CFP last date
20 December 2024
Reseach Article

Framework for Visual Cryptographic based Encryption and Decryption

by Saumya Awasthi, Ajay Pratap, Romesh Srivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 3
Year of Publication: 2017
Authors: Saumya Awasthi, Ajay Pratap, Romesh Srivastava
10.5120/ijca2017913485

Saumya Awasthi, Ajay Pratap, Romesh Srivastava . Framework for Visual Cryptographic based Encryption and Decryption. International Journal of Computer Applications. 163, 3 ( Apr 2017), 17-20. DOI=10.5120/ijca2017913485

@article{ 10.5120/ijca2017913485,
author = { Saumya Awasthi, Ajay Pratap, Romesh Srivastava },
title = { Framework for Visual Cryptographic based Encryption and Decryption },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 3 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 17-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number3/27375-2017913485/ },
doi = { 10.5120/ijca2017913485 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:09.187220+05:30
%A Saumya Awasthi
%A Ajay Pratap
%A Romesh Srivastava
%T Framework for Visual Cryptographic based Encryption and Decryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 3
%P 17-20
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, main focus is on the development of an encryption-decryption framework using some object oriented language and its development. The environmental analysis is done with the help of various types of UML diagrams and then its framework for implementation is designed. Basically, object-oriented analysis (OOA) and object-oriented design (OOD) methodologies examine the problem in the real world and facilitate in decomposing the problem in terms of classes, and some relationships between classes. A framework for implementation of visual cryptography based on encryption and decryption is presented and implemented. Target image is converted into black & white image and one digitized image, after that both are send to user site separately. Decryption is performed by the overlapping of these two images.

References
  1. Naor, M., and Shamir, A.(1995), Visual cryptography, in “Advances in Cryptology Eurocrypt „94”(A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp.112, Springer, Berlin.
  2. G. Ateniese, C. Blundo, A. De Santis, D.R.Stinson, “Visual Cryptography for General Access Structures”, Proc. ICALP96, Springer, Berlin, 1996,pp 416-428
  3. Chang-Chou Lin, Wen-Hsaing Tsai, “Visual Cryptography for Gray Level Images by Dithering Techniques”, Pattern Recognition Letters, v.24n.1-3.
  4. Nakajima, M. and Yamaguchi, Y., “Extended Visual Cryptography for Natural Images”. Journal of WSCG. v10 i2.303-310.
  5. Wang, R.Z.[Ran-Zan], “Region Incrementing Visual Cryptography”. SP Letters(16), No. 8, 2009, pp 659-662.
  6. Shyu, Huang, Lee, Wang, Chen, Elsevier, Science Direct, The Journal of the Pattern Recognition, 2007, pp 3633-3651.
  7. Seema Rani, Naveen Kumar, Journal of Innovation in Computer Science and Engineering, “Visual Cryptography for Image Secure Shares”, Vol. 4(1), Jul – Dec 2014 @ ISSN 2278-0947, pp 37-41
  8. S. Halevy and P. Roadway, A tweak able enciphering mode, in Lecture Notes in Computer Science, D. Bone, Ed. Berlin, Germany: Springer-Vela, 2003, vol. 2729, pp. 482-499.
  9. P. Sarkar, Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions. http://eprint.iacr.org/2008/004.pdf
  10. Vrinda A, Mr. Arun Anoop M, “Securing Images using Encryption Techniques”, International Journal of Computing and Technology, Volume 1, Issue 2, March 2014.
  11. Aman Jain, Namita Tiwari, Madhu Shandilya, “Image Based Encryption Techniques”, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014.
  12. Mohammad Sajid Qamruddin Khizrai , Prof.S.T.Bodkhe , ”Image Encryption using Different Techniques for High Security Transmission over a Network”, International Journal of Engineering Research and General Science, Volume 2, Issue 4, June-July, 2014.
  13. Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, and Guorui Feng, “Compressing Encrypted Images With Auxiliary Information”, IEEE transactions on multimedia, vol. 16, no. 5, august 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Gray Scale Image Image digitization