We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes

by D. Madhavi, A. Vasu Devasastry
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 2
Year of Publication: 2014
Authors: D. Madhavi, A. Vasu Devasastry
10.5120/14959-3131

D. Madhavi, A. Vasu Devasastry . A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes. International Journal of Computer Applications. 86, 2 ( January 2014), 27-29. DOI=10.5120/14959-3131

@article{ 10.5120/14959-3131,
author = { D. Madhavi, A. Vasu Devasastry },
title = { A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 2 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number2/14959-3131/ },
doi = { 10.5120/14959-3131 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:11.752542+05:30
%A D. Madhavi
%A A. Vasu Devasastry
%T A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 2
%P 27-29
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

VC, EVCS and Color EVCS are the three techniques used for Visual Cryptography Schemes. Visual Cryptography Scheme (VCS) is one of the techniques used to encrypt the image by dividing the original image into transparencies called Shares. A set of qualified participants is able to recover the secret image. An Extended Visual Cryptography Scheme (EVCS) is a kind of VCS which consists of embedded random shares realized by embedding shares into covering shares. Color Visual Cryptography (VC) encrypts a color secret image into n color halftone image shares. Different methods for VC have different algorithms to provide cryptography for images. Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and the security of encrypted transparency shares. Generally, Visual Cryptography suffers from the deterioration of the image quality and security. Many authors are proposed different algorithms for these parameters. This paper describes the trade-off between the image quality and the security is discussed by comparing these VC schemes.

References
  1. M. Naor, A. Shamir, 1994. "Visual Cryptography". Lecture Notes in Computer Science, Vol. 950, pp. 1-12. http://link. springer. com/chapter/10. 1007%2FBFb0053419
  2. Jim Cai, 2003. A Short Survey on Visual Cryptography Schemes. Technical Paper. CiteSeerx, Penn State University, doi: 10. 1. 1. 85. 3060. http://www. cs. toronto. edu/~jcai/paper. pdf
  3. J. K Mandal, A. Khamuri, 2011. A Data Embedding Technique for Gray scale Image using Genetic Algorithm (DEGGA). IEEE sponsored International Conference on Communication, Computing and Security, Proceedings by Excel India Publishers. ISBN-978-93-80697-505, NIT Rourkela, 7-9 January 2011, pp. 19-22, (SP_2011_2001). http://jkmandal. com/pdf/DEGGA. pdf
  4. Nakajima, M. and Yamaguchi, Y. , 2002. Extended Visual Cryptography for Natural Images, WSCG02, 303. http://wscg. zcu. cz/wscg2002/papers_2002/a73. pdf
  5. Anuprita Mande, Manish Tibdewal, 2013. "A Fast Encryption Algorithm for Color Extended Visual Cryptography" International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013. http://www. ijetae. com/files/Volume3Issue4/IJETAE_0413_64. pdf
  6. T. Rajitha, P. Pradeep Kumar, V. Laxmi, 2012. Construction of Extended Visual Cryptography Scheme for Secret Sharing. International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4 (August 2012), ISSN 2277-5420. http://ijcsn. org/IJCSN-2012/1-4/IJCSN-2012-1-4-56. pdf
  7. Mohsen Heidarinejad, K. N. Plataniotis, Edward S. Rogers. 2007. A Karnaugh Map Based {2, 2} Visual Cryptographic Scheme for Color Images. Technical Paper. University of Toronto. April 3, 2007.
  8. Wang Dao-Shun, Zhang Lei, Ma Ning and Huang Lian-Sheng. Secret Color Images Sharing Schemes based on XOR operation. Technical Paper. Tsinghua University, Beijing, 100084, China. http://eprint. iacr. org/2005/372. pdf
  9. H. Koga, H. Yamamoto, 1998. Proposal of a Lattice-based Visual Secret Sharing Scheme for Color and Gray Scale Images. IEICE Transaction on Fundamentals, Vol. E81-A (6):1262-1369. http://hirosuke. it. k. u-tokyo. ac. jp/files/abst/pdfs/E81-A-6-1262. pdf
  10. Adi Shamir, 1979 "How to share a secret". Computer Communications. ACM, vol. 22, no. 11, pp. 612-613, doi:10. 1145/359168. 359176. http://www. iacr. org/archive/asiacrypt2001/22480554. pdf
  11. M. Naor, A. Shamir, in: M. Lomas, ed. , Visual Cryptography II: Improving the Contrast via the Cover Base, Presented at Seurity in Communication Networks, AmalE, Italy, September 16-17, 1996. Lecture Notes in Computer Science, Vol. 1189, Springer, Berlin, 1997, pp. 197-202. Available also at Theory of Cryptography Library, Report 96-07. http://citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 21. 4631&rep=rep1&type=pdf
  12. Sozan Abdulla, 2010. "New Visual Cryptography Algorithm for Colored Image". Journal of Computing, Vol. 2, Issue 4 (21-25), April 2010, ISSN: 2151-9617. http://arxiv. org/ftp/arxiv/papers/1004/1004. 4445. pdf
  13. L. W. Hawkes, A. Yasinsac, C. Cline, 2000. An Application of Visual Cryptography to Financial Documents. Technical Paper. Security and Assurance in Information technology Laboratory, Florida State University, Tallahassee, FL 32306-4530. http://websrv. cs. fsu. edu/research/reports/TR-001001. pdf
  14. Chang-Chou Lin, Wen-Hsiang Tsai, 2003. Visual Cryptography for Gray-level Images by Dithering Techniques, Pattern Recognition Letters 24 (2003) 349-358. ELSEVIER. Available at Computer Science Web, powered by SCIENCE DIRECT. http://www. cis. nctu. edu. tw/~whtsai/Journal%20Paper%20PDFs/Lin_&_Tsai_PRL_2003. pdf
  15. Young-Chang Hou, 2003. Visual Cryptography for Color Images. Technical report. Pattern recognition 36 (2003) 1619-1629. Journal of the Pattern recognition society, PERGAMON. Published by ELSEVIER. http://csis. bits-pilani. ac. in/faculty/murali/netsec-10/seminar/refs/muralikrishna3. pdf
Index Terms

Computer Science
Information Sciences

Keywords

VCS (Visual Cryptography Scheme) EVCS (Extended Visual Cryptography Scheme) Color EVCS DEGGA (Data Embedding Technique for Grayscale Image using Genetic Algorithm)