CFP last date
20 December 2024
Reseach Article

Secure System Framework for Secure Visual Cryptography

by Ketan Raju Kundiya, Ram B. Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 109 - Number 14
Year of Publication: 2015
Authors: Ketan Raju Kundiya, Ram B. Joshi
10.5120/19254-0957

Ketan Raju Kundiya, Ram B. Joshi . Secure System Framework for Secure Visual Cryptography. International Journal of Computer Applications. 109, 14 ( January 2015), 8-14. DOI=10.5120/19254-0957

@article{ 10.5120/19254-0957,
author = { Ketan Raju Kundiya, Ram B. Joshi },
title = { Secure System Framework for Secure Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 109 },
number = { 14 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume109/number14/19254-0957/ },
doi = { 10.5120/19254-0957 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:44:46.350440+05:30
%A Ketan Raju Kundiya
%A Ram B. Joshi
%T Secure System Framework for Secure Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 109
%N 14
%P 8-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage of visual cryptography scheme is that a number of qualified shares are able to recover the secret image without any cryptographic knowledge, calculation and computation devices. Simple Visual Cryptographic technique is not secure. Because simple visual cryptography scheme only deals with creation of secret share and just combined it at receiver side. In the proposed system we apply visual cryptography technique. The image is to be transferred on the network (also known as secret image) is first compressed and then hidden by cover image using LSB technique. To enhance security, additional security measures are applied further to get encrypted image using symmetric key algorithm. The shares are generated from the encrypted image using RNS (Residual Number System) algorithm. Next share stacking procedure is applied using CRT (Chinese Remainder Theorem) algorithm to get final encrypted image at receiver side. Further, decryption of final encrypted image is done by using same algorithm which is used for encryption purpose. By applying this technique security and quality of image is improved and pixel expansion problem will get reduced.

References
  1. Naor M. and Shamir A, "Visual cryptography" , In Proc. Eurocrypt 94, Perugia, Italy, May 9–12, LNCS 950, Springer Verlag, 1994, 1–12.
  2. Feng Liu and Chuankun Wu, "Embedded Extended Visual Cryptography Schemes", Ieee transactions on information forensics and security, vol. 6, no. 2,June 2011.
  3. N. Askari, H. M. Heys, and C. R. Moloney, "An extended visual cryptography scheme without pixel expansion for halftone images ", 2013 26th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE).
  4. Manika Sharma, Rekha Saraswat, "Secure Visual Cryptography Technique for Color Images Using RSA Algorithm", International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 10, April 2013.
  5. Rajan Kumar, Prasanna Kumar, Sudeepa KB and Ganesh Aithal, "Enhanced security system using symmetric Encryption and visual cryptography", International Journal of Advances in Engineering Technology, July 2013.
  6. Akshatha M M, Lokesh B and Nuthan A C, "Visual Cryptographic Technique for Enhancing the Security of Image Transaction", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 5, May 2014.
  7. Roberto De Prisco, Alfredo De Santis,"Color visual cryptography schemes for black and white secret images", 2013 Elsevier B. V. All rights reserved.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Visual Secret Share Share Stacking Security.