An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

被引:1
|
作者
Kumar, N. Rajesh [3 ]
Krishnan, R. Bala [3 ]
Manikandan, G. [1 ]
Raajan, N. R. [2 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] SASTRA Deemed Univ, Sch Elect & Elect Engn, Thanjavur, India
[3] SASTRA Deemed Univ, SRC, Kumbakonam, India
关键词
Diwy; secret sharing; image transmission; bound level; visual cryptography; PROTECTION SCHEME;
D O I
10.3837/tiis.2020.07.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* -1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.
引用
收藏
页码:2862 / 2878
页数:17
相关论文
共 50 条
  • [1] 2D Barcodes for visual cryptography
    Wang, Guangyu
    Liu, Feng
    Yan, Wei Qi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (02) : 1223 - 1241
  • [2] 2D Barcodes for visual cryptography
    Guangyu Wang
    Feng Liu
    Wei Qi Yan
    [J]. Multimedia Tools and Applications, 2016, 75 : 1223 - 1241
  • [3] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [4] Authentic secret share creation techniques using visual cryptography with public key encryption
    M. Karolin
    T. Meyyappan
    [J]. Multimedia Tools and Applications, 2021, 80 : 32023 - 32040
  • [5] Authentic secret share creation techniques using visual cryptography with public key encryption
    Karolin, M.
    Meyyappan, T.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) : 32023 - 32040
  • [6] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    [J]. IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [7] Secret Sharing Using Visual Cryptography
    Chin-Chen Chang
    Jung-San Lee
    [J]. Journal of Electronic Science and Technology, 2010, 8 (04) : 289 - 299
  • [8] RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique
    Shankar, K.
    Eswaran, P.
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (11)
  • [9] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [10] A Multilayer Visual cryptography Framework for Secured Secret Messages Transmission
    Ray, Arghya
    Ghosh, Avishake
    Padhmavathi, B.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,