CFP last date
20 January 2025
Reseach Article

Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption

Published on October 2014 by Prasanna Kumar H. R, Niranjan N. Chiplunkar, Archana R Priyadarshini
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 6
October 2014
Authors: Prasanna Kumar H. R, Niranjan N. Chiplunkar, Archana R Priyadarshini
72dbdb71-4a9d-4f74-8ee9-e6afa8d9dc66

Prasanna Kumar H. R, Niranjan N. Chiplunkar, Archana R Priyadarshini . Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption. International Conference on Information and Communication Technologies. ICICT, 6 (October 2014), 16-21.

@article{
author = { Prasanna Kumar H. R, Niranjan N. Chiplunkar, Archana R Priyadarshini },
title = { Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 6 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 16-21 },
numpages = 6,
url = { /proceedings/icict/number6/18006-1464/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Prasanna Kumar H. R
%A Niranjan N. Chiplunkar
%A Archana R Priyadarshini
%T Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 6
%P 16-21
%D 2014
%I International Journal of Computer Applications
Abstract

In recent years, there has been a rapid growth on information technology for people to communicate on the Internet. Since Internet is public, anyone can easily read the information and perform successful transmissions without protection. In the present era of computers and fast communication, one needs to protect the communicated information from unauthorized users. For this purpose, Visual Cryptography is introduced to provide confidentiality and security when visual data are transmitted through unsecured communication channels. In this paper, we depict the security of image encryption by the concept of Visual Cryptography Scheme(VCS) . The concept of image fusion helps us to extract features from feature set of different sources and also in applications like remote sensing. Techniques such as DCT based image compression and decompression are used mainly to have high data rates. Further this paper also aims to reduce storage requirements and also our scheme is much more effective for multimedia image compression(energy compaction) and decorrelation by the application of DCT.

References
  1. Prakash Chandra Jena1, Nikunja Kanta Das2, A Survey on Visual Cryptography using Image Encryption and Decryption, International Journal of Emerging Technology and Advanced Engineering ,ISSN 2250-2459l, Volume 3, Issue 8, August 2013.
  2. Pravin B. Pokle, N. G. Bawane, Lossy Image Compression using Discrete Cosine Transform, National Conference on Innovative Paradigms in Engineering & Technology (NCIPET-2012) , Proceedings published by International Journal of Computer Application IJCA.
  3. Jagdeep Verma, Dr. Vineeta Khemchandani ,A Visual Cryptographic Technique to Secure Image Shares, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 1, pp. 1121-1125, Jan-Feb 2012 .
  4. S. Manimurugan, Dr. K. Porkumaran, New Fast and Efficient Visual Cryptography Scheme for Medical Images with Forgery Detection, Proceedings of ICETECT 2011.
  5. Er. Supriya Kinger, Efficient Visual Cryptography, Journal of Emerging Technologies in Web Intelligence, VOL. 2, NO. 2, pp. 137-141,MAY 2010
  6. P. S. Revenkar, Anisa Anjum, W . Z. Gandhare, Survey of Visual Cryptography Schemes, International Journal of Security and Its Applications, Vol. 4, No. 2, pp. 49-56,April- 2010
  7. Z. Zhou, G. R. Arce, and G. Di Crescenzo, "Halftone Visual Cryptography," IEEE Trans on Image Processing to appear in 2006
  8. R. C. Gonzalez and R. E. Woods, "Digital Image Processing", 2nd Ed. , Prentice Hall, 2004.
  9. G. Ateniese, C. Blundo, A. DeSantis, D. R. Stinson, Visual Cryptography for general Access structures, Proc. ICALP96, Springer,Berlin,1996,pp. 416-428.
  10. M. Naor and A. Shamir, "Visual cryptography," Adv. Cryptol. : EUROCRYPT, Lecture Notes Comput. Sci. , vol. 950, pp. 1-12, 1995.
  11. Naor, M. , and Shamir, A. (1995), Visual cryptography, in ''Advances in Cryptogoly Eurocrypt '94'' (A. DeSantis, Ed. ), Lecture Notes in Computer Science, Vol. 950, pp. 112, Springer-Verlag, Berlin
  12. Andrew B. Watson, Image Compression Using the Discrete Cosine Transform ,Mathematica Journal, 4(1), 1994, p. 81-88
  13. www. ee. ic. ac. uk/hp/staff/dmb/courses/DSPDF/00300_Transforms. pdf
  14. www. fe. infn. it/u/filimanto/scienza/webkrypto/visualdecryption. pdf?
  15. R. L. Rivest and A. Shamir, "How to expose an eavesdropper", Communications of the Association for Computing Machinery, vol. 27, no. 4, pp. 393-395, 1984.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Scheme Dct Energy Compaction Quantization Fast Fourier Transform.