A Visual Cryptography Scheme for Secret Hiding using Pre-Processing

被引:0
|
作者
Verma, Nitin [1 ]
Nayak, Pinki [1 ]
Singh, Pooja [1 ]
机构
[1] Amity Sch Engn & Technol, Dept CSE, Delhi, India
关键词
Visual Crypography; Pre-Processing; Secret Hiding;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Visual cryptography is a cryptographic technique in which an image (secret) is encrypted using shares of the image and then those shares at the receiver side are overlapped to decrypt the original secret. The advantage of such a process is that no high computation power is needed to decrypt the secret. However, the ease of working reduces the overall security of the system. Any individual to whom the secret is not directed can intercept the shares and look at the secret. Another disadvantage of such a system is, reduction of image quality (contrast) at the receiver. In this paper, we introduce a new algorithm which handles the above mentioned cons. The secret is perfectly encrypted and then overlapped on hiding image (overlap image). The secret image is encrypted using very low complex computation which makes it easier to use and implement. Image contrast is not distorted at the receiver and the secret is well encrypted which disables any interceptor to decode the secret even if he intercepts all the shares. The algorithm also introduces the concept of keys which are used to increase the overall security of the system. Another advantage of this system is not having multiple images to hide the shares.
引用
收藏
页码:784 / 787
页数:4
相关论文
共 50 条
  • [1] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    [J]. 2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +
  • [2] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [3] Visual Cryptography Scheme for Secret Image Retrieval
    Reddy, M. Sukumar
    Mohan, S. Murali
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 41 - 46
  • [4] Special type of circular visual cryptography for multiple secret hiding
    Hsu, H-C
    Chen, J.
    Chen, T-S
    Lin, Y-H
    [J]. IMAGING SCIENCE JOURNAL, 2007, 55 (03): : 175 - 179
  • [5] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [6] A general multi-secret visual cryptography scheme
    Yang, Ching-Nung
    Chung, Ting-Hao
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (24) : 4949 - 4962
  • [7] Shift visual cryptography scheme of two secret images
    Wang, DS
    Luo, P
    Yang, L
    Qi, DX
    Dai, YQ
    [J]. PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2003, 13 (06) : 457 - 463
  • [8] Shift visual cryptography scheme of two secret images
    WANG Daoshun
    2. Chengdu Institute of Computer Applications
    3. School of Information Science and Technology
    [J]. Progress in Natural Science:Materials International, 2003, (06) : 59 - 65
  • [9] Secret Sharing Using Visual Cryptography
    Chin-Chen Chang
    Jung-San Lee
    [J]. Journal of Electronic Science and Technology, 2010, 8 (04) : 289 - 299
  • [10] Enhanced Visual Cryptography Scheme for Secret Image Retrieval using Average Filter
    Pujari, Vandana G.
    Khot, Shivchandra R.
    Mane, Kishor T.
    [J]. 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 88 - 91