Securing of Colour Images Using Visual Cryptography and Digital Enveloping
Keywords:
Visual Cryptography, Digital Enveloping, Shares, Image Security, Alpha Component, Encryption, DecryptionAbstract
Visual Cryptography is a Cryptography scheme which is used to secure images. In this scheme the image to be sent to receiver via sender is divided into number of shares and then they are sent to the receiver. In Decryption processes, these shares of images are combined or stacked together to get an original image. The initial model developed was only for the binary images. Later the black and white images or 0-1 image was further studied for the Coloured Images thatmeans for Red, Green, Blue. For the RGB images various methods have been developed but in all these techniques the received image has degraded quality. In this paper we propose a new algorithm for coloured visual cryptography and making it more secured by applying Digital Enveloping technique on the shares of the image. Digital Enveloping is a technique in which shares, of the image to be sent, are distributed over various sample images to create what is known Enveloped images. At the receiver end, shares are retrieved from the enveloped images and combined to form original image without degrading the quality of image. The important feature of the Visual Cryptography is decryption process is done by human eyes not the computer less computational power is required.
References
M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, 1995, pp. 1–12.
M. Naor, A. Shamir, in: M. Lomas (Ed.), Visual Cryptography, II: Improving the Contrast via the Cover Base,Presented at Security in
Communication Networks, Amalfi,Italy, September 16–17, 1996. Lecture Notes inComputerScience, Vol. 1189, Springer, Berlin, 1997, pp. 197–202
Suhas B. Bhagate 1, P.J.Kulkarni 2 “An Overview of Various Visual Cryptography Schemes”.
KandarShyamalendu, MaitiArnab, “K-N Secret Sharing Visual Cryptography Scheme For Color Image Using Random Number International Journal of Engineering Science and Technology, Vol 3, No. 3, 2011, pp. 1851-1857.
Monish Kumar Dutta and AsokeNath “Scope and Challenges in Visual Cryptography”.
Wen Tsai Che Lee, Authentication of binary images in png format based on a secret sharing technique. Proceedings of IEEE International Conference on System and Engineering, pages 506-510, July 2010.
S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung.Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications.IEEE Journal on Selected Areas in Communications, Vol16, No.4 May 1998, pp.573–586.
Schildt, H. The Complete Reference Java 2, Fifth Ed. TMH, Pp 799- 839
Krishmoorthy R, Prabhu S, Internet & Java Programming, New Age International, pp 234.
F. Liu1, C.K. Wu1, X.J. Lin, Colour visual cryptography schemes, IET Information Security, July 2008.
Kang InKoo el. at., Color Extended Visual Cryptography using Error Diffusion, IEEE 2010.
SaiChandana B., Anuradha S., A New Visual Cryptography Scheme for Color Images, International Journal of Engineering Science
and Technology, Vol 2 (6), 2010.
Li Bai , A Reliable (k,n) Image Secret Sharing Scheme by, IEEE,2006.
B Surekha, Dr GN Swamy and Dr K SrinivasaRao “A Multiple Watermarking Technique for Images based on Visual Cryptography”
S.-S. Lee, J.-C.Na, S.-W.Sohn, C. Park, D.-H.Seo, and S.-J. Kim, “Visual cryptography based on an interferometric encryption technique,” ETRI Journal, vol. 24, pp. 373–380, 2002, available at http://etrij.etri.re.kr/etrij/pdfdata/24-05-05.pdf.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.