Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography

被引:0
|
作者
Karolin, M. [1 ]
Meyyappan, T. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci, Karaikkudi, India
关键词
Decryption; ECC method; Encryption; Mean square error; NPCR; PSNR; Rubik's cube algorithm; UACI; Visual cryptography;
D O I
10.1080/03772063.2022.2142684
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In Cryptography the covert image share creation method and multiple image encryption and decryption are used with different algorithms. In this work, Visual Cryptography (ECC) is used for the outline of shares that have been generated from the novel image. Red, Green, and Blue pixel shares are one by one formed by the Visual Secret Sharing (VSS) Scheme. It proposed the ECC method for image encryption and decryption using Rubik's cube image encryption algorithm. The encryption method is by a public key cryptography generator and the decryption method is done by the secret key arbitrarily generators of the ECC method. For humanizing, the performance analysis of Elliptic Curve Cryptography methods, such as the optimization techniques, was used for PSNR, MSE, and the Number of Pixel Changing Rate (NPCR) and (UACI). The outcome explains that the planned algorithm is improved over various other methods compared to the presented methods. The future technique is implemented with Matlab coding.
引用
收藏
页码:1638 / 1645
页数:8
相关论文
共 50 条
  • [1] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. CHINA COMMUNICATIONS, 2017, 14 (02) : 118 - 130
  • [2] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    K.Shankar
    P.Eswaran
    [J]. China Communications, 2017, 14 (02) : 118 - 130
  • [3] Authentic secret share creation techniques using visual cryptography with public key encryption
    Karolin, M.
    Meyyappan, T.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) : 32023 - 32040
  • [4] Authentic secret share creation techniques using visual cryptography with public key encryption
    M. Karolin
    T. Meyyappan
    [J]. Multimedia Tools and Applications, 2021, 80 : 32023 - 32040
  • [5] Image Encryption using Elliptic Curve Cryptography
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 472 - 481
  • [6] Secret image encryption based on chaotic system and elliptic curve cryptography
    Banik, Arpita
    Singh, Laiphrakpam Dolendro
    Agrawal, Amit
    Patgiri, Ripon
    [J]. DIGITAL SIGNAL PROCESSING, 2022, 129
  • [7] RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
    Shankar, K.
    Eswaran, P.
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (11)
  • [8] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [9] Optimized video internet of things using elliptic curve cryptography based encryption and decryption
    Alhayani, Bilal S. A.
    Hamid, Nagham
    Almukhtar, Firas Husham
    Alkawak, Omar A.
    Mahajan, Hemant B.
    Kwekha-Rashid, Ameer Sardar
    Ilhan, Haci
    Marhoon, Haydar Abdulameer
    Mohammed, Husam Jasim
    Chaloob, Ibrahim Zeghaiton
    Alkhayyat, Ahmed
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [10] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    [J]. Wireless Personal Communications, 2022, 122 : 3085 - 3103