A (2, 2) Visual Cryptography Technique with Improved Contrast

被引:2
|
作者
Bhosale, Akshay Gajanan [1 ,2 ]
Patil, Vikram Shripati [3 ]
机构
[1] Shivaji Univ, RIRD, Kolhapur, Maharashtra, India
[2] Sanjay Ghodawat Univ, Dept Elect Engn, Kolhapur, Maharashtra, India
[3] ADCET, Ashta, India
来源
INFORMATION SECURITY JOURNAL | 2020年 / 29卷 / 04期
关键词
Visual cryptography; secret sharing; contrast improvement; SECRET SHARING SCHEME; IMAGE;
D O I
10.1080/19393555.2020.1740840
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography is a technique used to share a secret among many participants. The problem with visual cryptography technique is that the secret is not perfectly recovered, i.e. a black secret pixel is perfectly recovered but a white secret pixel is recovered with less contrast. Because of this, the overall quality of recovered secret is poor. So to improve the quality of recovered secret image, we need to improve the contrast. In this paper, we have proposed a (2, 2) visual cryptography technique with improved contrast as compared to the traditional (2, 2) visual cryptography scheme (VCS). In the proposed technique, we have used additional basis matrices for encrypting the secret pixels. The quality of the recovered secret image is compared with traditional (2, 2) VCS using various image quality metrics.
引用
收藏
页码:199 / 208
页数:10
相关论文
共 50 条
  • [41] An Improved Multi-secret Sharing Visual Cryptography Technique for Color Images Using Sterilization Algorithm
    Dalvi, G. D.
    Wakde, D. G.
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 443 - 452
  • [42] Adaptive halftoned visual cryptography with improved quality and security
    Sridhar, Srividhya
    Sathishkumar, R.
    Sudha, Gnanou Florence
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 815 - 834
  • [43] Adaptive halftoned visual cryptography with improved quality and security
    Srividhya Sridhar
    R. Sathishkumar
    Gnanou Florence Sudha
    Multimedia Tools and Applications, 2017, 76 : 815 - 834
  • [44] Improved scheme and evaluation method for progressive visual cryptography
    Binh Le Thanh Thai
    Hidema Tanaka
    Kohtaro Watanabe
    EURASIP Journal on Information Security, 2022
  • [45] A stegano-visual cryptography technique for multimedia security
    Gurunathan, K.
    Rajagopalan, P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (5-6) : 3893 - 3911
  • [46] Visual cryptography based on optical interference encryption technique
    Seo, DH
    Kim, JY
    Lee, SS
    PHOTONIC AND QUANTUM TECHNOLOGIES FOR AEROSPACE APPLICATIONS III, 2001, 4386 : 172 - 180
  • [47] IMPROVED CONTRAST IN SUBTRACTION TECHNIQUE
    JOYCE, JW
    DALRYMPL, GV
    JUNGKIND, FF
    SCOTT, PD
    DAVASHER, BG
    RADIOLOGY, 1970, 94 (01) : 157 - +
  • [48] A Construction Method of (2,3) Visual Cryptography Scheme
    Li, Peng
    Ma, Jianfeng
    Yin, Liping
    Ma, Quan
    IEEE ACCESS, 2020, 8 : 32840 - 32849
  • [49] Optimal XOR Based (2,n)-Visual Cryptography Schemes
    Liu, Feng
    Wu, ChuanKun
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 333 - 349
  • [50] A (2,2) Secret Sharing Scheme for Visual Cryptography without Pixel Expansion
    Hodeish, Mahmoud E.
    Humbe, V. T.
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,