CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A New Simple Non-Expansion Algorithm for (2,2) - Visual Secret Sharing Scheme

by Abdul-gabbar Tarish Al-tamimi, Abdullah Gaafar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 3
Year of Publication: 2015
Authors: Abdul-gabbar Tarish Al-tamimi, Abdullah Gaafar
10.5120/19803-1592

Abdul-gabbar Tarish Al-tamimi, Abdullah Gaafar . A New Simple Non-Expansion Algorithm for (2,2) - Visual Secret Sharing Scheme. International Journal of Computer Applications. 113, 3 ( March 2015), 1-5. DOI=10.5120/19803-1592

@article{ 10.5120/19803-1592,
author = { Abdul-gabbar Tarish Al-tamimi, Abdullah Gaafar },
title = { A New Simple Non-Expansion Algorithm for (2,2) - Visual Secret Sharing Scheme },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 3 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number3/19803-1592/ },
doi = { 10.5120/19803-1592 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:58.526579+05:30
%A Abdul-gabbar Tarish Al-tamimi
%A Abdullah Gaafar
%T A New Simple Non-Expansion Algorithm for (2,2) - Visual Secret Sharing Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 3
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography (VC) is a powerful encryption technique which combines perfect secrecy and secret sharing in cryptography with respect to images. VC takes a binary image (the secret) and divides it into two or more pieces known as shares (transparencies). When the shares are superimposed, the secret can be recovered. One of the distinguishing features of VC is that it needs no computational power for decryption. All what VC needs for decryption is the human visual system (the human eye). Two main factors affect the quality of a visual cryptography scheme; the pixel expansion and the contrast. In this papers we propose a new simple non-expansion algorithm for (2,2)-visual secret sharing scheme (VSS). The shares produced by this algorithm and the reconstructed image are not expanded in size, and all have the same size as the original (secret) image. It encodes the original (secret) image a 4-pixel blockwise to 4-pixel blocks in each share.

References
  1. Thekra Abbas and Zou Beiji. A novel non-expansion visual secret sharing scheme for binary image. International Journal of Digital Content Technology and its Applications (JDCTA), 4(6):106–114, 2010.
  2. Shyamal Kumar Mondal Biswapati Jana, Gargi Hait. Survey on size invariant visual cryptography. International Journal of Computer Science and Information Technologies(IJCSIT), 5(3):3985–3990, 2014.
  3. Y. F. Chen, Y. K. Chan, C. C. Huang, M. H. Tsai, and Y. P. Chu. A multiple-level visual secret-sharing scheme without image size expansion. Information Sciences, 177(21):4696– 4710, November 2007.
  4. Young-Chang Hou. Visual cryptography for color images. Pattern Recognition, 36, 2003.
  5. Yi-Jing Huang and Jun-Dong Chang. Non-expanded visual cryptography scheme with authentication. IEEE 2nd International Symposium on Next-Generation Electronics (ISNE), February 25-26 2013.
  6. Ryo Ito, Hidenori Kuwakado, and Hatsukazu Tanaka. Image size invariant visual cryptograph. IEICE Trans. Fundam. Elect. Commun. Comput. Sci. , E82-A(10):2172–2177, 1999.
  7. Abdullah Jaafar and Azman Samsudin. A survey of blackand- white visual cryptography models. International Journal of Digital Content Technology and its Applications(JDCTA), 6(15):237–249, August 2012.
  8. M. Naor and A. Shamir. Visual cryptography. In Proceeding of Advances in Cryptology EUROCRYPT'94, Lecture Notes in Computer Science, volume 950, pages 1–12. Springer-Verlag, 1995.
  9. Pooja and Dr. Lalitha Y. S. Non expanded visual cryptography for color images using pseudo-randomized authenticatio. International Journal of Engineering Research and Development, 10(6):01–08, June 2014.
  10. Ching-Lin Wang, Ching-Te Wang, and Meng-Lin Chiang. The image multiple sharing schemes without pixel expansion. In International Conference on Machine Learning and Cybernetics, volume 4, Guilin, 10-13 July 2011.
  11. Jonathan Weir and WeiQi Yan. A comprehensive study of visual cryptography. Transactions on DHMS V, LNCS, 6010, 2010.
  12. C. N. Yang. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letter, 25(4):481–494, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Pixel Non-Expansion Visual Decryption Secret Sharing