Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Framework for Visual Cryptographic based Encryption and Decryption

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Saumya Awasthi, Ajay Pratap, Romesh Srivastava

Saumya Awasthi, Ajay Pratap and Romesh Srivastava. Framework for Visual Cryptographic based Encryption and Decryption. International Journal of Computer Applications 163(3):17-20, April 2017. BibTeX

	author = {Saumya Awasthi and Ajay Pratap and Romesh Srivastava},
	title = {Framework for Visual Cryptographic based Encryption and Decryption},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2017},
	volume = {163},
	number = {3},
	month = {Apr},
	year = {2017},
	issn = {0975-8887},
	pages = {17-20},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017913485},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In this paper, main focus is on the development of an encryption-decryption framework using some object oriented language and its development. The environmental analysis is done with the help of various types of UML diagrams and then its framework for implementation is designed. Basically, object-oriented analysis (OOA) and object-oriented design (OOD) methodologies examine the problem in the real world and facilitate in decomposing the problem in terms of classes, and some relationships between classes. A framework for implementation of visual cryptography based on encryption and decryption is presented and implemented. Target image is converted into black & white image and one digitized image, after that both are send to user site separately. Decryption is performed by the overlapping of these two images.


  1. Naor, M., and Shamir, A.(1995), Visual cryptography, in “Advances in Cryptology Eurocrypt „94”(A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp.112, Springer, Berlin.
  2. G. Ateniese, C. Blundo, A. De Santis, D.R.Stinson, “Visual Cryptography for General Access Structures”, Proc. ICALP96, Springer, Berlin, 1996,pp 416-428
  3. Chang-Chou Lin, Wen-Hsaing Tsai, “Visual Cryptography for Gray Level Images by Dithering Techniques”, Pattern Recognition Letters, v.24n.1-3.
  4. Nakajima, M. and Yamaguchi, Y., “Extended Visual Cryptography for Natural Images”. Journal of WSCG. v10 i2.303-310.
  5. Wang, R.Z.[Ran-Zan], “Region Incrementing Visual Cryptography”. SP Letters(16), No. 8, 2009, pp 659-662.
  6. Shyu, Huang, Lee, Wang, Chen, Elsevier, Science Direct, The Journal of the Pattern Recognition, 2007, pp 3633-3651.
  7. Seema Rani, Naveen Kumar, Journal of Innovation in Computer Science and Engineering, “Visual Cryptography for Image Secure Shares”, Vol. 4(1), Jul – Dec 2014 @ ISSN 2278-0947, pp 37-41
  8. S. Halevy and P. Roadway, A tweak able enciphering mode, in Lecture Notes in Computer Science, D. Bone, Ed. Berlin, Germany: Springer-Vela, 2003, vol. 2729, pp. 482-499.
  9. P. Sarkar, Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions.
  10. Vrinda A, Mr. Arun Anoop M, “Securing Images using Encryption Techniques”, International Journal of Computing and Technology, Volume 1, Issue 2, March 2014.
  11. Aman Jain, Namita Tiwari, Madhu Shandilya, “Image Based Encryption Techniques”, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014.
  12. Mohammad Sajid Qamruddin Khizrai , Prof.S.T.Bodkhe , ”Image Encryption using Different Techniques for High Security Transmission over a Network”, International Journal of Engineering Research and General Science, Volume 2, Issue 4, June-July, 2014.
  13. Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, and Guorui Feng, “Compressing Encrypted Images With Auxiliary Information”, IEEE transactions on multimedia, vol. 16, no. 5, august 2014.


Visual Cryptography, Gray Scale Image, Image digitization