CFP last date
20 May 2024
Reseach Article

Two in One Image Secret Sharing Scheme with Increased Scalability

Published on February 2015 by Parvathy Vijay, Sreelatha S H
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 4
February 2015
Authors: Parvathy Vijay, Sreelatha S H
16da946b-8c02-496e-b2fc-b3e8259e0788

Parvathy Vijay, Sreelatha S H . Two in One Image Secret Sharing Scheme with Increased Scalability. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 4 (February 2015), 1-7.

@article{
author = { Parvathy Vijay, Sreelatha S H },
title = { Two in One Image Secret Sharing Scheme with Increased Scalability },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 4 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 1-7 },
numpages = 7,
url = { /proceedings/icaccthpa2014/number4/19452-6038/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Parvathy Vijay
%A Sreelatha S H
%T Two in One Image Secret Sharing Scheme with Increased Scalability
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 4
%P 1-7
%D 2015
%I International Journal of Computer Applications
Abstract

Secret sharing schemes allows information to be shared among a group of participants so that all together (or qualified subsets) of participants can recover the information. A visual cryptography scheme (VCS) is a cryptographic technique which allows visual information (e. g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The performance of any visual cryptography scheme depends on various measures such as pixel expansion, contrast, security, accuracy, computational complexity etc. This work throws light on the theoretical background and the comparison on the various visual cryptography schemes. Here introduces a 2 in 1 scheme which can embed additional information with reduced shadow size and better visual quality of revealed image. Compared with the two-in-one image secret sharing scheme (TiOISSS), this scheme might achieve smaller shadow size with acceptable visual quality. The paper discusses Sharing More Information Gray Visual Cryptography Scheme (SMIGVCS) which can embed additional information with reduced shadow size and better visual quality of revealed image. The main results of this paper include implementation of a visual cryptographic scheme with a reduced share size.

References
  1. M. Naor, A. Shamir, Visual cryptography, in: EUROCRYPT?94, LNCS, vol. 950, Springer-Verlag, 1995, pp. 1–12
  2. A. Shamir, How to share a secret, Communications of the ACM 22 (1979) 612– 613
  3. C. C. Thien, J. C. Lin, Secret image sharing, Computer & Graphics 26 (2002) 765–770.
  4. S. J. Lin, J. C. Lin, VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches, Pattern Recognition 40 (2007) 3652–3666.
  5. C. N. Yang, C. B. Ciou, Image secret sharing method with two-decoding-options: lossless recovery and previewing capability, Image and Vision Computing 28 (2010) 1600–1610.
  6. P. Li, P. J. Ma, X. H. Su, C. N. Yang, Improvements of a two-in-one image secret sharing scheme based on gray mixing model, Journal of Visual Communication and Image Representation 23 (2012) 441–453.
  7. P. Li, C. N Yang, Q. Kong, Y. Ma, Z. Liu, Sharing more information in gray visual cryptographic scheme, Journal of Visual Communication and Image Representation, Volume 24, Issue 8, November 2013, Pages 1380-1393.
  8. C. N. Yang, New visual secret sharing schemes using probabilistic method, Pattern Recognition Letters, Volume 25,, November 2003, Pages. 481–494.
  9. Y. C. Hou, Visual cryptography for color images, Journal of Pattern Recognition, Volume 36, January 2003, Pages 1619-1629.
  10. C. N. Yang, T. S. Chen, Colored visual cryptography scheme based on additive color mixing, Journal of Pattern Recognition, Volume 41, March 2008, Pages 3114–3129.
Index Terms

Computer Science
Information Sciences

Keywords

Bit Level Decomposition Polynomial Based Image Secret Sharing Scalability Shadow Size Visual Cryptography.