Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme

被引:2
|
作者
Raphel, Roshni Kadeparambil [1 ]
Ilyas, H. Muhammed [1 ]
Panicker, Janu R. [1 ]
机构
[1] Coll Engn Cherthala, Comp Sci & Engn, Alappuzha 688541, Kerala, India
关键词
Letter-based VCS; Multiple secrets; Meaningful share; Pixel expansion; Secret image;
D O I
10.1007/978-3-319-27161-3_43
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visual cryptography (VC) is a method used for encrypting visual informations in such a way that it can be easily decrypted by human visual system. Existing visual cryptographic schemes focuses only on using transparencies as shares and the shares appear as noise like pixels. These meaningless shares are not user friendly and create transmission risk problems. And schemes generating meaningful shares are limited to single secret sharing. This paper proposes a Letter-based Visual Cryptography Scheme (LVCS), which creates meaningful shares for sharing multiple secrets that can be used for both binary and grayscale images. In this method we use natural language letters for representing pixels of secret images. Here we are generating meaningful text files instead of share images. So here the text files contain meaningful data and an attacker will not recognize them as containing secrets. This method satisfies security conditions since the secret information can be reconstructed by any k shares but with less than k shares reveal nothing.
引用
收藏
页码:476 / 486
页数:11
相关论文
共 50 条
  • [21] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [22] Sharing Multiple Secrets Using Visual Cryptography
    Weir, Jonathan
    Yan, WeiQi
    [J]. ISCAS: 2009 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-5, 2009, : 509 - 512
  • [23] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    [J]. Wireless Personal Communications, 2022, 122 : 3085 - 3103
  • [24] Multiple Secret Image Communication Using Visual Cryptography
    Blesswin, A. John
    Mary, G. Selva
    Kumar, S. Manoj
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3085 - 3103
  • [25] A novel two-in-one image secret sharing scheme based on perfect black visual cryptography
    Li, Peng
    Yang, Ching-Nung
    Kong, Qian
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 41 - 50
  • [26] Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography
    Choudhary, Arvind Singh
    Kumar, Manoj
    [J]. CYBERNETICS AND SYSTEMS, 2024, 55 (01) : 42 - 60
  • [27] Randomness in secret sharing and visual cryptography schemes
    De Bonis, A
    De Santis, A
    [J]. THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) : 351 - 374
  • [28] A novel two-in-one image secret sharing scheme based on perfect black visual cryptography
    Peng Li
    Ching-Nung Yang
    Qian Kong
    [J]. Journal of Real-Time Image Processing, 2018, 14 : 41 - 50
  • [29] ESSVCS: An enriched secret sharing visual cryptography
    Liu, Feng
    Yan, Wei Q.
    Li, Peng
    Wu, Chuankun
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 1 - 24
  • [30] A (2,2) Secret Sharing Scheme for Visual Cryptography without Pixel Expansion
    Hodeish, Mahmoud E.
    Humbe, V. T.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,