CFP last date
22 April 2024
Reseach Article

A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing

by B. Reddaiah, K. Srinivasa Rao, P. V. Gowtham
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 49
Year of Publication: 2019
Authors: B. Reddaiah, K. Srinivasa Rao, P. V. Gowtham
10.5120/ijca2019918750

B. Reddaiah, K. Srinivasa Rao, P. V. Gowtham . A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing. International Journal of Computer Applications. 182, 49 ( Apr 2019), 13-17. DOI=10.5120/ijca2019918750

@article{ 10.5120/ijca2019918750,
author = { B. Reddaiah, K. Srinivasa Rao, P. V. Gowtham },
title = { A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 182 },
number = { 49 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number49/30527-2019918750/ },
doi = { 10.5120/ijca2019918750 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:14:46.316922+05:30
%A B. Reddaiah
%A K. Srinivasa Rao
%A P. V. Gowtham
%T A Hybrid Visual Cryptographic Lossless Image Sharing Scheme based on Bit Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 49
%P 13-17
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a technique that is used to share the secret data in the form of images for acquiring data security. This technique involves encryption and decryption processes for securing data. In encryption process the original image is divided into number of shares and then sends to other end. In decryption by using simple computations the subset of shares combined to reconstruct the original image. In the proposed method by using bit sharing method the original image is divided into four shares. These shares are covered with different cover images by using genetic algorithm and mathematical operations along with column transposition.

References
  1. J. Benaloh, J. Leichter.: Generalized secret sharing and monotone functions, In S. Goldwasser, CRYPTO-88, Springer LNCS 403, pp. 27-35. Springer-Verlag, 1990, DOI: 10.1007/0-387-34799-2-3.
  2. M. Naor, A. Shamir.: Visual Cryptography. In: EUROCRYPT 1994, Springer LNCS, vol. 950, pp. 1-12. Springer, doi: 10.1007/BFb0053419.
  3. M. Bertilsson, I. Ingemarsson.: A construction of practical secret sharing schemes using linear block codes, In J. Seberry and Y. Zheng, editors, AUSCRYPT-92, volume 718 of Lecture Notes in Computer Science, pp. 67-79. Springer-Verlag, 1993, doi: 10.1007-3-540-48969-X.
  4. A. Adhikari, M. Bose.: A new visual cryptographic scheme using Latin squares, IEICE Transactions on Fundamentals, Springer AISC249, pp:1998-2002, 2004, doi: 10.1007/078-3-319-03095-1-x.
  5. Ran-Zan Wang, Chin-Hui Su.: Secret image sharing smaller shadow images, Pattern Recognition Letters 27, Elsevier, 2006, pp: 551-555, 0.1016/j.patree.2005, 09.021.
  6. Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone Visual Cryptography, IEEE Transactions on Image Processing, 2006, pp: 2441-2453, doi: 10.1109/TIP.2006.875249.
  7. Ch. Ratna Babu, M. Sridhar, Dr. B. Raveendra Babu.: Information Hiding in Gray Scale Images using Pscudo-Randomized Visual Cryptography Algorithm for Visual Information Security, ICISCON-2013, IEEExplorer 2013, pp: 195-199, doi: 10.1109/ICISCON.2013.6524202.
  8. A. Dutta, D. K. Kole.: An Efficient Secret Image Sharing Scheme Using an Effectual Position Exchange Technique., ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India - vol II. Springer – AISC, vol 249, 2014, doi: 10.1007/978-3-319-0-03095-1-25.
  9. G. R Blakley, Safeguarding cryptographic keys, AFIPS Conference Proceedings, vol. 48, 1979, pp: 313-317.
Index Terms

Computer Science
Information Sciences

Keywords

Visual cryptography lossless Image sharing Bit sharing LSB Crossover Column transposition.