Review of Digital Image Sharing By Diverse Image Media

Authors

  • Sonkusare M Computer Science and Engineering Department
  • Janwe N Computer Science and Engineering Department

Keywords:

Visual secret sharing scheme, extended visual cryptography scheme, natural images, transmission risk

Abstract

A natural-image-based VSS scheme (NVSS scheme) that shares secret images. A natural-imagebased secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural images and one noise-like share image. Instead of altering the contents of the natural images, the encryption process extracts feature images from each natural image. In order to protect the secret image from transmission phase. (n, n) - NVSS scheme shared secret image over n-1 natural share. The natural shares will be digital image and printed image. By extracting the features of natural shares we can prepare noise-like share. After that encryption carried out with noise-like share and secret image. Propose possible ways to hide the noise like share to reduce the transmission risk problem for the share. In this paper Initially Feature Extraction process has been performed for Natural Shares. Here Digital image and Printed image have been used as Natural Shares. With that extracted features secret image will be encrypted by (n, n) - NVSS scheme where process carried by (n-1) natural shares. This Encrypted result will be hided using Share-Hiding Algorithm where generated the QR code. In the Recovering of the secret image will be done by Share Extraction Algorithm and also decryption algorithm. Finally the secret image with all pixels has been obtained. This proposed possible ways to hide the noise like share to reduce the transmission risk problem for the share.

References

M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.

R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun., vol. 283, no. 21, pp. 4242–4249, Nov. 2010.

P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.

K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol.

, nos. 1–2, pp. 143–161, Jan. 2001.

C. N. Yang and T. S. Chen, “Extended visual secret sharing schemes: Improving the shadow image quality,” Int. J. Pattern Recognit.

Artif.Intell., vol. 21, no. 5, pp. 879–898, Aug. 2007.

K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Trans. Inf. Forensics Security,

vol. 7, no. 1, pp. 219–229, Feb. 2012.

Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,

Aug. 2006.

Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.

I. Kang, G. R. Arce, and H. K. Lee, “Color extended visual cryptography using error diffusion,” IEEE Trans. Image Process., vol. 20, no. 1, pp. 132–145, Jan. 2011.

F. Liu and C. Wu, “Embedded extended visual cryptography schemes,”IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322,

Jun. 2011.

T. H. Chen and K. H. Tsao, “User-friendly random-grid-based visual secret sharing,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693–1703, Nov. 2011.

T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high quality and small shadow size visual secret sharing scheme based on hybrid

strategy for grayscale images,” Digit. Signal Process., vol. 21, no. 6, pp. 734–745, Dec. 2011.

Downloads

Published

2024-02-26

How to Cite

Sonkusare, M., & Janwe, N. (2024). Review of Digital Image Sharing By Diverse Image Media. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(07), 1917–1922. Retrieved from https://ijact.in/index.php/j/article/view/337

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.