A New k out of n Secret Image Sharing Scheme in Visual Cryptography

被引:0
|
作者
Shankar, K. [1 ]
Eswaran, P. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi 630003, Tamil Nadu, India
关键词
Visual cryptography; (k; n) Visual cryptography scheme; Shares; XOR; attacks; Secret image sharing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead projector to reveals the secret image. This paper proposed a brand new of simple and robust (k, n) visual cryptography technique which is used to effectively sharing the secret image with utmost confidentiality. In share creation process, specified new condition for random matrices and then XOR operations are performed to generate the 'n' transparencies. It is possible to decode the secret image visually by superimposing a k subset of transparencies. Nevertheless no secret data can be acquired from the superposition of an illegal subset. Experiments, statistical and security assessments are carried out on the shares to validate the strength of the proposed scheme by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks. The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Contrast-optimal k out of n secret sharing schemes in visual cryptography
    Hofmeister, T
    Krause, M
    Simon, HU
    [J]. THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) : 471 - 485
  • [2] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    [J]. 2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [3] A New (k, n) Secret Image Sharing Scheme (SISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (04) : 448 - 456
  • [4] A new (k, n) verifiable secret image sharing scheme (VSISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (03) : 201 - 209
  • [5] A reliable (k, n) image secret sharing scheme
    Bai, Li
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 31 - 36
  • [6] Implementation K out of N Visual Cryptography using K out of K Scheme
    Hasnat, Abul
    Barman, Dibyendu
    Mandal, Satyendra Nath
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [7] Visual Cryptography Scheme for Secret Image Retrieval
    Reddy, M. Sukumar
    Mohan, S. Murali
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 41 - 46
  • [8] A new visual evaluation criterion of visual cryptography scheme for character secret image
    Y. Ren
    F. Liu
    W. Yan
    W. Wang
    [J]. Multimedia Tools and Applications, 2019, 78 : 25299 - 25319
  • [9] A new visual evaluation criterion of visual cryptography scheme for character secret image
    Ren, Y.
    Liu, F.
    Yan, W.
    Wang, W.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) : 25299 - 25319
  • [10] K Out of N Secret Sharing Scheme with Steganography and Authentication
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 413 - 425