Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

An improved approach for Extended Visual Cryptography Scheme for Colour Images

Print
PDF
IJCA Proceedings on International Conference in Computational Intelligence (ICCIA2012)
© 2012 by IJCA Journal
iccia - Number 10
Year of Publication: 2012
Authors:
Bhandare Shital
Jhade Manoj
Jadhav Angarika

Bhandare Shital, Jhade Manoj and Jadhav Angarika. Article: An improved approach for Extended Visual Cryptography Scheme for Colour Images. IJCA Proceedings on International Conference in Computational Intelligence (ICCIA 2012) ICCIA(10):-, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Bhandare Shital and Jhade Manoj and Jadhav Angarika},
	title = {Article: An improved approach for Extended Visual Cryptography Scheme for Colour Images},
	journal = {IJCA Proceedings on International Conference in Computational Intelligence (ICCIA 2012)},
	year = {2012},
	volume = {ICCIA},
	number = {10},
	pages = {-},
	month = {March},
	note = {Full text available}
}

Abstract

Visual Cryptography is an image encryption technique used to hide the secure information in images. It allows the encryption of secret image into n number of shares and distributed into n number of participants. For example in (k, n) secret sharing problem the secret image can be visually recover by stacking together any k or more transparencies of the shares. But cannot reveal any secrete information by stacking less than k transparencies together. The Embedded EVCS is constructed by adding random shares of secret image into meaningful covering images. The proposed system will work with color images which is not possible with existing embedded EVCS approach. This approach will test the same algorithm for color images which will take the R, G, B values separately and add shares to it. It will improve the contrast of the recovered secret image and produce clear resultant image.

References

  • Embedded Extended Visual Cryptography Schemes F Liu… - … Forensics and Security, IEEE Transactions on, 2011 - ieeexplore.ieee.org
  • Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography,”IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006.
  • M. Nakajima and Y. Yamaguchi, “Extended visual cryptography for natural images,” in Proc. WSCG Conf. 2002, 2002, pp. 303–412.
  • D. S. Tsai, T. Chenc, and G. Horng, “On generating meaningful shares in visual secret sharing scheme,” Imag. Sci. J., vol. 56, pp. 49–55, 2008.
  • Z.M.Wang, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol.4, no. 3, pp. 383–396, Sep. 2009
  • M. Naor and B. Pinkas, “Visual authentication and identification,” in Proc. CRYPTO’97, 1997, vol. 1294, pp. 322– 336, Springer-Verlag LNCS.
  • T. H. Chen and D. S. Tsai, “Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,” Pattern Recognit., vol. 39, pp. 1530–1541, 2006.
  • P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk,“Security displays enabling secure communications,” in Proc. First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, 2004, vol. 2802, pp. 271–284.
  • M. Naor and A. Shamir, “Visual cryptography,” in Proc. OCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12,Springer-Verlag, LNCS.
  • L. A. MacPherson, “Grey Level Visual Cryptography for General Access Structures,”Master Thesis, University ofWaterloo,Waterloo, ON, Canada, 2002.
  • D. Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, p. 033019, 2005.
  • C. C. Lin and W. H. Tsai, “Visual cryptography for graylevel images by dithering techniques,” Pattern Recognit. Lett., vol. 24, no. 1-3, pp. 349–358, 2003.