CFP last date
20 May 2024
Reseach Article

(n, n) Visual Cryptography based on Alignment of Shares

by Abhishek Kumar Mishra, Ashutosh Gupta, Ashish Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 18
Year of Publication: 2012
Authors: Abhishek Kumar Mishra, Ashutosh Gupta, Ashish Kumar
10.5120/9789-4305

Abhishek Kumar Mishra, Ashutosh Gupta, Ashish Kumar . (n, n) Visual Cryptography based on Alignment of Shares. International Journal of Computer Applications. 60, 18 ( December 2012), 1-4. DOI=10.5120/9789-4305

@article{ 10.5120/9789-4305,
author = { Abhishek Kumar Mishra, Ashutosh Gupta, Ashish Kumar },
title = { (n, n) Visual Cryptography based on Alignment of Shares },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 18 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number18/9789-4305/ },
doi = { 10.5120/9789-4305 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:18.202896+05:30
%A Abhishek Kumar Mishra
%A Ashutosh Gupta
%A Ashish Kumar
%T (n, n) Visual Cryptography based on Alignment of Shares
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 18
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

According to visual cryptography the decryption is performed by human visual system. It is well known that visual cryptography encryption process generates shares. Proposed method based on alignment of shares at the time of superimposition. Using these shares the source image can be recovered only if the shares are superimposed with proper predefined alignment. Proper alignment of these shares at the time of superimposition plays an important role in finding the source image. Here, we are proposing a new way of aligning the shares for getting the source image and this is the only way to obtaining the source image.

References
  1. M. Naor and A. Samir Visual Cryptography-Advances in cryptology Eurocrypt 1994,1. -12
  2. M. Naor and A. Samir Visual Cryptography-in a D. . Sentish editor,Advances in Cryptology volume 950,pages1-12,springer verlag,1995
  3. C. N. Yang, Visual cryptography: An introduction to visual secret sharing schemes, Department of Computer Scienceand Information Engineering National Dong Hwa UniversityShoufeng , Hualien 974, TAIWAN, access on June 07
  4. S. Cimato and C. N. Yang. Visual cryptography and secret image sharing. CRC Press, Taylor & Francis, 2011.
  5. F. Liu, C. K. Wu, and X. J. Lin. The alignment problem of visual cryptography schemes. In Designs, Codes and Cryptography, volume 50, pages 215-227, 2009
  6. A. Shamir. How to share a secret. In Communications of the ACM, volume 22 (11), pages 612-613, 1979.
  7. C. Blundo, A. De Santis, and D. R. Stinson. On the contrast in visual cryptography schemes. In Journal of Cryptology, volume 12(4), pages 261-289, 1999.
  8. Jim Cai, A Short Survey On Visual Cryptography Schemes, 2004, http://www. cs. toronto. edu/~jcai/paper. pdf
  9. Li Bai , A Reliable (k,n) Image Secret Sharing Scheme by,IEEE,2006
  10. F. Liu1, C. K. Wu1, X. J. Lin, Colour visual cryptography schemes, IET Information Security, July 2008
  11. Adi Shamir, How to Share a Secret, Communications of the ACM, Vol. 22, no. 11, pp. 612-613, Nov. 1979
  12. M. Naor and A. Shamir "Visual cryptography:Improving the contrast via the cover base" IACR Eprint archive, 1996.
  13. A. Ross and A. A. Othman, "Visual Cryptography for Biometric privacy", IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Secret Sharing visual cryptography