Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography

by Anjali Varshney, Dinesh Goyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 13
Year of Publication: 2014
Authors: Anjali Varshney, Dinesh Goyal
10.5120/17876-8858

Anjali Varshney, Dinesh Goyal . Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography. International Journal of Computer Applications. 102, 13 ( September 2014), 19-23. DOI=10.5120/17876-8858

@article{ 10.5120/17876-8858,
author = { Anjali Varshney, Dinesh Goyal },
title = { Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 13 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number13/17876-8858/ },
doi = { 10.5120/17876-8858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:01.828042+05:30
%A Anjali Varshney
%A Dinesh Goyal
%T Analysis and Design of Multi Share Secret Message Sharing using Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 13
%P 19-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human visual system. It is secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, the original image is revealed. In last decade Visual Cryptography has evolved as an entity which divides the data into different shares and then embedding is done. This technique is also is less secured. In this paper we propose an encryption algorithm, which is applied on the different shares of the images. Before embedding the image into the cover image, shares are also encrypted for which the size of share images and the recovered image is the same as for the original secret image. Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. The proposed scheme maintains the perfect security and the size of the original image.

References
  1. M. Naor, A. Shamir, in: A. De Santis (Ed. ), Visual Cryptography, Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Vol. 950, Springer, Berlin, 1995, pp. 1–12.
  2. H. -C. Hsu, T. -S. Chen,Y. -H. Lin, "The Ring Shadow Image Technology Of Visual Cryptography By Applying Diverse Rotating Angles To Hide The Secret Sharing", in Proceedings of the 2004 IEEE International Conferenceon Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001, March2004.
  3. H. -C. Wu, C. -C. Chang, "Sharing Visual Multi-Secrets Using Circle Shares",Comput. Stand. Interfaces 134 (28), pp. 123–135,(2005).
  4. Chin-Chen Chang, Jun-Chou Chuang, Pei-YuLin, "Sharing A Secret Two-Tone Image In Two Gray-Level Images", Proceedings of the 11th International Conferenceon Paralleland Distributed Systems (ICPADS'05), 2005.
  5. Liguo Fang, Bin Yu, "Research On Pixel Expansion Of (2,n) Visual Thres hold Scheme", 1st International Symposiumon Pervasive Computing and Applications, pp. 856-860, IEEE.
  6. C. C. Wu, L. H. Chen, "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R. O. C. , 1998.
  7. Gajanand Sharma, Amit Gupta, Dinesh Goyal, "Analysis & Design of Visual Cryptography Using Moving Image", Volume 3 No. 12, Nov -Dec 2013, ISSN 2223-4985.
  8. "A Comprehensive Study on Various Visual cryptography Schemes with an Application", Madhuri Ghuge, Prof. Kanchan Doke, Volume 4, Issue 2, February 2014, ISSN 2250-2459, ISO 9001:2008.
  9. Wen-Pinn Fang, "Visual Cryptography In Reversible Style", IEEE Proceedingon the Third International Conference on Intelligent Information Hidingand Multimedia Signal Processing (IIHMSP2007), Kaohsiung, Taiwan, R. O. C,2007.
  10. Jen-Bang Feng, Hsien-ChuWu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu, "Visual Secret Sharing For Multiple Secrets", Pattern Recognition 41, pp. 3572–3581, 2008.
  11. Mustafa Ulutas, R?fat Yaz?c?, Vasif V. Nabiyev, Güzin Ulutas, (2,2)- "Secret Sharing Scheme With Improved Share Randomness",978-1-4244-2881-6/08,IEEE,2008.
  12. Juan Zhou, Shijie Jia, "Design and Implementation of Image Hiding System Based on LSB", Computer Technology and Development, vol. 17 (05), 2007, pp. 114-116, doi: cnki: ISSN: 1673-629X. 0. 2007-05-034.
  13. S. J. Shyu, S. Y. Huanga, Y. K. Lee, R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual cryptography", Pattern Recognition, Vol. 40, Issue 12, pp. 3633-3651,2007.
Index Terms

Computer Science
Information Sciences

Keywords

TIFF secret sharing Visual Cryptography.