We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Improved Pixel Sieve Method for Visual Cryptography

by Vaibhav Choudhary, Pravin Kumar, Kishore Kumar, D.S. Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 9
Year of Publication: 2011
Authors: Vaibhav Choudhary, Pravin Kumar, Kishore Kumar, D.S. Singh
10.5120/1714-2297

Vaibhav Choudhary, Pravin Kumar, Kishore Kumar, D.S. Singh . An Improved Pixel Sieve Method for Visual Cryptography. International Journal of Computer Applications. 12, 9 ( January 2011), 7-10. DOI=10.5120/1714-2297

@article{ 10.5120/1714-2297,
author = { Vaibhav Choudhary, Pravin Kumar, Kishore Kumar, D.S. Singh },
title = { An Improved Pixel Sieve Method for Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 12 },
number = { 9 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number9/1714-2297/ },
doi = { 10.5120/1714-2297 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:12.177246+05:30
%A Vaibhav Choudhary
%A Pravin Kumar
%A Kishore Kumar
%A D.S. Singh
%T An Improved Pixel Sieve Method for Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 9
%P 7-10
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper an improved version of pixel sieve method is proposed to achieve more security then existing pixel sieve method. Based on cross merge and key shifting schemes, the proposed method generates quite noisy and highly secure encrypted images. The simulation shows that the quality of the encrypted images observably better than existing pixel sieve method.

References
  1. Moni Naor and Adi Shamir. Visual Cryptography, EUROCRYPT 1994, ppl- 12.
  2. Shamir, Adi. “How to share a secret”. Communications of the ACM 22 (II): 1979,6 12-613.
  3. A.Incze, “Pixel Sieve method for secret sharing & visual cryptography”. 9th RoEduNet IEEE International Conference 2010.
  4. P.S.Revenkar, Anisa Anjum, W .Z.Gandhare. " Survey of Visual Cryptography Schemes ". International Journal of Security and Its Applications ,Vol. 4, No. 2, April, 2010.
  5. Jui-Cheng Yen, Jiun-In Guo, "A new chaotic image encryption algorithm", Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
  6. M.Naor, B.Pinkas, Visual authentication and identification. Advances in Cryptology-CRYPTO'97 LectureNotes in Computer Science, Vol. 1294, pp. 322-336.
  7. Shang-Kuan Chen, Sian-Jheng Lin. “Non-expansible Flip-flop Visual Cryptography with perfect security”. 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  8. Frank Y. Shih " Digital Watermarking and Steganography: Fundamentals and Techniques" , CRC Press, 2007, ISBN: 978 1420047578.
  9. Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, "A new encription algorithm for image cryptosystems", The Journal of Systems and Software 58 (2001), 83-9 1.
  10. Jiun-In Guo, Jui-Cheng Yen, "A new mirror-like image encryption algorithm and its VLSI architecture", Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China.
  11. Ching-Sheng Hsu and Shu-Fen Tu, “Digital watermarking scheme with visual cryptography,” in Proceedings of the International Multi Conference of Engineers and Computer Scientists IMECS 2008 Vol I, March 19–21, 2008.
  12. Amir Houmansadr and Shahrokh Ghaemmaghami, “A novel video watermarking method using visual cryptography,” IEEE International Conference on Engineering of Intelligent systems, Islamabad, Pakistan, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

visual cryptography secret sharing encryption pixel expansion key shifting