CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking

by Amit Kumar Rathore, Anurag Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 10
Year of Publication: 2017
Authors: Amit Kumar Rathore, Anurag Jain
10.5120/ijca2017914037

Amit Kumar Rathore, Anurag Jain . A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking. International Journal of Computer Applications. 165, 10 ( May 2017), 44-48. DOI=10.5120/ijca2017914037

@article{ 10.5120/ijca2017914037,
author = { Amit Kumar Rathore, Anurag Jain },
title = { A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 10 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number10/27613-2017914037/ },
doi = { 10.5120/ijca2017914037 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:09.388833+05:30
%A Amit Kumar Rathore
%A Anurag Jain
%T A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 10
%P 44-48
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a furtive distribution scheme where a screte image is encrypted into the shares which independently make known no information concerning the secret original image. The attractiveness of the visual surreptitious distribution method is its decryption progression i.e. to decrypt the surreptitious image using human visual scheme be deficient to any calculation or no need of any computational devices. By using this special characteristic property anyone doesn’t need any type of computational devices to recognize the secret image during the decryption process, VC is suited to be used in the environment which has no computational device. There are many researchers who have faithful themselves to study the related issues of Visual Cryptography because of its special property. The existing methodology implemented for the Representation of Visual Cryptography Algorithms is on the basis of efficient encryption of Images as compared to other encryption procedures such as AES, DES etc. Here an efficient technique is implemented by using the combinatorial method of mosiacing the image and then applying spread spectrum for the water marking of secrete information thrashing and applying an effective cryptography algorithm.

References
  1. Moni Naor and Adi Shamir. Visual cryptography. EUROCRYPT, pages 1{12, 1994.
  2. J. Urquiza-Fuentes and J.A. Ve azquez-Iturbide, “A survey of successful evaluations of program visualization and algorithm animation systems,” ACM Trans. Comput. Educ., vol. 9, no. 2, article 9, pp. 1–24, Jun. 2009.
  3. D. Schweitzer and W. Brown, “Interactive visualization for the active learning classroom,” ACM SIGCSE Bull., vol. 39, no. 1, pp. 208–212, Mar. 2007.
  4. C. A. Shaffer,M. L. Cooper, A. J. D. Alon,M. Akbar,M. Stewart, S. Ponce, and S. H. Edwards, “Algorithm visualization: The state of the field,” ACM Trans. Comput. Educ., vol. 10, no. 3, article 9, pp. 1–22, Aug. 2010.
  5. C. D. Hundhausen, S. A. Douglas, and J. T. Stasko, “A meta-study of algorithm visualization effectiveness,” J. Vis. Languages Comput., vol. 13, no. 3, pp. 259–290, Jun. 2002.
  6. Zarko Stanisavljevic, Jelena Stanisavljevic, Pavle Vuletic, and Zoran Jovanovic, “COALA-System for Visual Representation of Cryptography Algorithms” IEEE Transactions On Learning Technologies, Vol. 7, No. 2, April-June 2014.
  7. Kun-Yuan Chao, Ja-Chen Lin,”(2, 3)-threshold visual cryptography for color images”, Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry & Artificial Vision, Elounda, Greece, August 21-23, 2006 (pp89-94).
  8. D. Schweitzer and L. Baird, “The design and use of interactive visualization applets for teaching ciphers,” in Proc. IEEE Inf. AssuranceWorkshop, Jun. 2006, pp. 69–75.
  9. J. Tao, J. Ma, J. Mayo, C. K. Shene, and M. Keranen, “DESvisual: A visualization tool for the DES cipher,” J. Comput. Sci. Colleges, vol. 27, no. 1, pp. 81–89, 2011.
  10. Jainthi.k, Prabhu.P ,”A novel cryptographic technique that emphasis visual quality and efficieny by floyd steinberg error diffusion method”,International Journal of Research in Engineering and Technology, eISSN: 2319-1163 pISSN: 2321-7308,Volume: 04, Issue: 02 Feb-2015.
  11. M.Karolin, Dr.T.Meyyapan,”RGB based secret sharing scheme in color visual cryptography”,International Journal of Advanced Research in Computer and Communication Engineering, ISSN : 2278-1021,Vol. 4, Issue 7, July 2015.
  12. Prabir Kr. Naskar, Ayan Chaudhuri, Atal Chaudhuri,” Image Secret Sharing Scheme Using a Novel Secret Sharing Technique with Steganography”, IEEE CASCOM , pp 62-65, Nov. 27, 2010.
  13. Shiny Malar F.R, Jeya Kumar M.K,” Error Filtering Schemes for Color Images in Visual Cryptography”, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Mosaic Images Spread Spectrum Technique Watermarking Stenography