We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence

by Shyamalendu Kandar, Bibhas Chandra Dhara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 11
Year of Publication: 2011
Authors: Shyamalendu Kandar, Bibhas Chandra Dhara
10.5120/3160-4377

Shyamalendu Kandar, Bibhas Chandra Dhara . k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. International Journal of Computer Applications. 25, 11 ( July 2011), 6-11. DOI=10.5120/3160-4377

@article{ 10.5120/3160-4377,
author = { Shyamalendu Kandar, Bibhas Chandra Dhara },
title = { k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 11 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number11/3160-4377/ },
doi = { 10.5120/3160-4377 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:11:30.350292+05:30
%A Shyamalendu Kandar
%A Bibhas Chandra Dhara
%T k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 11
%P 6-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a special type of encryption technique where visual information (Image, Text etc) gets encrypted in such a way that decryption can be performed by Human Visual System with a computation free decryption process. The beauty of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique needs cryptographic computation to divide the image into a number of parts let n such that at least a group of k shares out of n shares reveals the secret information, less of it will reveal no information. In this paper we have discussed a technique called random sequence which needs very less computation for k-n secret sharing.

References
  1. M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, pp. 1–12, 1995.
  2. Ranjan Parekh, “Principles of Multimedia”, TMH, 2006
  3. John F Koegel Buford, Multimedia Systems, Addison Wesley, 2000.
  4. Kandar Shyamalendu, Maiti Arnab, “K-N Secret Sharing Visual Cryptography Scheme For Color Image Using Random Number”, International Journal of Engineering Science and Technology, Vol.3 No. 3 March 2011, pp 1851-1857
  5. Kandar Shyamalendu, Maiti Arnab, “Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number”, International Journal of Computer Application, Vol. 19 No. 4, April 2011. pp34-39
  6. Kandar Shyamalendu, Maiti Arnab, Dhara Bibhas Chandra “Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking” International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 pp543-549
  7. A. Shamir: “How to share a secret ?” Comm ACM, 22(11):612-613, 1979.
  8. G. Blakley : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  9. C. Asmuth and J. Bloom “A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):208-210, 1983.
  10. Hartung F., Kuttter M., “Multimedia Watermarking Techniques”, 1999 IEEE
  11. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE Journal on Selected Areas in Communications, 16(4):573–586, May 1998
  12. Nakajima M. , Yamaguchi Y., Extended visual cryptography for natural images. Journal of WSCG.v10 i2. 303-310.
  13. F. Liu, C. K. Wu, X.J. Lin, “Colour visual cryptography schemes” IET Information Security, 2008, Vol. 2, No. 4, pp. 151–165
  14. Kang InKoo el. at., Color Extended Visual Cryptography using Error Diffusion, IEEE 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Secret Sharing Random Sequence