Encryption for Sharing of Secret Medical Images

被引:0
|
作者
Sangeetha, M. [1 ]
Arumugam, C. [2 ]
Senthilkumar, K. M. [3 ]
机构
[1] Coimbatore Inst Technol, Dept Comp Sci & Engn, Coimbatore 641014, Tamil Nadu, India
[2] Coimbatore Inst Technol, Coimbatore 641014, Tamil Nadu, India
[3] Kumaraguru Coll Technol, Coimbatore 641014, Tamil Nadu, India
来源
RESEARCH JOURNAL OF BIOTECHNOLOGY | 2015年 / 10卷 / 02期
关键词
Visual cryptography; Half toning; Zig-Zag scanning; VISUAL CRYPTOGRAPHY; SCHEMES;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Visual Cryptography Scheme (VCS) is a type of secret sharing scheme which allows the encoding of a secret image into n shares distributed to n participants. Each share constitutes some information and when k shares out of n stack together the secret will reveal. However; less than k shares will not work. The advantage of the visual secret sharing scheme is its decryption process i.e. to decrypt the secret using Human Visual System without any computation. Traditional Visual Cryptography suffers from share identification problem. This problem can be solved by Multiple-Secret threshold visual cryptography (MVCS) which adds a meaningful cover image in each share. The proposed work presents threshold Visual cryptographic schemes in Color Images. This method uses half toning method to provide color image as a secret image. Then the secret image can be embedded in the original image by generating shares using Zigzags scanning method. Experimental result of proposed system provides robust security than conventional visual cryptographic schemes.
引用
收藏
页码:19 / 21
页数:3
相关论文
共 50 条
  • [21] Multiple Secret Images Sharing Scheme
    Rishiwal, Vinay
    Kumar, Hirdesh
    Arya, K. V.
    Yadav, Mano
    [J]. IEEE REGION 10 COLLOQUIUM AND THIRD INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, VOLS 1 AND 2, 2008, : 234 - +
  • [22] A Homomorphic Method for Sharing Secret Images
    Islam, Naveed
    Puech, Williain
    Brouzet, Robert
    [J]. DIGITAL WATERMARKING, 2009, 5703 : 121 - +
  • [23] V⊕SEE: Video Secret sharing Encryption techniquE
    Manupriya, Piyushi
    Sinha, Shambhavi
    Kumar, Krishan
    [J]. 2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [24] A (t, n) secret sharing scheme for image encryption
    Shi Runhua
    Zhong Hong
    Huang Liusheng
    Luo Yonglong
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 3 - +
  • [25] A secret file sharing scheme with chaos based encryption
    Sharma, Madhu
    Sharma, Ashish
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [26] Secret-Image Sharing for Multimedia Chaotic Encryption
    Hamdi, Mohamed
    Boudriga, Noureddine
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2591 - 2596
  • [27] Outsourcing secret sharing scheme based on homomorphism encryption
    Zhang, En
    Peng, Jie
    Li, Ming
    [J]. IET INFORMATION SECURITY, 2018, 12 (01) : 94 - 99
  • [28] Secret Sharing-Based Chaotic Image Encryption
    Zhang, Tiejun
    El-Fatyany, Aya
    Li, Li
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 217 - 224
  • [29] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    [J]. 2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [30] Color image encryption based on secret sharing and iterations
    Luo H.
    Yu F.-X.
    Li H.
    Huang Z.-L.
    [J]. Information Technology Journal, 2010, 9 (03) : 446 - 452