CFP last date
20 December 2024
Reseach Article

Journey of VCS from Black and White Images to Colored Images with their Performance Analysis

by Neha Gupta, Manish Gupta, Abhishek Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 9
Year of Publication: 2013
Authors: Neha Gupta, Manish Gupta, Abhishek Mishra
10.5120/13768-1621

Neha Gupta, Manish Gupta, Abhishek Mishra . Journey of VCS from Black and White Images to Colored Images with their Performance Analysis. International Journal of Computer Applications. 79, 9 ( October 2013), 15-20. DOI=10.5120/13768-1621

@article{ 10.5120/13768-1621,
author = { Neha Gupta, Manish Gupta, Abhishek Mishra },
title = { Journey of VCS from Black and White Images to Colored Images with their Performance Analysis },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 9 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number9/13768-1621/ },
doi = { 10.5120/13768-1621 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:33.647462+05:30
%A Neha Gupta
%A Manish Gupta
%A Abhishek Mishra
%T Journey of VCS from Black and White Images to Colored Images with their Performance Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 9
%P 15-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptography(VC), an emerging technology for secret sharing which allows visual information (pictures, text, etc. ) to be encrypted in such a way that the decryption can be performed by the human vision system(HVS). Originally it was proposed by Naor and Shamir in 1994 for black and white images. Later this technique is extended for gray level images as well as for color images. This paper compares and analyze the performance of various VCS on various parameters such as pixel expansion, contrast, shares generated etc. The compared algorithms came into aura by rectifying limitations of one another.

References
  1. G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson. Visual cryptography for general access structures. Inf. Comput. , 129(2):86–106, 1996.
  2. Y. C. Hou. Visual cryptography for color images. Pattern Recognition, 36:1619–1629, 2003.
  3. S. Cimato, R. Prisco, A. De Santis, Probabilistic visual cryptography schemes, Computer J. 49 (2006) 97--107.
  4. C. N. Yang and T. S. Chen, "Colored visual cryptography scheme based on additive color mixing," Pattern Recognition, vol. 41, no. 10, pp. 3114–3129, 2008.
  5. Xiaoyu Wu1, Duncan S. Wong2, and Qing Li2 "Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion " 26-28,Dec. 2009, pp. 310-315
  6. M. Naor and A. Shamir. Visual cryptography. In Advances in Cryptology - EUROCRYPT '94, pages 1–12, 1994. Lecture Notes in Computer Science
  7. E. Verheul and H. van Tilborg. Construction and properties of k out of n visual secret sharing schemes. 1997.
  8. R. Gonzalez and R. Woods, Digital Image Processing Fourth Impression
Index Terms

Computer Science
Information Sciences

Keywords

Visual cryptography Pixel Expansion Halftone technology Color decomposition Color Visual Cryptography