Review of Digital Image Sharing By Diverse Image Media
Keywords:
Visual secret sharing scheme, extended visual cryptography scheme, natural images, transmission riskAbstract
A natural-image-based VSS scheme (NVSS scheme) that shares secret images. A natural-imagebased secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In order to protect the secret image from transmission phase. (n, n) - NVSS scheme shared secret image over n-1 natural share. The natural shares will be digital image and printed image. By extracting the features of natural shares we can prepare noise-like share. After that encryption carried out with noise-like share and secret image. Propose possible ways to hide the noise like share to reduce the transmission risk problem for the share. In this paper Initially Feature Extraction process has been performed for Natural Shares. Here Digital image and Printed image have been used as Natural Shares. With that extracted features secret image will be encrypted by (n, n) - NVSS scheme where process carried by (n-1) natural shares. This Encrypted result will be hided using Share-Hiding Algorithm where generated the QR code. In the Recovering of the secret image will be done by Share Extraction Algorithm and also decryption algorithm. Finally the secret image with all pixels has been obtained. This proposed possible ways to hide the noise like share to reduce the transmission risk problem for the share.
References
M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.
R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun., vol. 283, no. 21, pp. 4242–4249, Nov. 2010.
P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.
K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013.
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol.
, nos. 1–2, pp. 143–161, Jan. 2001.
C. N. Yang and T. S. Chen, “Extended visual secret sharing schemes: Improving the shadow image quality,” Int. J. Pattern Recognit.
Artif.Intell., vol. 21, no. 5, pp. 879–898, Aug. 2007.
K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Trans. Inf. Forensics Security,
vol. 7, no. 1, pp. 219–229, Feb. 2012.
Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,
Aug. 2006.
Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
I. Kang, G. R. Arce, and H. K. Lee, “Color extended visual cryptography using error diffusion,” IEEE Trans. Image Process., vol. 20, no. 1, pp. 132–145, Jan. 2011.
F. Liu and C. Wu, “Embedded extended visual cryptography schemes,”IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322,
Jun. 2011.
T. H. Chen and K. H. Tsao, “User-friendly random-grid-based visual secret sharing,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693–1703, Nov. 2011.
T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high quality and small shadow size visual secret sharing scheme based on hybrid
strategy for grayscale images,” Digit. Signal Process., vol. 21, no. 6, pp. 734–745, Dec. 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.