A (2, 2) Visual Cryptography Technique with Improved Contrast

被引:2
|
作者
Bhosale, Akshay Gajanan [1 ,2 ]
Patil, Vikram Shripati [3 ]
机构
[1] Shivaji Univ, RIRD, Kolhapur, Maharashtra, India
[2] Sanjay Ghodawat Univ, Dept Elect Engn, Kolhapur, Maharashtra, India
[3] ADCET, Ashta, India
来源
INFORMATION SECURITY JOURNAL | 2020年 / 29卷 / 04期
关键词
Visual cryptography; secret sharing; contrast improvement; SECRET SHARING SCHEME; IMAGE;
D O I
10.1080/19393555.2020.1740840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography is a technique used to share a secret among many participants. The problem with visual cryptography technique is that the secret is not perfectly recovered, i.e. a black secret pixel is perfectly recovered but a white secret pixel is recovered with less contrast. Because of this, the overall quality of recovered secret is poor. So to improve the quality of recovered secret image, we need to improve the contrast. In this paper, we have proposed a (2, 2) visual cryptography technique with improved contrast as compared to the traditional (2, 2) visual cryptography scheme (VCS). In the proposed technique, we have used additional basis matrices for encrypting the secret pixels. The quality of the recovered secret image is compared with traditional (2, 2) VCS using various image quality metrics.
引用
收藏
页码:199 / 208
页数:10
相关论文
共 50 条
  • [31] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +
  • [32] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598
  • [33] An information hiding technique based on visual cryptography
    Chen, Te-Yu
    Ou, Hsia-Hung
    Yang, Yong -Jay
    Tseng, Jing-Hang
    WMSCI 2011: 15TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, 2011, : 249 - 253
  • [34] Visual cryptography based on an interferometric encryption technique
    Lee, SS
    Na, JC
    Sohn, SW
    Park, C
    Seo, DH
    Kim, SJ
    ETRI JOURNAL, 2002, 24 (05) : 373 - 380
  • [35] A stegano - visual cryptography technique for multimedia security
    K. Gurunathan
    S. P. Rajagopalan
    Multimedia Tools and Applications, 2020, 79 : 3893 - 3911
  • [36] Determining the optimal contrast for secret sharing schemes in visual cryptography
    Krause, M
    Simon, HU
    LATIN 2000: THEORETICAL INFORMATICS, 2000, 1776 : 280 - 291
  • [37] Ideal Contrast Visual Cryptography for General Access Structures with AND Operation
    Praveen, Kanakkath
    Sethumadhavan, M.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 309 - 314
  • [38] A technique for accelerating characteristic 2 elliptic curve cryptography
    Gueron, Shay
    Kounavis, Michael
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 265 - 272
  • [39] Determining the optimal contrast for secret sharing schemes in visual cryptography
    Krause, M
    Simon, HU
    COMBINATORICS PROBABILITY & COMPUTING, 2003, 12 (03): : 285 - 299
  • [40] Improved scheme and evaluation method for progressive visual cryptography
    Thai, Binh Le Thanh
    Tanaka, Hidema
    Watanabe, Kohtaro
    EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)