CFP last date
22 April 2024
Reseach Article

Improved the Security Strength of Visual Cryptography using Feature based Watermarking Technique

by Sandeep Singh Baghel, Ajay Goyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 11
Year of Publication: 2016
Authors: Sandeep Singh Baghel, Ajay Goyal
10.5120/ijca2016912192

Sandeep Singh Baghel, Ajay Goyal . Improved the Security Strength of Visual Cryptography using Feature based Watermarking Technique. International Journal of Computer Applications. 153, 11 ( Nov 2016), 9-13. DOI=10.5120/ijca2016912192

@article{ 10.5120/ijca2016912192,
author = { Sandeep Singh Baghel, Ajay Goyal },
title = { Improved the Security Strength of Visual Cryptography using Feature based Watermarking Technique },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 11 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number11/26446-2016912192/ },
doi = { 10.5120/ijca2016912192 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:50.980296+05:30
%A Sandeep Singh Baghel
%A Ajay Goyal
%T Improved the Security Strength of Visual Cryptography using Feature based Watermarking Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 11
%P 9-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data integrity and confidentiality is major issue in internet based communication. For the integrity and confidently used various cryptography and stenography technique. The traditional message hiding technique faced a problem of intruder. The intruder easily decrypts the image and gets information. For the improvement of security strength used various key cryptography technique for hiding of information. In consequence of data hiding visual cryptography is another milestone. The process of visual cryptography used technique of share generation for the authentication of image. The process of share generation used mathematical formula and derivations. In this paper proposed feature based watermarking technique for visual cryptography. The feature based process used two feature property of image, color and texture feature. The color feature property generates a key value and texture feature property generates the value of share for the visual cryptography. The proposed method is simulated in MATLAB software and applies some geometrical attack for the measuring of security strength.

References
  1. Young-Chang Hou, Shih-Chieh Wei, and Chia-Yin Lin “Random-grid-based Visual Cryptography Schemes” IEEE, 2013, Pp 1-12.
  2. Kai-Hui Lee and Pei-Ling Chiu “Sharing Visual Secrets in Single Image Random Dot Stereogram’s” IEEE, 2014, Pp 4336-4348.
  3. Xiaotian Wu, Duanhao Ou, Lu Dai, Wei Sun “XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids” IH&MMSec, 2013, Pp 181-191.
  4. Gayathri Soman, Mr. Jyothish K John “Secure Digital Image Sharing Using Diverse Image Media” IJIACS, 2015, Pp 154-161.
  5. Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarka, Pp 98-113
  6. Juby Justin and Giss George “An Extented Vesual Cryptography algorithm for general Access Structures”, ijaret, 2013, Pp 1-4.
  7. Anran Wang, Shuai Ma, Chunming Hu, Jinpeng Huai, Chunyi Peng, Guobin Shen “Enhancing Reliability to Boost the Throughput over Screen-Camera Links”, IEEE, 2013, Pp 1-12.
  8. Bharanivendhan N and Amitha T “Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm”, International Journal of Computer Applications, 2014, Pp 11-16.
  9. Jun Kong, Omer Barkol, Ruth Bergman, Ayelet Pnueli, Sagi Schein, Kang Zhang, and Chunying Zhao “Web Interface Interpretation Using Graph Grammars” IEEE, 2012, Pp 590-602.
  10. Sian-Jheng Lin, Shang-Kuan Chen and Ja-Chen Lin “Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion”, Elsevier, 2010, Pp 900-916.
  11. Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad “Mobile Phone Sensing Systems: A Survey”, IEEE, 2013, Pp 402-427.
  12. J. Galbally “Biometric Antispoofing Methods: A Survey in Face Recognition”, IEEE, 2015, Pp 1530-1552.
  13. Snehal N. Meshram and Sneha U. Bohra “Implementation of Random Grid Visual Cryptography for Color Images”, IJSR, 2013, Pp 2545-2549
  14. Er.Supriya Kinger, “Efficient Visual Cryptography”, Journal of emerging technology in web intelligent, Vol. 2, No. 2, 2010
  15. Barnali Gupta Banik and Samir Kumar Bandyopadhyay” Secret Sharing using 3 level DWT method of Image Steganography based on Lorenz Chaotic Encryption and Visual Cryptography” in International Conference on Computational Intelligence and Communication Networks 2015
Index Terms

Computer Science
Information Sciences

Keywords

Watermarking cryptography generation of Key