A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography

被引:0
|
作者
Rao, Kanusu Srinivasa [1 ]
Sridhar, Mandapati [2 ]
机构
[1] Acharya Nagarjuna Univ, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
[2] RVR & JC Coll Engn, Dept Comp Applicat, Guntur, Andhra Pradesh, India
关键词
Secret Image; Cover Image; Shares; Encryption; Decryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual Cryptography is a technique to share the secret information in the images for achieving data/information security. The technique uses encryption and decryption techniques for protecting the data. The secret image is encrypted into number of shares and distributed to the multiple participants. In decryption, the secret image can be reconstructed by combining the subset of the shares using simple computations. In the proposed secret image sharing technique, secret image is partitioned or divided into four shares based on the bit sharing approach. These shares are then covered with different cover images before distributing to the participants. All four shares are required to reconstruct the original secret image.
引用
收藏
页码:1417 / 1420
页数:4
相关论文
共 50 条
  • [1] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [2] Lossless sharing visual cryptography
    [J]. Fu, Z.-X. (13503452712@163.com), 1600, Editorial Board of Journal on Communications (34):
  • [3] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [4] A Lossless Linear Algebraic Secret Image Sharing Scheme
    Kanso, Ali
    Ghebleh, Mohammad
    Alazemi, Abdullah
    [J]. INFORMATICA, 2020, 31 (03) : 499 - 522
  • [5] Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 462 - 468
  • [6] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [7] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [8] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    [J]. EURASIP Journal on Advances in Signal Processing, 2010
  • [9] A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
    Bhat, Krishnaraj
    Reddy K.R., Uday Kumar
    Kumar H.S., Ranjan
    Mahto, Dindayal
    [J]. IET INFORMATION SECURITY, 2021, 15 (01) : 13 - 22
  • [10] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257