CFP last date
20 January 2025
Reseach Article

Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding

by Sandeep Gurung, Gaurav Ojha, M K Ghose
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 10
Year of Publication: 2014
Authors: Sandeep Gurung, Gaurav Ojha, M K Ghose
10.5120/15021-3309

Sandeep Gurung, Gaurav Ojha, M K Ghose . Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding. International Journal of Computer Applications. 86, 10 ( January 2014), 19-24. DOI=10.5120/15021-3309

@article{ 10.5120/15021-3309,
author = { Sandeep Gurung, Gaurav Ojha, M K Ghose },
title = { Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 10 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number10/15021-3309/ },
doi = { 10.5120/15021-3309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:51.151144+05:30
%A Sandeep Gurung
%A Gaurav Ojha
%A M K Ghose
%T Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 10
%P 19-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The visual secret sharing (VSS) scheme encrypts the secret information into various meaningless shares. These shares are distributed to the authorized participants and the secret information can be retrieved by any k out of n participants by stacking their respective shares on top of each other. This scheme uses HVS (Human Visual System) to decrypt the information, and thus no technical or financial investment is required. Moreover, it is a one-time pad technique, so decrypting the information by an attacker is almost impossible. This paper proposes an improved visual secret sharing technique in which we aim to build upon the random grid approach of visual cryptography and test the feasibility of Recursive Image Hiding to hide multiple secrets at varying levels of the grids generated. Since we are using circular random grids, it is even possible to hide multiple images in the same grids and obtain the secret images for different angles of rotation of the grids. The participants need to be in possession of both the shares, as well as the fixes angle of rotation for which the secret can be obtained, in order to decrypt the image. In case of recursive image hiding, numerous secrets are hidden recursively in the shares of the original images at each level. Shares carry information for the subsequent secrets as well, thus leading to increased capacity. Also, the limitation on the number of secrets that can be hidden can be overcome because for each grid, multiple secrets can be recursively hidden. Thus, not only will we be able to hide multiple images, but multiple grids as well which in turn carry the information for multiple images.

References
  1. Shamir, "How to share a secret", Communications of the ACM, Vol. 22, pp. 612-613, 1979.
  2. Hsien-Chu Wu, Chin–Chen Chang, "Sharing visual multi- secrets using circle shares", Computer Standards and Interfaces 28 (2005) 123-135.
  3. H. C. Hsu, J. Chen, T. S Chen, Y. H. Lin, "Special type of circular visual cryptography for multiple secret hiding", The Imaging Science Journal 55(3)(2007) 175-179.
  4. Jeanne Chen, Tung-Shou Chen, Hwa-Ching Hsu, Hsiao- Wen Chen, "New visual cryptography system based on circular shadow image and fixed angle segmentation", Journal of Electronic Image(413), 033018 (Jul-Sep 2005).
  5. Lekhika Chhetri, Sandeep Gurung, "Recursive information hiding in threshold visual cryptography scheme", International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue 5 (May 2013).
  6. L. H Chen, C. C. Wu, "A study on Visual Cryptography", Master thesis, Institute of Computer and Information Science, National Chiao, Tung University, Taiwan, R. O. C, 1998.
  7. M. Naor, A. Shamir, Proceedings of advances in cryptology: Eurocrypt94, Lecture Notes in Computer Science, vol. 950, (1995).
  8. Meenakshi Gnanaguruparan , Subhash Kak , "Recursive Hiding Of Secrets In Visual Cryptography" in Cryptologia, Volume XXVI ,Issue 1(2002).
  9. O. Kafri, E. Keren, "Encryption of pictures and shapes by Random Grids", Optics Letters 12 (1987).
  10. S. J. Shyu, "Image Encryption by Random Grids", Pattern Recognition 40(2007) 1014-1031.
  11. S. J. Shyu, "Image encryption by multiple random grids", Pattern Recognition 42(7)(2009) 1582-1596.
  12. T. H Chen, K. H Tsao, "Image encryption by (n,n) random grids" in Proceedings of the 18th Information Security Conference, Taiwan, 2008.
  13. T. H Chen, C. C. Wu, "Visual secret sharing by random grids revisited", Pattern Recognition 42(2009) 2203-2217.
  14. T. H. Chen, K. H. Tsao, K. C. Wei, "Multiple-image encryption by rotating random grids", Proceedings of the 8th International Conference on Intelligent System Design and Applications (2008).
  15. Tzung-Her Chen, Kuang-Che Li, "Multi-image encryption by circular random grids", Information Sciences, Vol. 189, (April 2012).
  16. W. P. Fang, J. C Lin, "Visual Cryptography with extra ability of hiding confidential data", Journal of Electronic Imaging 15(2) (2006).
Index Terms

Computer Science
Information Sciences

Keywords

Recursive image hiding secret message shares random grids threshold hidden image rotation.