CFP last date
20 May 2024
Reseach Article

Halftoning by Error Diffusion Method in Visual Cryptography for Greyscale Image

by Asad Mansoori, Vijay Kumar Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 10
Year of Publication: 2016
Authors: Asad Mansoori, Vijay Kumar Joshi
10.5120/ijca2016911288

Asad Mansoori, Vijay Kumar Joshi . Halftoning by Error Diffusion Method in Visual Cryptography for Greyscale Image. International Journal of Computer Applications. 148, 10 ( Aug 2016), 44-50. DOI=10.5120/ijca2016911288

@article{ 10.5120/ijca2016911288,
author = { Asad Mansoori, Vijay Kumar Joshi },
title = { Halftoning by Error Diffusion Method in Visual Cryptography for Greyscale Image },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 10 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 44-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number10/25797-2016911288/ },
doi = { 10.5120/ijca2016911288 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:53:02.553448+05:30
%A Asad Mansoori
%A Vijay Kumar Joshi
%T Halftoning by Error Diffusion Method in Visual Cryptography for Greyscale Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 10
%P 44-50
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptography (VC) is a technique used for protecting image based secrets. The main concept of the original visual cryptography scheme is to encrypt a secret image into some shares. Secret information cannot be revealed with few shares. All shares are necessary to combine to reveal the secret image. Halftoning is the important feature of visual cryptography. It provides security at the early stage of visual cryptography. Halftoning is the reprographic techniques, whose process of converting large tone (high intensity value of pixel) image to low tone (low intensity value of pixel) image. The visual cryptography is a hide information technology. The visual cryptography uses sharing method apply for hide information. Here used the (2, 2) greyscale image method, 2 shares out of 2 stack the secret will reveal and less than 2 shares are not work. Here, proposed a modified algorithm of error-diffusion half toning in visual cryptography. Increment the quality of image by modified method according to different parameters. According to modified method, error distributed to nearest pixel. The compared author method with Floyed, Jarvis, and Stucki throw PSNR and UQI parameters. The visual secret scheme decrypts the secret image using Human Visual System (HVS) without any computation. Here, used to (2, 2) generate visual sharing system for halftone gray scale image. Here generate shares of halftone image and recovered secret image.

References
  1. C. Chang, C. Chan and W. Tai, "Hiding a halftone secret image in two camouflaged halftone images", Pattern Recognition and Image Analysis, vol. 16, no. 3, pp. 486-496, 2006.
  2. L. Dong, D. Wang, S. Li and Y. Dai, "(2,n) secret sharing scheme for gray and color images based on Boolean operation", Science China Information Sciences, vol. 55, no. 5, pp. 1151-1161, 2011.
  3. P. Sharma and H. Singh, "Visual Cryptography Scheme for Gray Scale Images based on Intensity Division", International Journal of Current Engineering and Technology, vol. 4, no. 1, pp. 225-230, 2014.
  4. Zhi Zhou, G. Arce and G. Di Crescenzo, "Halftone visual cryptography", IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2441-2453, 2006.
  5. C. Yang, P. Chen, H. Shih and C. Kim, "Aspect ratio invariant visual cryptography by image filtering and resizing", Pers Ubiquit Comput, vol. 17, no. 5, pp. 843-850, 2012.
  6. A. Kamboj and D. Gupta, "An Improved Halftone Visual Secret Sharing Scheme for Gray-Level Images Based on Error Diffusion in Forward and Backward Direction", 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015.
  7. E. Abdelsatir, S. Salahaldeen, H. Omar and A. Hashim, "A Novel (K,N) Secret Sharing Scheme from Quadratic Residues for Grayscale Images", International Journal of Network Security & Its Applications, vol. 6, no. 4, pp. 65-72, 2014.
  8. A. Mishra and A. Gupta, "Visual Cryptography For Gray Scale Image Using Block Replacement Half Toning Method", IEEE, vol. 6, no. 4, pp. 50-54, 2013.
  9. InKoo Kang, G. Arce and Heung-Kyu Lee, "Color Extended Visual Cryptography Using Error Diffusion", IEEE Transactions on Image Processing, vol. 20, no. 1, pp. 132-145, 2011.
  10. R. Jha, "Boolean Xor Based (K, N) Threshold Visual Cryptography for Grayscale Images”, International Journal of Computer Science Issues (IJCSI), vol. 23, pp. 42-45, 2012.
  11. S. Katta, "Visual Secret Sharing Scheme using Grayscale Images", Cornell University Library, vol. 1, no. 1, p. 6, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Halftone Error-Diffusion Shares PSNR UQI