CFP last date
20 December 2024
Reseach Article

A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS)

by Harinandan Tunga
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 12
Year of Publication: 2014
Authors: Harinandan Tunga
10.5120/17738-3733

Harinandan Tunga . A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS). International Journal of Computer Applications. 101, 12 ( September 2014), 13-15. DOI=10.5120/17738-3733

@article{ 10.5120/17738-3733,
author = { Harinandan Tunga },
title = { A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS) },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 12 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number12/17738-3733/ },
doi = { 10.5120/17738-3733 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:52.435926+05:30
%A Harinandan Tunga
%T A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 12
%P 13-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is an art and science of achieving security by en-coding the message to make them non-readable. Extended Visual Cryptography is a type of cryptography which encodes a number of images in the way that when the images on transparencies are stacked together, the hidden message appears without a trace of original images. The decryption is done directly by the human visual system(HVS) with no special cryptographic calculations. We present a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures. The third picture is reconstructed by printing the two output images onto transparencies and stacking them together. Generally, visual cryptography suffers from the deterioration of the image quality. This paper also describes the method to improve the quality of the output images.

References
  1. M. Naor and A. Shamir, Visual cryptography. Advances in Cryptology EUROCRYPT '94. Lecture Notes in Computer Science, (950):1–12, 1995)
  2. E. Verheul, H. V. Tilborg. ,"Constructions and properties of k out of n visual secret sharing schemes", Designs, Codes and Cryptography, 11(2), pp. 179–196, 1997.
  3. Chang, C. C. and Yu. T. X. , Sharing a Secret Gray Image in Multiple Images, in the Proceedings of International Sympo-sium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp. 230-237
  4. C. Chang, C. Tsai, and T. Chen, A new scheme for sharing secret color images in computer network. In the Proceedings of International Conference on Parallel and Distributed Sys-tems, pages 21–27, July 2000)
  5. C. Yang and C. Laih. , New colored visual secret sharing schemes. Designs, Codes and Cryptography, 20:325–335,2000.
  6. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping by Musheer Ahmad and M. Shamsher Alam.
  7. "Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Vis-ual Secret Sharing Scheme", by Harinandan Tunga, and Soumen Mukherjee, IJCSI Vol. 9 Issue 3, No 1, May 2012, ISSN (Online): 1694-0814. www. ijcsi. org.
  8. Atul, Kahate, Cryptography and Network Security, (Second Edition 2008).
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Human Visual System (HVS) Extended Visual Cryptography Secret sharing Pixel expansion