We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

MSKS for Data Hiding and Retrieval using Visual Cryptography

by Mary Shanthi Rani, M., Germine Mary, G.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 4
Year of Publication: 2014
Authors: Mary Shanthi Rani, M., Germine Mary, G.
10.5120/18903-0196

Mary Shanthi Rani, M., Germine Mary, G. . MSKS for Data Hiding and Retrieval using Visual Cryptography. International Journal of Computer Applications. 108, 4 ( December 2014), 41-47. DOI=10.5120/18903-0196

@article{ 10.5120/18903-0196,
author = { Mary Shanthi Rani, M., Germine Mary, G. },
title = { MSKS for Data Hiding and Retrieval using Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 4 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number4/18903-0196/ },
doi = { 10.5120/18903-0196 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:09.287920+05:30
%A Mary Shanthi Rani
%A M.
%A Germine Mary
%A G.
%T MSKS for Data Hiding and Retrieval using Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 4
%P 41-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secret message in the form of image can be concealed into two or more images in Visual Cryptography (VC) schemes. The secret image can be recovered simply by stacking the shares together without any complex computation involved. The shares do not reveal any information about the secret image if they are viewed separately. In this paper, a color visual cryptography scheme using a combination of Meaningful Shares (MS) and a Key Share (KS) is proposed. These MS will not provoke the attention of hackers. The proposed scheme makes use of the XOR operation to create KS from the MS and secret image. The secret image can be decrypted by stacking the n-1 meaningful shares and key shares together by performing XOR operation. Experimental results show that the new scheme is perfectly applicable and achieves a high two level security.

References
  1. Naor, M and Shamir, A. , 1995. "Visual Cryptography", Advances in Cryptology- EUROCRYPT'94, pp. 1-12.
  2. Ateniese, G. , Blundo, C. , De Santis, A and Stinson, D. R. , 1996. "Visual Cryptography for general Access structures", Information and Computation, Vol. 129, pp. 86-106.
  3. Ateniese,G. , Blundo, C. , De Santis,A and Stinson, D. R. , 1996. "Contructions and bounds for visual cryptography", Proceedings of the 23rd International Colloquium on Automata Languages and Programming, pp. 416-428.
  4. Blundo, C and De Santis,A. , 1998. "Visual cryptography Schemes with perfect reconstruction of black pixels", Computer & Graphics, Vol. 22, No. 4, pp. 449-455.
  5. Droste,S. , 1996. "New results on visual cryptography", Advances in cryptography: CRYPT'96, Lecture Notes in Computer Science, No. 1109, Springer-Verlag, pp. 401- 415.
  6. Naor, M and Shamir,A. , 1996. "Visual cryptography : improving the contrast via the cover base", presented at Security in Communication Networks.
  7. Hou, Y. C. , 2003. "Visual cryptography for color images", Pattern Recognition, Vol. 36, pp. 1619-1629.
  8. Rijmen. V and Preneel, B. , 1996. "Efficient color visual encryption for shared colors of benetton", Eurocrypto' 96, Rump Session, Berlin.
  9. Shyu, S. J. , Huanga, S. Y. , Lee, Y. K. , Wang, R. Z. and Chen, K. , 2007. "Sharing multiple secrets in Visual Cryptography", Pattern Recognition, Vol. 40, Issue 12, pp. 3633 – 3651.
  10. Yang, C. N. and Laih, C. S. , 2000. "New colored visual secret sharing schemes", Designs, Codes and cryptography, Vol. 20, No. 3, pp. 325-335.
  11. Verheul, E and Tilborg, H. V. , 1997. "Constructions and Properties of K out of N Visual Secret Sharing Schemes". Designs, Codes and Cryptography, 11(2) , pp. 179–196.
  12. Liu, F. , Wu C. K. , Lin, X. J. , 2008. "Colour Visual Cryptography Schemes", IET Information Security, vol. 2, No. 4, pp. 151-165.
  13. Nakajima, M. , and Yamaguchi, Y. , 2002. "Extended visual cryptography for natural images", Journal of WSCG. v10 i2. pp. 303-310.
  14. Poynton, C. A. , Frequently asked questions about color, http://www. inforamp. net/poynton.
  15. Siddharth Malik, Anjali Sardana, Jaya, 2012. "A Keyless Approach to Image Encryption", 2012 International Conference on Communication Systems and Network Technologies.
  16. Kang,I. , Gonzalo R. Arce and Heung-Kyu Lee. 2011. "Color Extended Visual Cryptography using Error Diffusion", IEEE Trans. Image Process. , vol. 20, no. 1.
  17. Wu,C. C. , Chen, L. H. , 1998. "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R. O. C.
  18. Hsu, H. C. , Chen, T. -S. , Lin, Y. -H. , 2004. "The Ring Shadow Image Technology of Visual Cryptography by applying Diverse Rotating Angles to hide the Secret Sharing", in Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp. 996–1001.
  19. Wu, H. -C. , Chang, C. -C. , 2005. "Sharing Visual Multi- Secrets Using Circle Shares", Comput. Stand. Interfaces 134(28), pp. 123–135.
  20. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin, 2005. "Sharing A Secret Two-Tone Image In Two Gray-Level Images", Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
  21. Liguo Fang, BinYu, "Research On Pixel Expansion Of (2,n) Visual Threshold Scheme", 1st International Symposium on Pervasive Computing and Applications, pp. 856-860, IEEE.
  22. Wen-Pinn Fang, 2007. "Visual Cryptography In Reversible Style", IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), Kaohsiung, Taiwan, R. O. C.
  23. Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu, 2008. "Visual Secret Sharing for Multiple Secrets", Pattern Recognition 41, pp. 3572 – 3581.
  24. Mustafa Ulutas, R?fat Yaz?c?, Vasif V. Nabiyev, Güzin Ulutas, 2008. (2,2)- "Secret Sharing Scheme With Improved Share Randomness", 978-1-4244-2881-6/08, IEEE.
  25. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, 2008. "Multiple-Image Encryption By Rotating Random Grids", Eighth International Conference on intelligent Systems Design and Applications, pp. 252-256.
  26. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, 2008. "Multi-Secrets Visual Secret Sharing", Proceedings of APCC2008, IEICE.
  27. Wen-Pinn Fang, 2009. "Non-Expansion Visual Secret Sharing In Reversible Style", IJCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 2.
  28. Zhengxin Fu, Bin Yu, 2009. "Research On Rotation Visual Cryptography Scheme", International Symposium on Information Engineering and Electronic Commerce,pp 533-536. [29 ] Jonathan Weir, WeiQi Yan, 2009. "Sharing Multiple Secrets Using Visual Cryptography", 978-1-4244-3828- 0/09, IEEE, pp 509-512.
  29. Xiao-qing Tan, 2009. "Two Kinds Of Ideal Contrast Visual Cryptography Schemes", International Conference on Signal Processing Systems, pp. 450-453.
  30. Chang, C. , Tsai, C and Chen, T. , 2000. "A New Scheme For Sharing Secret Color Images In Computer Network", Proceedings of International Conference on Parallel and Distributed Systems, pp. 21–27.
  31. Chin-Chen Chang , Tai-Xing Yu , 2002. "Sharing A Secret Gray Image In Multiple Images", Proceedings of the First International Symposium on Cyber Worlds (CW. 02).
  32. Lukac, R. , Plataniotis, K. N. , 2005 . "Bit-Level Based Secret Sharing For Image Encryption", Pattern Recognition 38 (5), pp. 767–772.
  33. Youmaran, R. , Adler, A. , Miri, A. , 2006. "An Improved Visual Cryptography Scheme For Secret Hiding", 23rd Biennial Symposium on Communications, pp. 340-343.
  34. Shyu, S. J. , 2006. "Efficient Visual Secret Sharing Scheme For Color Images", Pattern Recognition 39 (5) pp. 866– 880.
  35. Mohsen Heidarinejad, Amirhossein Alamdar Yazdi and Konstantinos N Plataniotis. , 2008. "Algebraic Visual Cryptography Scheme For Color Images", ICASSP, pp. 1761-1764.
  36. Haibo Zhang, Xiaofei Wang, Wanhua Cao, Youpeng Huang, 2008. "Visual Cryptography For General Access Structure By Multi-Pixel Encoding With Variable Block Size", International Symposium on Knowledge Acquisition and Modeling, pp. 340-344.
  37. Wei Qiao, Hongdong Yin, Huaqing Liang, 2009. "A Kind Of Visual Cryptography Scheme For Color Images Based On Halftone Technique", International Conference on Measuring Technology and Mechatronics Automation 978-0-7695-3583-8/09, pp. 393-395.
  38. Du-Shiau Tsai, Gwoboa Horng, Tzung-Her Chen, Yao- Te Huang, 2009. " A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint", Information Sciences179 3247-3254, Elsevier.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Secret Sharing Visual Cryptography Meaningful Share.