CFP last date
20 December 2024
Reseach Article

An improved approach for Extended Visual Cryptography Scheme for Colour Images

Published on March 2012 by Bhandare Shital, Jhade Manoj, Jadhav Angarika
International Conference in Computational Intelligence
Foundation of Computer Science USA
ICCIA - Number 10
March 2012
Authors: Bhandare Shital, Jhade Manoj, Jadhav Angarika
0bb08758-cb93-42e8-8559-c1f1f9019609

Bhandare Shital, Jhade Manoj, Jadhav Angarika . An improved approach for Extended Visual Cryptography Scheme for Colour Images. International Conference in Computational Intelligence. ICCIA, 10 (March 2012), 1-5.

@article{
author = { Bhandare Shital, Jhade Manoj, Jadhav Angarika },
title = { An improved approach for Extended Visual Cryptography Scheme for Colour Images },
journal = { International Conference in Computational Intelligence },
issue_date = { March 2012 },
volume = { ICCIA },
number = { 10 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/iccia/number10/5161-1073/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Computational Intelligence
%A Bhandare Shital
%A Jhade Manoj
%A Jadhav Angarika
%T An improved approach for Extended Visual Cryptography Scheme for Colour Images
%J International Conference in Computational Intelligence
%@ 0975-8887
%V ICCIA
%N 10
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

Visual Cryptography is an image encryption technique used to hide the secure information in images. It allows the encryption of secret image into n number of shares and distributed into n number of participants. For example in (k, n) secret sharing problem the secret image can be visually recover by stacking together any k or more transparencies of the shares. But cannot reveal any secrete information by stacking less than k transparencies together. The Embedded EVCS is constructed by adding random shares of secret image into meaningful covering images. The proposed system will work with color images which is not possible with existing embedded EVCS approach. This approach will test the same algorithm for color images which will take the R, G, B values separately and add shares to it. It will improve the contrast of the recovered secret image and produce clear resultant image.

References
  1. Embedded Extended Visual Cryptography Schemes F Liu… - … Forensics and Security, IEEE Transactions on, 2011 - ieeexplore.ieee.org
  2. Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography,”IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006.
  3. M. Nakajima and Y. Yamaguchi, “Extended visual cryptography for natural images,” in Proc. WSCG Conf. 2002, 2002, pp. 303–412.
  4. D. S. Tsai, T. Chenc, and G. Horng, “On generating meaningful shares in visual secret sharing scheme,” Imag. Sci. J., vol. 56, pp. 49–55, 2008.
  5. Z.M.Wang, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol.4, no. 3, pp. 383–396, Sep. 2009
  6. M. Naor and B. Pinkas, “Visual authentication and identification,” in Proc. CRYPTO’97, 1997, vol. 1294, pp. 322– 336, Springer-Verlag LNCS.
  7. T. H. Chen and D. S. Tsai, “Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol,” Pattern Recognit., vol. 39, pp. 1530–1541, 2006.
  8. P. Tuyls, T. Kevenaar, G. J. Schrijen, T. Staring, and M. Van Dijk,“Security displays enabling secure communications,” in Proc. First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, 2004, vol. 2802, pp. 271–284.
  9. M. Naor and A. Shamir, “Visual cryptography,” in Proc. OCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12,Springer-Verlag, LNCS.
  10. L. A. MacPherson, “Grey Level Visual Cryptography for General Access Structures,”Master Thesis, University ofWaterloo,Waterloo, ON, Canada, 2002.
  11. D. Jin, W. Q. Yan, and M. S. Kankanhalli, “Progressive color visual cryptography,” J. Electron. Imag., vol. 14, no. 3, p. 033019, 2005.
  12. C. C. Lin and W. H. Tsai, “Visual cryptography for graylevel images by dithering techniques,” Pattern Recognit. Lett., vol. 24, no. 1-3, pp. 349–358, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Embedded extended visual cryptography scheme (embedded EVCS) Halftoning secret sharing