CFP last date
22 April 2024
Reseach Article

An Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique in Visual Cryptography

by I. Diana Judith, G.J. Joyce Mary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 7
Year of Publication: 2016
Authors: I. Diana Judith, G.J. Joyce Mary
10.5120/ijca2016909952

I. Diana Judith, G.J. Joyce Mary . An Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique in Visual Cryptography. International Journal of Computer Applications. 142, 7 ( May 2016), 40-46. DOI=10.5120/ijca2016909952

@article{ 10.5120/ijca2016909952,
author = { I. Diana Judith, G.J. Joyce Mary },
title = { An Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique in Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 7 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number7/24912-2016909952/ },
doi = { 10.5120/ijca2016909952 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:44:23.572436+05:30
%A I. Diana Judith
%A G.J. Joyce Mary
%T An Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique in Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 7
%P 40-46
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As there is rapid growth in the digital world, security becomes a major concern for data transmission using image techniques. Visual cryptography (VC) is recent technology in the cryptographic scheme, which is utilized them secret images to be shared securely and also its data is preserved with higher confidentiality. In general, when sender the forwards the secret images which is split into several images and keeps its hidden data in it, so when all the distributed images are aligned and stacked unitedly, they incline to exhibit the secret image data to the receiver. Previous visual cryptography technology, privacy of the share images is not preserved because of the other duplicate shares which can so easily alter or insert some other images, it remains to be the major challenge in the VC. The shared images are obtained by using the basic knowledge of visual (2,2) scheme. To overcome those kind of security issues, we propose the advance halftone secure secret sharing scheme with error diffusion techniques in the visual cryptography. At first, the visible images is translated into halftones shares by employing halftone error diffusion scheme. Next, the secret image is converted into halftone shares containing efficient visual information. Thus the shared images are disseminated to particular participants and then they are extremely enforced to reveal the secret images. When the shares are generated, it is uses the halftone processing, which first the encryption the images with high quality secret images and then decryption the secret images with same image quality by using diffusion methodology with high quality images. Form the experimental results, it is illustrated that the secret images have very minimum error difference, secret images data is highly impossible to be retrieved by fraudulent shares. Thus the proposed method a provides higher security with quality secret images for the encryption and decryption of the images, which contains fast execution, accuracy and minimum error value.

References
  1. M. Naor and A.Shamir. (1995). Visual Cryptography ”,Advances in cryptography EUROCRYFT94, LNCS, vol-950, pp.1-12, 1995.
  2. J. Fridrich, M. Goljan, and D. Rui. (2002). Lossless Data Embedding - New Paradigm in Digital Watermarking. In Special Issue on Emerging Applications of Multimedia Data Hiding: February; Vol. 2; pp. 185-196.
  3. Mahmoud E. Hodeish,V. T. Humbe. (2014). “State-of-the-Art Visual Cryptography Schemes,” International Journal of Electronics Communication and Computer Engineering, vol. 5, pp. 412-420.
  4. Srinivasan nagara, Raju and Koteswara rao. (2015). Image encryption using ECC and Matrix. In proceedings of Intelligent computing, Communication 7 Convergence 2015;48:276-281
  5. G.R Zhi Zhou Arce., G. Di Crescenzo. (2006). “Halftone Visual Cryptography,” IEEE Transactions on Image Processing. , Vol. 15, pp. 2441-2453.
  6. R. Lukac, K.N. Plataniotis. (2005). Bit-level based secret sharing for image encryption. The Journal of Pattern Recognition Society.
  7. R. Vijayaraghavan, S. Sathya, N. R. Raajan. (2014). Security for an Image using Bit-slice Rotation Method–image Encryption. Indian Journal of Science and Technology:April 2014;Vol 7(4S); p 1–7.
  8. Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su. (2006). Reversible Data Hiding. IEEE transactions on circuits and systems for video technology: March; vol. 16, no. 3.
  9. Asha S.N, Dr. Shreedhara. (2012). Performance Evaluation Of Extended Visual Cryptography Schemes With Embedded Extended Visual Cryptographic Scheme. International Journal of Scientific & Engineering Research: April; Volume 3, Issue 4.
  10. InKoo Kang, Gonzalo R. Arce, Heung-Kyu Lee. (2009).Color extended visual cryptography using error diffusion. IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Advance Halftone Error Diffusion Secret Sharing Scheme High Quality and Visual Cryptography.