Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
As a result of rapid advancement of various kinds of Internet technologies, more and more information are to be transmitted to all parts of the world from everywhere through the Net. In such cases the senders have to take into consideration the information security issues so that they can trustingly enjoy the speed and convenience that is offered by an Internet. The data sent through an Internet may include some important secret images. " Visual Cryptography " is the technique developed to provide security and authentication to these images. Many attempts have been made from within the cryptographic community to provide security to these secret images. In this paper we will make a review Cryptography Schemes that are used store and transmit the secret images. We will also compare the respective algorithms of all the schemes with respect to the parameters such as PSNR and perceived error.
2018
Visual cryptography, a popular and simple technique uses the characteristics of human vision to decrypt encrypted images. It requires no computation for decryption from the user end. This paper emphasizes on basic cryptographic scheme proposed by Naor and Shamir with changed shares. Here, we focus on different shares with different combination of CMY color scheme to check whether proper encryption has taken place. Different combinations of shares were employed and the contrast reduction for decrypted images was 50% for some of the combinations which were also achieved earlier. Most of these studies, however, concentrated on binary images but very few on grayscale and color images. In this paper, a technique is presented to apply the visual cryptography scheme on colored images.
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information. The receiver aligns the layers and the secret information is revealed by human vision without any complex computation. The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures. The decoding requires only selecting some subset of these 3 images, making transparencies of them, and stacking them on top of each other, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together. The reconstructed image achieved in same size with original secret image.
International Journal of Computer Applications, 2014
Cryptography is an art and science of achieving security by encoding the message to make them non-readable. Extended Visual Cryptography is a type of cryptography which encodes a number of images in the way that when the images on transparencies are stacked together, the hidden message appears without a trace of original images. The decryption is done directly by the human visual system(HVS) with no special cryptographic calculations. We present a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures. The third picture is reconstructed by printing the two output images onto transparencies and stacking them together. Generally, visual cryptography suffers from the deterioration of the image quality. This paper also describes the method to improve the quality of the output images.
2018
The visual cryptography is a type of cryptography that allows digital images to be divided into multiple numbers of printable shares called transparent shares. The images are transmitted after applying the visual cryptographic technique. The hacker cannot understand the distorted image and thus the data communication become secured. It exploits the human visual system to read the secret message from some overlapped shares. This technique overcomes the disadvantage of complex computations required in traditional cryptography. Visual cryptography can also be applied to color images by converting them into black and white binary images. In this research work, visual cryptographic technique is proposed and encryption and decryption are done using Blowfish algorithm. The proposed technique is implemented with Matlab coding. Keywords— Visual Cryptography, XOR, 16 standard RGB Color Image, Blowfish Algorithm, Encryption, Decryption.
International Journal of Science and Research (IJSR)
Secret sharing is a method for distributing a secret among a group of participants. Visual Cryptography is a form of Visual Secret Sharing proposed by Moni Naor and Adi Shamir. Visual Cryptography Schemes hide the secret image into two or more images which are called shares. The secret image can be recovered simply by stacking the shares together without any complex computation involved. Color Visual Cryptography encrypts a color secret message into color halftone image shares. In this paper the various Visual Cryptography schemes are discussed and try to summarize the recent developments in Color Visual Cryptography technology.
Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). It is a kind of secret-sharing scheme that encrypts the secret image into n number of shares. It is imperceptible to reveal the secret information unless a certain number of shares(k) or more are superimposed. As the decryption process is done by human visual system, secret information can be retrieved by anyone if the person gets at least k number of shares. For this, simple visual cryptography is very insecure.
International journal of Emerging Trends in Science and Technology, 2016
Visual cryptography technique allows the visual information to be encrypted in such a way that their decryption can be performed by human visual system. Security has become an inseparable issue as Information Technology is ruling the world now. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security, rather one of the techniques. Visual cryptography can be applied for copy right for images, access control to user images ,visual authentication and identification any kind images of images like(normal or digital).Visual cryptography is a new technique which provides information security which user simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information (pictures, text, etc)to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique encrypts a secret image into shares such that stacking sufficient number of shares reveals the secret image. Shares are visually presented in transparencies.
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual cryptography is a secure process for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key given by the user. Further, the encrypted image is divided into N different shares. These N shares can be distributed but, the end user needs only K of these shares to regenerate the original image. After piling of K shares, the original image is generated but it is still in encrypted form. The key which is used to encrypt the image originally is now required again to decrypt the image, thus providing an additional level of security. This technique is proposed for binary image, Grey scale image & colour images. Here the symmetric key used for encryption and decryption is any string (like password). Such a technique thus would be lucrative for defence and security.
Procedia Computer Science, 2020
Security of data has become a necessity in today's world. Data as all know is the raw form and information can be extracted from it. Thus, data needs to be secured. This concern becomes even more significant when share information and it mostly constitute of images. As already know that a picture speaks a thousand words, there is no reason not to believe that picture carry the most information. Furthermore, they can be easily manipulated. This paper presents two schemes to secure such information in the form of images. Under the concept of (k, n)-Visual Cryptography, authors present these two schemes to secretly share images, that can be practically used to secure the information sent. The (3, 3)-enhanced visual cryptographic scheme, enhances security of the currently existing (3, 3)-visual cryptographic scheme by utilizing the concept of keys to secure information. Authors also introduce a new scheme, (2, 3)-visual cryptographic scheme. The (2, 3)-visual cryptographic scheme also utilizes the concepts of keys but reduces the bandwidth requirement or increases reliability. This provides us two modes of operation that are more practical than existing scheme. The paper shall discuss the scheme with a schematic analysis and an analysis of its implementation both subjectively and objectively. Using several parameters of security, this paper presents our findings as our results. The schemes discussed are found to be more secure than existing visual cryptographic scheme and are more reliable and imperceptible.
Journal of WSCG, 2002
is a type of cryptography which encodes a number of images in the way that when the images on transparencies are stacked together, the hidden message appears without a trace of original images. The decryption is done directly by the human visual system with no special cryptographic calculations. This paper presents a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures. The third picture is reconstructed by printing the two output images onto transparencies and stacking them together. While the previous researches basically handle only binary images, this paper establishes the extended visual cryptography scheme suitable for natural images. Generally, visual cryptography suffers from the deterioration of the image quality. This paper also describes the method to improve the quality of the output images. The trade-off between the image quality and the security are discussed and assessed by observing the actual results of this method. Furthermore, the optimization of the image quality is discussed.
In this paper, we propose a new color visual cryptography scheme which is based on modified visual cryptography. Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. In this scheme sender can share n-1 natural images and one secrete image of variable size with the server and it make the encryption with extraction of feature of natural images without altering the contents of natural images. When the receiver identification is done that time server make the decryption process and send the secrete image with transmitted by highly secure secret channel. Moreover, this approach avoids the pixel expansion problem and makes it possible to recover secret images without any distortion.
Visual Cryptography is a special encryption technique that encrypts the secret image into n number of shares to hide information in images in such a way that it can be decrypted by the human visual system. It is imperceptible to reveal the secret information unless a certain number of shares (k) or more are superimposed. Simple visual cryptography is very insecure. Variable length key based visual cryptography for color image uses a variable length Symmetric Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt the image and division of the encrypted image is done using Random Number. Unless the secret key, the original image will not be decrypted. Here secret key ensures the security of image. This paper describes the overall process of above scheme. Encryption process encrypts the Original Image using variable length Symmetric Key, gives encrypted image. Share generation process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
IRJET, 2021
Visual cryptography is a secret sharing technique for securing visual contexts like images or texts by encoding into multiple number of shares. In decryption process, one can decrypt the secret image (SI) by stacking the shares without any additional computations. Color visual cryptography (CVC) encodes a color secret image (SI) into several shares in which each color pixels are separately handled using RGB or CMY models. In this paper we proposed CVC technique for secret color images encoding schemes with multiple encryption algorithm to make the secret image highly secured. In this method, a color secret image is encrypted by extracting R, G, B component from the original secret image and halves of each of them into two separate matrices. Each of these matrices are then XORed with a randomly generated key matrices (Ki) to generate six different shares for each of the three color planes. By using Hou's scheme, share 1 and share 2 are then constructed by stacking the three first level shares and three second level shares of each color components respectively. The generated two shares are further encrypted by hybrid security algorithm called AES and Blowfish. On the recipient side, color SI is retrieved form these shares with the equivalent quality as that of original image by performing all the operations that we accomplished in the encryption processes in reverse order. The proposed method is then evaluated by using performance measures such as PSNR and SSIM. The result obtained by these two evaluation parameters show that the reconstructed image retain the quality of the original image. Therefore the proposed method is excellent for hiding secrets in the form color images confidently compared to the existing VCS schemes.
International Journal of Computer Applications
In today's world handling and security of information from attacks becomes very important aspect for the individuals. Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed. Here in this paper we are going to review an advanced method of information hiding i.e. Visual Cryptography. Visual Cryptography emerged as a special encryption technique for information hiding using images. In way that encrypted image can be decrypted by the human vision if the correct image key is used. By this cryptographic technique we can encrypt visual information (pictures, text, etc.) in a way that human visual system can perform decryption of encrypted information & no aid of computers needed. In visual cryptography a secret image is transformed into several share images. These share images are meaningful but noisy or distorted images. Combination of these share images can reveal the original secret image. This paper reviews two methods for visual cryptography of color images based on Shamir encryption method variants of k-out-of-n i.e.2-out-of-2, 2-out-of-n, n-out-of-n, and k-out-ofn scheme encryption method.
iaeme
Visual cryptography is a method for protecting image based secrets that has a computation-free decoding process. In this paper, we propose a new visual cryptography scheme for color images based on CMY model, half toning technique and the traditional binary image sharing scheme. The image shares generated by our method are transmitted to the destination through a network and the image is decrypted by stacking any two transparencies. The image can be in any standard format. This scheme provides an efficient way to hide the natural image among different shares. Furthermore, the size of the shares and the implementation complexity do not depend on the number of colors appearing in the secret image.
2013
Color visual cryptography (VC) encrypts a color secret image into n halftone image shares. The secret image can be recovered simply by stacking these shares together without any complex computations involved. The shares are very safe because separately they reveal nothing about the secret image. This paper introduces a faster and easier color visual cryptography encryption method that produces meaningful color shares via error diffusion halftoning. An error diffusion technique for halftoning produces shares which are more pleasant to human eyes. The algorithm proposed by this scheme reduces a considerable time for encryption and decryption in a much easier way. Comparisons with previous approaches show the superior performance of the new method. Keywords—Color meaningful shares, digital halftoning, error diffusion, secret sharing, visual cryptography (VC).
The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field.
Measurement, 2014
Visual cryptography is an important technique for image encryption. This paper proposes a color transfer scheme which can be incorporated into the (k, n) visual cryptography model. In encoder, a color image is encrypted into n noise-like binary share images. When any k or more than k shares are collected, a high quality colorful version of the secret image can be reconstructed with low complexity computations. The principle is motivated to develop a color image secret sharing for output devices such as monochrome printer or fax machines. The generated share images are still binary transparencies which can be directly produced by these low cost output devices. Meanwhile, the security of a (k, n) visual cryptography model is perfectly preserved. When stacking a qualified set of transparencies, the gray level version of secret content can be revealed by human visual system. Nevertheless, the proposed paradigm is cheating immune. It also can be integrated into some emerging display technologies such as cholesteric liquid crystal display. Experimental results and related examples demonstrate the effectiveness and efficiency.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.