Skip to main content
Top

2016 | OriginalPaper | Chapter

K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement

Authors : Ashish Sharma, Devesh Kumar Srivastava

Published in: Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Visual cryptography is a method offering a plan which uses pictures circulated as shares in such a way that when the shares are stacked, a sensitive or secrete image is uncovered. According to extended visual cryptography, the offer pictures are built to hold the scattered images together, simultaneously opening a way to assist biometric security and visual cryptography methods. In this paper, we entail a proposal for halftone pictures that beautify the nature of the shares to come about from secrete image and to regain the secret picture in an extended visual cryptography plan for which the figure size of the secret pictures and the reconstructed picture by stacking shares is similar with respect to the first halftone secret picture. The ensuing plan upholds the ideal security of the first developed visual cryptography approach. This process includes 2 × 2 block replacement for generating shares from secrete image.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94 Proceedings, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995) Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94 Proceedings, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995)
2.
go back to reference Ross, A., Othman, A.A.: Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)CrossRef Ross, A., Othman, A.A.: Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)CrossRef
3.
go back to reference Askari, N., Moloney, C., Heys, H.M.: A Novel Visual Secret Sharing Scheme Without Image Size Expansion. In: IEEE Canadian Conference on Electrical and ComputerEngineering (CCECE), Montreal, pp. 1–4 (2012) Askari, N., Moloney, C., Heys, H.M.: A Novel Visual Secret Sharing Scheme Without Image Size Expansion. In: IEEE Canadian Conference on Electrical and ComputerEngineering (CCECE), Montreal, pp. 1–4 (2012)
4.
go back to reference Hwang, K.F., Chang, C.C.: Recent Development of Visual Cryptography, Intelligent Watermarking Techniques, pp. 459–480. World Scientific Publishing Company (2004) Hwang, K.F., Chang, C.C.: Recent Development of Visual Cryptography, Intelligent Watermarking Techniques, pp. 459–480. World Scientific Publishing Company (2004)
5.
go back to reference Stinson, D.: Visual cryptography and threshold schemes. Dr. Dobb’s J. 36–43 (1998) Stinson, D.: Visual cryptography and threshold schemes. Dr. Dobb’s J. 36–43 (1998)
6.
go back to reference BorkoFurht, EdinMuharemagic, Socek, Daniel: Visual and Audio Secret Sharing, pp. 163–192. Multimedia Encryption and Watermarking, Springer (2005) BorkoFurht, EdinMuharemagic, Socek, Daniel: Visual and Audio Secret Sharing, pp. 163–192. Multimedia Encryption and Watermarking, Springer (2005)
7.
go back to reference Zhou, Z., Arce, G.R., Crescenzo, G.Di.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 8 (2006) Zhou, Z., Arce, G.R., Crescenzo, G.Di.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 8 (2006)
8.
go back to reference Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Joint Screening Halftoning and VisualCryptography for Image Protection. LNCS 4283, pp. 212–225. Springer, Berlin (2006) Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Joint Screening Halftoning and VisualCryptography for Image Protection. LNCS 4283, pp. 212–225. Springer, Berlin (2006)
9.
go back to reference Walden, D.E.: A Benchmarking Assessment of Known Visual Cryptography algorithms. B.S.M.E. Thesis, Chester F. Carlson Center for Imaging Science Rochester Institute of Technology, Valparaiso University, New York, 16 May 2012 Walden, D.E.: A Benchmarking Assessment of Known Visual Cryptography algorithms. B.S.M.E. Thesis, Chester F. Carlson Center for Imaging Science Rochester Institute of Technology, Valparaiso University, New York, 16 May 2012
10.
go back to reference Horng, G., Chen, T., Tasi, D.S.: Cheating in Visual Cryptography, Designs, Codes and Cryptography, pp. 219–236 (2006) Horng, G., Chen, T., Tasi, D.S.: Cheating in Visual Cryptography, Designs, Codes and Cryptography, pp. 219–236 (2006)
11.
go back to reference Shih, F.Y.: Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, Taylor & Francis Group (2008) Shih, F.Y.: Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, Taylor & Francis Group (2008)
12.
go back to reference Yang, C.-N., Yang, Y.-Y., Chen, T.-S., Ye, G.-C.: New steganography scheme in halftone images. In: Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1520–1523 (2008) Yang, C.-N., Yang, Y.-Y., Chen, T.-S., Ye, G.-C.: New steganography scheme in halftone images. In: Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1520–1523 (2008)
13.
go back to reference S., Cimato, De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters 93(4), 199–206 (2005) S., Cimato, De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters 93(4), 199–206 (2005)
14.
go back to reference Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptology: Eurocrypt’94, pp. 1–12. Spring, Berlin, Germany (1995) Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptology: Eurocrypt’94, pp. 1–12. Spring, Berlin, Germany (1995)
15.
go back to reference Lin, C.-C., Tsai, W.-H.: Viaual Cryptography for Gray-Level Images the 13th IPPR Conference on Computer Vision, Graphic and Image processing, pp. 221–226 (2000) Lin, C.-C., Tsai, W.-H.: Viaual Cryptography for Gray-Level Images the 13th IPPR Conference on Computer Vision, Graphic and Image processing, pp. 221–226 (2000)
16.
go back to reference Ateniese, Giuseppe, Blundo, Carlo, De Santis, Alfredo, Stinson, Douglas R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefMATH Ateniese, Giuseppe, Blundo, Carlo, De Santis, Alfredo, Stinson, Douglas R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefMATH
17.
go back to reference Naor, M., Shamir, A.:Visual cryptography. In: Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in ComputerScience, vol. 950, p. 112 (1995) Naor, M., Shamir, A.:Visual cryptography. In: Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in ComputerScience, vol. 950, p. 112 (1995)
18.
go back to reference Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefMATH Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefMATH
19.
go back to reference Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2451 (2006)CrossRef Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2451 (2006)CrossRef
20.
go back to reference Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: Proceedings of WSCG, pp. 303–310 (2002) Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: Proceedings of WSCG, pp. 303–310 (2002)
Metadata
Title
K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement
Authors
Ashish Sharma
Devesh Kumar Srivastava
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2638-3_58