CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS

Published on November 2012 by Aarti, Pushpendra K Rajput
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 2
November 2012
Authors: Aarti, Pushpendra K Rajput
b1ea2bc0-8ffc-44bd-8f31-40072ba6e9c9

Aarti, Pushpendra K Rajput . Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 2 (November 2012), 24-29.

@article{
author = { Aarti, Pushpendra K Rajput },
title = { Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 2 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 24-29 },
numpages = 6,
url = { /specialissues/icnict/number2/9025-1034/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Aarti
%A Pushpendra K Rajput
%T Multiple Secret Sharing Scheme with Gray-Level Mixing using EVCS
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 2
%P 24-29
%D 2012
%I International Journal of Computer Applications
Abstract

Visual Secret Sharing (VSS) encrypts secret images into n shares and decryption is done through the human vision. But, traditional visual cryptography scheme is restricted to the number of secret images or the performance of recovered image is not good. The proposed scheme shares multiple images using gray level mixing with real size image recovery and has improved contrast of recovered images with use of inspection function. We propose a scheme that can share m binary secret images into n rectangular gray level share images. The low computation bit plane encoding scheme uses concept of Extended Visual Cryptography scheme (EVCS) to have meaningful shares that can easily managed and reduce attention of hackers over communication channel. In first phase, m images are broken into shares using conventional EVCS. Each image is broken into n individual binary shares. In the second phase, the respective shares of every image are combined with stacking the shares, since each share works as a bit plane in gray image.

References
  1. G. R. Blakley, Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, vol. 48, NJ, USA, 1979, pp. 313–317.
  2. A. Shamir, How to share a secret, Commun. ACM 2 2 ( 1) (1979) 612 – 613.
  3. M. Naor, A. Shamir," Visual cryptography", in: A. De Santis (Ed. ), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, vol. 950, 1995, pp. 1–12.
  4. D. Wang, P. Luo, L. Yang, D. Qi, and Y. Dai, "Shift visual cryptography scheme of two secret images," Progress in Natural Science, Vol. 13, No. 6, pp. 457 - 463, 2003.
  5. R. Z. Wang, Y. K. Lee, S. Y. Huang, and T. L. Chia, "Multilevel visual secret sharing," Proceedings of the Second International Conference on Innovative Computing, Information and Control, Kumamoto, Japan, pp. 283 - 283, 2007.
  6. Y. -C. Hou, "Visual cryptography for color images,"Pattern Recognition, vol. 36, pp. 1619 – 1629, 2003.
  7. T. -S. Chen, J. -H. Shiesh, H . -W. Chen, Using circular shadow image and fixed angle segmentation for visual cryptography system, in: Pan-Yellow-Sea International Workshop on Information Technologies for the Network Era, Saga, Japan, March 2002, pp. 214–220.
  8. H. -C. Hsu, T. -S. Chen, Y. -H. Lin, The ring shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, in: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp. 996–1001
  9. J. B. Feng, H. C. Wub, C. S. Tsaic, et al. . Visual secret sharing for multiple secrets. Pattern Recognition, 2008, 41(12): 3572-3581.
  10. C. Wu, C. C. Chang, Sharing visual multi-secrets using circle shares, Computer Standards & Interfaces, 28: 123–135, 2005.
  11. S. Shyong, S. Y. Huang, Y. K. Lee and R. Z. Wang. Sharing multiple secrets in visual cryptography, Pattern Recognition. 2007.
  12. Hou, Y. C. and Tu, S. F. : 'A visual cryptographic technique for chromatic images using multi-pixel encoding method', Journal of Research and Practice in Information Technology, Vol. 37, No. 2, 2005, pp. 179-191.
  13. Tu, S. F. and Hou, Y. C. : 'Design of visual cryptographic methods with smooth-looking decoded images of invariant size for grey-level images',The imaging Science Journal, Vol. 55, No. 2, 2007, pp. 90-101.
  14. Zhang, H. et al. , ' Visual cryptography for general access structure using pixel-block aware encoding', Journal of Computers,Vol. 3,No. 12,2008,pp. 68-75.
  15. D. S. G. Ateniese, C. Blundo and D. R. Stinson, "Constructions and bounds for visual cryptography," in 23rd International Colloquium on Automata, Languages and Programming, ser. Lecture Notes in Computer Science, F. M. auf der Heide and B. Monien, Eds. , vol. 1099. Berlin: Springer-Verlag, 1996, pp. 416-428.
  16. Z. Zhou, G. R. Arce, and G. D. Crescenzo, Halftone visual cryptography, IEEE Transaction on Image Processing , vol. 15, no. 8, pp. 2441–2453, 2006.
  17. InKoo Kang, Gonzalo R. Arce, Heung-Kyu Lee, Color extended visual cryptography using error diffusion, icassp, 2009, pp. 1473-1476.
  18. H. C. Wu, H. C. Wang, and R. W. Yu, Color Visual Cryptography Scheme Using Meaningful Images, IEEE Computer Society, vol. 03, pp. 173-178,2008.
  19. D. Wang, F. Yi, and X. Li. , "On general construction for extended visual cryptography schemes," Pattern Recogn, vol. 42, pp. 3071 -3082, Nov. 20 09.
  20. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, "Multi-Secrets Visual Secret Sharing", Proceedings of APCC2008, IEICE, 2008.
  21. C. C. Lin, W. H. Tsai, Secret image sharing with steganography and authentication, Journal of Systems and Software 73 (2004) 405–414
  22. C. C. Chang, Y. P. Hsieh, C. H. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130–3137.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Secret Sharing(vss) Extended Visual Cryptography Scheme (evcs) Bit Plane Encoding Contrast