CFP last date
20 January 2025
Reseach Article

Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm

by Bharanivendhan N, Amitha T
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 8
Year of Publication: 2014
Authors: Bharanivendhan N, Amitha T
10.5120/16028-5079

Bharanivendhan N, Amitha T . Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm. International Journal of Computer Applications. 92, 8 ( April 2014), 11-16. DOI=10.5120/16028-5079

@article{ 10.5120/16028-5079,
author = { Bharanivendhan N, Amitha T },
title = { Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 8 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number8/16028-5079/ },
doi = { 10.5120/16028-5079 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:45.426034+05:30
%A Bharanivendhan N
%A Amitha T
%T Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 8
%P 11-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptography Schemes (VCS) is a method of image encryption used to hide the secret information in images. In the traditional VCS, the secret image is encrypted into n number of shares randomly and distributed to the n number of participates. The secret image can be recovered simply by stacking the shares without any complex computation involved. However previous approach suffers a security, pixel expansion and noise problem. The proposed system consists of two phases. At the sender side, the input secret image generates the four meaningless shares based on GAS algorithm is done in the first phase. In the second phase, the cover images are added in each shares directly by using stamping algorithm and distributed the embedded images to the participants. At the receiver side, the embedded images can be processed to extract the covering images from the generated shares and the secret images can be retrieved by overlapping the shares in the correct order. The password authentication is also provided at both the sender and receiver side. The proposed system provides high security, increase in the number of shares and reduce the pixel expansion problem and high resolution to visualize the secret image.

References
  1. M. Naor and A. Shamir, "Visual cryptography," in Proc. EUROCRYPT' 94, Berlin, Germany, 1995, vol. 950, pp. 1–12, Springer-Verlag, LNCS.
  2. M. Naor and B. Pinkas, "Visual authentication and identification," Springer-Verlag LNCS, vol. 1294, pp. 322–336, 1997.
  3. C. Blundo, A. De Bonis, and A. De Santis, "Improved schemes for visual cryptography," Designs, Codes and Cryptography, vol. 24, pp. 255–278, 2001.
  4. Z. Zhou, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography," IEEE Trans. Image Process. , vol. 15, no. 8, pp. 2441–2453, Aug. 2006.
  5. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, "Halftone visual cryptography via error diffusion," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
  6. D. S. Tsai, T. Chenc, and G. Horng, "On generating meaningful shares in visual secret sharing scheme," Imag. Sci. J. , vol. 56, pp. 49-55, 2008.
  7. M. Amarnath Reddy, P. Shanthi Bala, G. Aghila, "Comparison of Visual Cryptographic Schemes," IJEST, vol. 3 no. 5, pp. 4145-4150, 2011
  8. Guzin Ulutas, Mustafa Ulutas, Vasif Nabiyev, "Distortion free geometry based secret image sharing" Procedia Computer Science, vol 3, pp. 721–726, 2011
  9. Mrs. Bhandare Shital, Mr. Jhade Manoj and Mrs. Jadhav Angarika," An improved approach for Extended Visual Cryptography Scheme for Colour Images", IJCA, no. 2, pp. 1-4, 2011
  10. Feng Liu and Chuankun Wu, "Embedded Extended Visual Cryptography Schemes," IEEE, vol. 6, no. 2, pp. 307-322, 2011.
  11. Xiaotian Wu and Wei Sun, "Random grid-based visual secret sharing for general access structures with cheat-preventing ability," The Journal of Systems and Software 85, pp. 1119– 1134, 2012
  12. Cheng Guo, Chin-Chen Chang, Chuan Qin, "A hierarchical threshold secret image sharing," Pattern Recognition Letters, vol 3, pp. 83–91, 2012
  13. Kai-Hui Lee and Pei-Ling Chiu,"An Extended Visual Cryptography Algorithm For General Access Structures," IEEE , vol. 7, no. 1, pp. 219-229, Feb 2012.
  14. Lonarkar S. G And Pande K. P,"Embedded Extended Visual Cryptography Schemes For Different Patterns" IJCS, vol 2, Issue 1, pp. 14-17, March 2012
  15. B. Sreenivas Rao, Chindam Sambasiva Rao, P Divya, SM Riyazoddin, "Analysis of Secret Sharing & Review on Extended Visual Cryptography Scheme", IJETTCS, vol 1, Issue 1, pp. 90-95, June 2012.
  16. Shyong Jiang Shyu, "Visual Cryptography of Random Grids for General Access Strctures", IEEE, vol. 23. no. 3, March 2013
Index Terms

Computer Science
Information Sciences

Keywords

Visual cryptography schemes (VCS) GAS algorithm stamping algorithm pixel expansion.