An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

被引:1
|
作者
Kumar, N. Rajesh [3 ]
Krishnan, R. Bala [3 ]
Manikandan, G. [1 ]
Raajan, N. R. [2 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] SASTRA Deemed Univ, Sch Elect & Elect Engn, Thanjavur, India
[3] SASTRA Deemed Univ, SRC, Kumbakonam, India
关键词
Diwy; secret sharing; image transmission; bound level; visual cryptography; PROTECTION SCHEME;
D O I
10.3837/tiis.2020.07.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* -1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.
引用
收藏
页码:2862 / 2878
页数:17
相关论文
共 50 条
  • [31] AN IMPROVED SECRET SHARING USING XOR-BASED VISUAL CRYPTOGRAPHY
    Purushothaman, Vandana
    Sreedhar, Sreela
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [32] Tamperproof Transmission of Fingerprints Using Visual Cryptography Schemes
    Monoth, Thomas
    Anto, Babu P.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 143 - 148
  • [33] A Visual Cryptography Scheme for Secret Hiding using Pre-Processing
    Verma, Nitin
    Nayak, Pinki
    Singh, Pooja
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 784 - 787
  • [34] TWO-DIMENSIONAL (2D) CELLULAR AUTOMATA FOR THE VERNAM CIPHER ALGORITHM IN SECRET KEY CRYPTOGRAPHY
    Constantinescu, Nicolae
    Boldea, Costin
    [J]. ANNALS OF DAAAM FOR 2009 & PROCEEDINGS OF THE 20TH INTERNATIONAL DAAAM SYMPOSIUM, 2009, 20 : 881 - 882
  • [35] Secure visual cryptography for medical image using modified cuckoo search
    A. Alif Siddiqua Begum
    S. Nirmala
    [J]. Multimedia Tools and Applications, 2018, 77 : 27041 - 27060
  • [36] Conceal Secret Letter Using 2D Wavelet Packet
    AL-Dabbas, Maisa'a A. K.
    Al-Khalssi, Shatha H. J.
    [J]. INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2018), 2019, 2086
  • [37] A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography
    Sharma, Nagesh
    Rathi, Rakesh
    Jain, Vinesh
    Saifi, Mohd. Waseem
    [J]. 3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [38] SDPBDVC: secure data processing on big data using visual cryptography
    Brindha, K.
    Jeyanthi, N.
    [J]. INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2020, 26 (2-3) : 237 - 251
  • [39] Secure visual cryptography for medical image using modified cuckoo search
    Begum, A. Alif Siddiqua
    Nirmala, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 27041 - 27060
  • [40] A Real Time Approach for Secure Text Transmission Using Video Cryptography
    Metaliya, Viral G.
    Jain, Deepak Kumar
    Ravin, Sardhara
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 635 - 638