211). IEEE. Jena, D. and Jena, S.K., 2009, January. A Novel Visual Cryptography Scheme. In Advanced Computer Control, 2009. ICACC’09. International Conference on (pp. 207–211). IEEE.
9.
Zurück zum Zitat Kandar, S. and Dhara, B.C., 2011. kn Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. IJCA (0975–8887) Volume. Kandar, S. and Dhara, B.C., 2011. kn Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. IJCA (0975–8887) Volume.
10.
Zurück zum Zitat Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognition, 36(7), pp. 1619–1629. Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognition, 36(7), pp. 1619–1629.
11.
Zurück zum Zitat Bani, Y., Majhi, D.B. and Mangrulkar, R.S., 2008. A Novel Approach for Visual Cryptography Using a Watermarking Technique. In Proceedings of 2nd National Conference, IndiaCom (pp. 08–09). Bani, Y., Majhi, D.B. and Mangrulkar, R.S., 2008. A Novel Approach for Visual Cryptography Using a Watermarking Technique. In Proceedings of 2nd National Conference, IndiaCom (pp. 08–09).
12.
Zurück zum Zitat Fang, L. and Yu, B., 2006, August. Research on pixel expansion of (2, n) visual threshold scheme. In Pervasive Computing and Applications, 2006 1st International Symposium on (pp. 856–860). IEEE. Fang, L. and Yu, B., 2006, August. Research on pixel expansion of (2, n) visual threshold scheme. In Pervasive Computing and Applications, 2006 1st International Symposium on (pp. 856–860). IEEE.
13.
Zurück zum Zitat Chang, C.C., Hwang, M.S. and Chen, T.S., 2001. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), pp. 83–91. Chang, C.C., Hwang, M.S. and Chen, T.S., 2001. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), pp. 83–91.
14.
Zurück zum Zitat Han, Y., Dong, H., He, W. and Liu, J., 2012, November. A verifiable visual cryptography scheme based on XOR algorithm. In Communication Technology (ICCT), 2012 IEEE 14th International Conference on (pp. 673–677). IEEE. Han, Y., Dong, H., He, W. and Liu, J., 2012, November. A verifiable visual cryptography scheme based on XOR algorithm. In Communication Technology (ICCT), 2012 IEEE 14th International Conference on (pp. 673–677). IEEE.
15.
Zurück zum Zitat Tan, X.Q., 2009, May. Two kinds of ideal contrast visual cryptography schemes. In 2009 International Conference on Signal Processing Systems (pp. 450–453). IEEE. Tan, X.Q., 2009, May. Two kinds of ideal contrast visual cryptography schemes. In 2009 International Conference on Signal Processing Systems (pp. 450–453). IEEE.
16.
Zurück zum Zitat Chandramathi, S., Ramesh Kumar, R., Suresh, R. and Harish, S., 2010. An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, pp. 0976–0466. Chandramathi, S., Ramesh Kumar, R., Suresh, R. and Harish, S., 2010. An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, pp. 0976–0466.
17.
Zurück zum Zitat Yan, W.Q., Jin, D. and Kankanhalli, M.S., 2004, May. Visual cryptography for print and scan applications. In Circuits and Systems, 2004. ISCAS’04. Proceedings of the 2004 International Symposium on (Vol. 5, pp. V-572). IEEE. Yan, W.Q., Jin, D. and Kankanhalli, M.S., 2004, May. Visual cryptography for print and scan applications. In Circuits and Systems, 2004. ISCAS’04. Proceedings of the 2004 International Symposium on (Vol. 5, pp. V-572). IEEE.
18.
Zurück zum Zitat Kaur, K. and Khemchandani, V., 2013, February. Securing Visual Cryptographic shares using Public Key Encryption. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 1108–1113). IEEE. Kaur, K. and Khemchandani, V., 2013, February. Securing Visual Cryptographic shares using Public Key Encryption. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 1108–1113). IEEE.
19.
Zurück zum Zitat Desiha, M. and Kaliappan, V.K., 2015, January. Enhanced efficient halftoning technique used in embedded extended visual cryptography strategy for effective processing. In Computer Communication and Informatics (ICCCI), 2015 International Conference on (pp. 1–5). IEEE. Desiha, M. and Kaliappan, V.K., 2015, January. Enhanced efficient halftoning technique used in embedded extended visual cryptography strategy for effective processing. In Computer Communication and Informatics (ICCCI), 2015 International Conference on (pp. 1–5). IEEE.
20.
Zurück zum Zitat Pub NF. 197: Advanced Encryption Standard (AES), Federal Information ProcessingStandards Publication 197, US Department of Commerce/NIST, November 26, 2001. Available from the NIST website. Pub NF. 197: Advanced Encryption Standard (AES), Federal Information ProcessingStandards Publication 197, US Department of Commerce/NIST, November 26, 2001. Available from the NIST website.
Metadaten
Titel
Color Image Visual Cryptography Scheme with Enhanced Security
verfasst von
Prachi Khokhar
Debasish Jena
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_27

Premium Partner