CFP last date
20 January 2025
Reseach Article

Extended Visual Cryptography for Color Images and its PSNR Analysis

by L M Varalakshmi, Prithy R, Radhika Parameswari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 17
Year of Publication: 2013
Authors: L M Varalakshmi, Prithy R, Radhika Parameswari
10.5120/11487-7189

L M Varalakshmi, Prithy R, Radhika Parameswari . Extended Visual Cryptography for Color Images and its PSNR Analysis. International Journal of Computer Applications. 67, 17 ( April 2013), 17-22. DOI=10.5120/11487-7189

@article{ 10.5120/11487-7189,
author = { L M Varalakshmi, Prithy R, Radhika Parameswari },
title = { Extended Visual Cryptography for Color Images and its PSNR Analysis },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 17 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number17/11487-7189/ },
doi = { 10.5120/11487-7189 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:42.024140+05:30
%A L M Varalakshmi
%A Prithy R
%A Radhika Parameswari
%T Extended Visual Cryptography for Color Images and its PSNR Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 17
%P 17-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography (VC) is a cryptographic technique which allows visual information (pictures, text, etc. ) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Color visual cryptography encrypts a color secret message into n color halftone image shares. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. In order to reduce the size and the distortion of decrypted image we propose the visual cryptography for color image using visual information pixel (VIP) synchronization and floyd error diffusion dithering technique. This technique improves the quality of decrypted image compared to other dithering techniques. Comparisons with previous approaches show the superior performance of the new method.

References
  1. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT, 1994, pp. 1–12.
  2. Hsien-Chu Wu1, Hao-Cheng Wang2, and Rui-Wen Yu3, "Color Visual Cryptography Scheme Using Meaningful Shares", Eighth International Conference on Intelligent Systems Design and Applications, February 2010.
  3. SaiChandana B. , Anuradha S. , "A New Visual Cryptography Scheme for Color Images", International Journal of Engineering Science and Technology, Vol 2 (6), 2010.
  4. G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson, Visual cryptography for general access structures, Inform. Comput. 129 (1996) 86–106.
  5. D. S. Wang, F. Yi, and X. Li, "On general construction for extended visual cryptography schemes," Pattern Recognit. , pp. 3071–3082, 2009.
  6. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
  7. C. N. Yang and T. S. Chen, "Visual cryptography scheme based on additive color mixing," Pattern Recognit. , vol. 41, pp. 3114–3129, 2008.
  8. Y. C. Hou, "Visual cryptography for color images," Pattern Recognit. , vol. 36, pp. 1619–1629, 2003.
  9. InKoo Kang, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Heung-Kyu Lee, Member, IEEE, " Color Extended Visual Cryptography Using Error Diffusion," IEEE Transactions on image processing, vol. 20, no. 1, pp. 132-145, January 2011.
  10. R. Escbbach, Z. Fan, K. T. Knox, and G. Marcu, "Threshold modulation and stability in error diffusion," IEEE Signal Process. Mag. , vol. 20, no. 4, pp. 39–50, Jul. 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Color meaningful shares digital halftoning floyd error diffusion secret sharing visual cryptography (VC)