We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Visual Cryptography in the Video using Halftone Technique

by Bhawna Shrivas, Shweta Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 14
Year of Publication: 2015
Authors: Bhawna Shrivas, Shweta Yadav
10.5120/20622-3345

Bhawna Shrivas, Shweta Yadav . Visual Cryptography in the Video using Halftone Technique. International Journal of Computer Applications. 117, 14 ( May 2015), 19-22. DOI=10.5120/20622-3345

@article{ 10.5120/20622-3345,
author = { Bhawna Shrivas, Shweta Yadav },
title = { Visual Cryptography in the Video using Halftone Technique },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 14 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number14/20622-3345/ },
doi = { 10.5120/20622-3345 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:23.715527+05:30
%A Bhawna Shrivas
%A Shweta Yadav
%T Visual Cryptography in the Video using Halftone Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 14
%P 19-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The image cryptography is one of the techniques used in the data security during communication over public domain. In the many researchers are working to make the visual cryptography techniques more robust and secure against the attack. In this paper, we have proposed the visual cryptography in the video with the halftone image as a secrete image. We have used Floyd and Jarvis technique for halftoning. The comparative results of PSNR and RMSE has been given in paper for these two techniques.

References
  1. Visual Cryptography and Its Applications, Jonathan Weir, WeiQi Yan, BookBoon 2012
  2. Shen Ying," Visual Cryptography based Multiparty Copyright Protect Scheme", 978-1-4244-5848-6/10/ ©2010 IEEE
  3. George Abboud, Jeffrey Marean, Roman V. Yampolskiy," 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering", 978-0-7695-4052-8/10 © 2010 IEEE DOI 10. 1109/SADFE. 2010. 14
  4. Young-Chang Hou, Pei-Hsiu Huang," Image protection based on visual cryptography and statistical property", 2011 IEEE Statistical Signal Processing workshop (SSP)
  5. Sowmya Suryadevara, Rohaila Naaz, Shweta, Shuchita Kapoor, Anand Sharma," Visual Cryptography Improvises the Security of Tongue as a Biometric in Banking System", International Conference on Computer & Communication Technology (ICCCT)-2011, 978-1-4577-1386-611@2011 IEEE
  6. M. Naor, A. Shamir, "Visual cryptography,"Advances in Cryptology-EUROCRYPT'94, LNCS, vol. 950,pp. 1-10,1995.
  7. C. C. Wu, L. H. Chen, "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R. O. C. , 1998.
  8. S. J. Shyu, S. Y. Huanga, Y. K. Lee, R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual cryptography", Pattern Recognition, Vol. 40, Issue 12, pp. 3633-3651,2007.
  9. Wen-Pinn Fang, "Visual Cryptography In Reversible Style", IEEE Proceedingon the Third International Conference on Intelligent Information Hidingand Multimedia Signal Processing (IIHMSP2007), Kaohsiung, Taiwan, R. O. C,2007
  10. Zhi Zhou, Member,Gonzalo R. Arce, Giovanni Di Crescenzo, "Halftone Visual Cryptography", IEEE transactions on image processing, vol. 15, no. 8, august 2006
  11. Zhi-hui Wang, Chin-Chen Chang, Huynh Ngoc Tu, "Sharing a Secret Image in Binary Images with Verification" Journal of Information Hiding and Multimedia Signal Processing Volume 2, Number 1, January 2011
  12. Gopi Krishnan S and Loganathan D,"Color Image Cryptography Scheme Based on Visual Cryptography ",Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011)
  13. Han Yanyan, Cheng Xiaoni, Yao Dong, He Wencai," VVCS: Verifiable Visual Cryptography Scheme", 2011 Seventh International Conference on Computational Intelligence and Security
  14. Nitty Sarah Alex, L. Jani Anbarasi," Enhanced Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography".
  15. J. K. Mandal, Subhankar Ghatak, "A Novel Technique for Secret Communication through Optimal Shares using Visual Cryptography (SCOSVC)", 2011 International Symposium on Electronic System Design.
  16. InKoo Kang, Gonzalo R. Arce, Heung-Kyu Lee, " Color Extended Visual Cryptography Using Error Diffusion", IEEE transactions on image processing, vol. 20, no. 1, january 2011
Index Terms

Computer Science
Information Sciences

Keywords

Halftone Embedding PSNR RMSE etc.