CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure Visual Cryptographic Scheme based on Two Level Sharing

by Urvashi Yadav, Nisheeth Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 4
Year of Publication: 2014
Authors: Urvashi Yadav, Nisheeth Saxena
10.5120/18509-9581

Urvashi Yadav, Nisheeth Saxena . A Secure Visual Cryptographic Scheme based on Two Level Sharing. International Journal of Computer Applications. 106, 4 ( November 2014), 24-29. DOI=10.5120/18509-9581

@article{ 10.5120/18509-9581,
author = { Urvashi Yadav, Nisheeth Saxena },
title = { A Secure Visual Cryptographic Scheme based on Two Level Sharing },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 4 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number4/18509-9581/ },
doi = { 10.5120/18509-9581 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:31.381376+05:30
%A Urvashi Yadav
%A Nisheeth Saxena
%T A Secure Visual Cryptographic Scheme based on Two Level Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 4
%P 24-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography allows the information to be encrypted using an encoding system. It does not require a computer to decode. Two transparent images are used in Visual Cryptography. One image contains the secret information and the other image contains random pixels. It is impossible to reveal the secret information from one of the images as both transparent images are required to retrieve the information. In this paper, we are working on the security of visual cryptography. Here we purpose a new scheme called three level sharing. In this case, we enhance the security of an image by dividing into shares and then after sub shares. For this purpose, stamping algorithm is used.

References
  1. M. Naor, A. Shamir, in: A. De Santis (Ed. ), "Visual Cryptography, Advances in Cryptology: Eurpocrypt'94", Lecture Notes in Computer Science, Vol. 950, Springer, Berlin, 1995.
  2. Shamir, "How to share a secret," Common. ACM, vol. 22, no. 11, pp. 612–613, 1979.
  3. R Yadagiri Rao Secure Visual Cryptography , International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 1 Jan 2013 Page No. 265-303.
  4. Juby Justin1 and Giss George, An Extended Color Visual Cryptography Algorithm for General Access Structures International Journal for Advance Research in Engineering and Tecnology,2013.
  5. Quist-Aphetsi Kester, MIEEE, A Visual Cryptographic Encryption Technique for Securing Medical Images, International Journal of Emerging Technology and Advanced Engineering Website: www. ijetae. com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 6, June (2013) 496.
  6. Neha Chhabra, Visual Cryptographic Steganography in Images, IJCSNS International Journal of Computer Science and Network Security, VOL. 12 No. 4, April 2012 , Manuscript received April 5, 2012 Manuscript revised April 20, 2012.
  7. Jagdeep Verma, Dr. Vineeta Khemchandani, A Visual Cryptographic Technique to Secure Image Shares, Jagdeep Verma, Dr. Vineeta Khemchandani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www. ijera. com Vol. 2, Issue 1,Jan-Feb 2012, pp. 1121-1125 1121.
  8. Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang, "Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding", Journal of Computers, Vol. 3, No. 12, December 2008.
  9. Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli, "Visual Cryptography for Print and Scan Applications", Circuits and Systems, ISCAS, Proceedings of the 2004 International Symposium on (Volume: 5), 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Stamping Algorithm Pixel Sharing Security images