CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Binary Image Visual Cryptography

by Yaseen Hikmat Ismaiel, Muna Mahmood Khether
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 6
Year of Publication: 2017
Authors: Yaseen Hikmat Ismaiel, Muna Mahmood Khether
10.5120/ijca2017915785

Yaseen Hikmat Ismaiel, Muna Mahmood Khether . Binary Image Visual Cryptography. International Journal of Computer Applications. 177, 6 ( Nov 2017), 34-39. DOI=10.5120/ijca2017915785

@article{ 10.5120/ijca2017915785,
author = { Yaseen Hikmat Ismaiel, Muna Mahmood Khether },
title = { Binary Image Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 177 },
number = { 6 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number6/28633-2017915785/ },
doi = { 10.5120/ijca2017915785 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:45:10.457535+05:30
%A Yaseen Hikmat Ismaiel
%A Muna Mahmood Khether
%T Binary Image Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 6
%P 34-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information. The widespread adoption of electronic distribution of material is accompanied with more emphasis on data security. One of the modern data security methods is Visual Cryptography. Visual Cryptography(VC) is the technique that is used for securing data specially image-based secrets such as credit card information, personal health information, military maps and personally identifiable information and commercial identification data. Visual Cryptography allow us to share secret effectively and efficiently, the secret image can be distributed in to two or more shares, when shares are superimposed exactly together the original image would be discovered with human visual system(HVS) without out aid of computer or without performing complicated computations.

References
  1. M. Noar and A. Shamir, 1995. "Visual cryptography," Advances in Cryptology – EUROCRYPT'94, pp. 1-12.
  2. Naor, Moni, and Adi Shamir, 1996. "Visual cryptography II: Improving the contrast via the cover base". International Workshop on Security Protocols. Springer Berlin Heidelberg.
  3. Giuseppe Ateniese ,Carlo Blundo and Alfredo De Santis, 1996. "Visual Cryptography for General Access Structures, information and computation" article no. 0076,129, 86106 .
  4. E. Verheul and H. V. Tilborg, 1997. ”Constructions And Properties Of K Out Of N Visual Secret Sharing Schemes". Designs, Codes and Cryptography, 11(2) , pp.179–196,
  5. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin, 2005. “Sharing A Secret Two-Tone Image In Two Gray-Level Images”, Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
  6. Liguo Fang, BinYu, , On Sep 5, 2006. “Research On Pixel Expansion Of (2,n) Visual Threshold Scheme”, 1st International Symposium on Pervasive Computing and Applications ,pp. 856-860, IEEE.
  7. Xiao-qing Tan, , 2009 .“Two Kinds Of Ideal Contrast Visual Cryptography Schemes”, International Conference on Signal Processing Systems, pp. 450-453.
  8. C.C. Wu, L.H. Chen, 1998. “A Study On Visual Cryptography”, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C.
  9. H.-C. Hsu, T.-S. Chen, Y.-H. Lin, March 2004. “The Ring Shadow Image Technology Of Visual Cryptography By Applying Diverse Rotating Angles To Hide The Secret Sharing”, in Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001.
  10. S. J. Shyu, S. Y. Huanga,Y. K. Lee, R. Z. Wang, and K. Chen, , 2007. “Sharing multiple secrets in visual cryptography”, Pattern Recognition, Vol. 40, Issue 12, pp. 3633 - 3651.
  11. Mustafa Ulutas, Rıfat Yazıcı, Vasif V. Nabiyev, Güzin Ulutas, (2,2) , 2008. “Secret Sharing Scheme With Improved Share Randomness”, 978-1-4244-2881-6/08, IEEE.
  12. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, 2008. “Multiple-Image Encryption By Rotating Random Grids”, Eighth International Conference on Intelligent Systems Design and Applications, pp. 252-256.
  13. Zhengxin Fu, Bin Yu, 2009. “Research On Rotation Visual Cryptography Scheme”, International Symposium on Information Engineering and Electronic Commerce, pp533-536.
  14. Weir, WeiQi Yan, 2009. “Sharing Multiple Secrets Using Visual Cryptography”, 978-1-4244-3828-0/09, IEEE, pp 509-512.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography (VC) Binary image.