CFP last date
20 May 2024
Reseach Article

Image Encryption – An Intelligent Approach of Color Visual Cryptography

by Mohd. Junedul Haque, Mohd. Muntjir, Mohd. Rahul
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 5
Year of Publication: 2013
Authors: Mohd. Junedul Haque, Mohd. Muntjir, Mohd. Rahul
10.5120/14442-2601

Mohd. Junedul Haque, Mohd. Muntjir, Mohd. Rahul . Image Encryption – An Intelligent Approach of Color Visual Cryptography. International Journal of Computer Applications. 83, 5 ( December 2013), 7-9. DOI=10.5120/14442-2601

@article{ 10.5120/14442-2601,
author = { Mohd. Junedul Haque, Mohd. Muntjir, Mohd. Rahul },
title = { Image Encryption – An Intelligent Approach of Color Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 5 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 7-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number5/14442-2601/ },
doi = { 10.5120/14442-2601 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:34.062256+05:30
%A Mohd. Junedul Haque
%A Mohd. Muntjir
%A Mohd. Rahul
%T Image Encryption – An Intelligent Approach of Color Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 5
%P 7-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a secret sharing method that uses human eyes to decrypt the secret. It has computation-free decoding process to decrypt the images. Generally visual cryptographic methods utilize the technique of secret sharing in which secret image is divided into shares and when k shares out of n stack together the secret image will reveal. In this paper we proposed a method of visual cryptography for colored images. We are using RGB color model for color images. First of all, image is divided into monochromatic channels then converts each individual image to binary image. After this we can apply basic VCS scheme. The secret image can be recovered by stacking share images. We are using Matlab7. 4 for implementing our scheme.

References
  1. C. N. Yang, C. S. Laih, New colored visual secret sharing Scheme, Design, codes and cryptography,vol. 20, pp. 325-335, 2000.
  2. M. Naor, A. Shamir, Visual cryptography, Advances in Cryptology, Eurocrypt 94, Lecture Notes in Computer Science, Vol. 950, pp. 1-12,1995.
  3. Verheul, Van Tilborg, Construction and Properties of k out of n visual secret sharing scheme Designs, Codes and Cryptography, Vol. 11, pp. 179-196, 1997.
  4. R. Ulichney. Digital Halftoning. MIT Press, Cambridge, Massachusetts, 1987.
  5. R. W. Floyd and L. Steinberg. "An adaptive algorithm for spatial grey scale". Proc. Soc. Inf. Display, Vol. 17, pp. 75–77, 1976.
  6. H. Kang, Digital Color Halftoning, Bellingham, WA: SPIE—The International Society for Optical Engineering, 1999.
  7. Y. C. Hou, C. Y. Chang, and S. F. Tu, "Visual cryptography for color images based on halftone technology," in International Conference on Information Systems, Analysis and Synthesis. World Multiconference on Systemics, cyberneticsand Informatics. Image, Acoustic, Speech And Signal Processing: Part II, 2001.
  8. Mohd Junedul Haque, Sultan Aljahdali: An Approach for Reconstructed Color Image Segmentation using Edge Detection and Threshold Methods. International Journal Of Computer Applications 68(11): 32-36 (2013).
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Secret Sharing RGB Image processing.