We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Hiding Medical Information of Patient through Image by Recursive Visual Cryptography

by Varolia Jesalkumari Sagar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 154 - Number 9
Year of Publication: 2016
Authors: Varolia Jesalkumari Sagar
10.5120/ijca2016912205

Varolia Jesalkumari Sagar . Hiding Medical Information of Patient through Image by Recursive Visual Cryptography. International Journal of Computer Applications. 154, 9 ( Nov 2016), 40-43. DOI=10.5120/ijca2016912205

@article{ 10.5120/ijca2016912205,
author = { Varolia Jesalkumari Sagar },
title = { Hiding Medical Information of Patient through Image by Recursive Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 154 },
number = { 9 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume154/number9/26523-2016912205/ },
doi = { 10.5120/ijca2016912205 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:59:50.697796+05:30
%A Varolia Jesalkumari Sagar
%T Hiding Medical Information of Patient through Image by Recursive Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 154
%N 9
%P 40-43
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces recursively hiding patient’s information using XOR based Recursive Visual Cryptography. The XOR based Visual Cryptography Scheme (VCS) encodes a secret image of data into several shares which are not understood by intruders individually. Here (2, 2) VCS is considered for paper. Its pixel expansion has more columns then original and same number of rows but the image quality is good when it is decoded than traditional VCS. The proposed method is using concept of stereography as many information can be hidden in an image using recursive Visual Cryptography.

References
  1. Naor, M. and Shamir, A. 1995. Visual Cryptography. Advances in Cryptography-Eurocrypt, 950: 1-12.
  2. Gnanaguruparan, M. and Kak, S. 2002. Recursive Hiding of Secrets in Visual Cryptography. Cryptologia 26: 68-76.
  3. D. Q. Viet and K. Kurosawa, “Almost ideal contrast visual cryptography with reversing,” Topics in Cryptology—CT-RSA,pp. 353–365, 2004.
  4. E. Biham and A. Itzkovitz, “Visual cryptography with polarization,” in RUMP Session of CRYPTO’98, 1997.
  5. G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, “Visual cryptography for general access structures”, Information and Computation 129 (1996), 86-106.
  6. M. Naor and A. Shamir, “Visual cryptography II: improving the constrast via the cover base, in Security Protocols", M. Lomas, ed., Lecture Notes in Computer Science 1189 (1997), 197-202.
  7. M. Naor and A. Shamir, Visual cryptography, in "Advances in Cryptology { EUROCRYPT '94", A.De Santis, ed., Lecture Notes in Computer Science 950 (1995), 1-12.
  8. P.S.Revenkar, Anisa Anjum, W .Z.GandhareGovernment College of Engineering, Aurangabad, M.S., India“Survey of Visual Cryptography Schemes” International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010.
  9. W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, technical report TR001001, Florida State University (2000).
  10. R. Gonzalez and R. Woods, Digital Image Processing using MATLAB, Fourth Impression, 2008.
  11. Kai-Hui Lee and Pei-Ling Chiu “An Extended Visual Cryptography Algorithm for General Access Structures” - IEEE transactions on information forensics and security, vol. 7, no. 1, february 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Image decomposition superimpose Pixel Expansion