Sharing a Secret Image with Encapsulated Shares in Visual Cryptography

被引:20
|
作者
Shankar, K. [1 ]
Eswaran, P. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi 630003, Tamil Nadu, India
关键词
Visual cryptography; Shares; AES; XOR; Encryption; PSNR;
D O I
10.1016/j.procs.2015.10.080
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to advances in digital world, security has become an inseparable issue while transmitting the image. Visual cryptography (VC) is a modern cryptographic technique which is used to the secret image is shared securely and also its information is maintained with utmost confidentiality. A sender transmits the secret image which is divided into shares and it holds hidden information. When all of these shares are aligned and stacked together, they tend to expose the secret image information to the receiver. Earlier VC scheme, the secrecy of the share is not maintained due to any other fake shares can easily insert or modified remain to be continuing challenges. To solve this security issues, a secure share creation scheme constructed by a (2, 2) XOR based VC scheme is proposed. Once the shares are created, it is encrypted separately by using Advanced Encryption Standard (AES) algorithm. In this process, shares and AES algorithm bind together to give the resultant shares are called the encapsulated shares. Consequently, the secret image information cannot be retrieved from any one transparency via human visual perception. The Proposed scheme offers better security for shares and also reduces the fraudulent shares of the secret image. Further, the experimental results and analyses have demonstrated that the proposed scheme can effectively encrypt the image with the fast execution speed and minimized PSNR value. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
引用
收藏
页码:462 / 468
页数:7
相关论文
共 50 条
  • [1] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    [J]. 2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [2] Visual Secret Sharing with Meaningful Shares
    Shyu, Shyong Jian
    [J]. 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 576 - 580
  • [3] Secret Sharing Using Visual Cryptography
    Chin-Chen Chang
    Jung-San Lee
    [J]. Journal of Electronic Science and Technology, 2010, 8 (04) : 289 - 299
  • [4] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [5] Exploring Secret Image Sharing with Embedding of Shares
    Kamble, Priyanka R.
    Patil, Sonali
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1090 - 1093
  • [6] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [7] Randomness in secret sharing and visual cryptography schemes
    De Bonis, A
    De Santis, A
    [J]. THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) : 351 - 374
  • [8] ESSVCS: An enriched secret sharing visual cryptography
    Liu, Feng
    Yan, Wei Q.
    Li, Peng
    Wu, Chuankun
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 1 - 24
  • [9] On generating meaningful shares in visual secret sharing scheme
    Tsai, D. S.
    Chen, T.
    Horng, G.
    [J]. IMAGING SCIENCE JOURNAL, 2008, 56 (01): : 49 - 55
  • [10] Reconciling Visual Cryptography with an Etched Photoengraving Practice for an Exceedingly Secured Secret Image Sharing
    Selvan, N. Siva
    [J]. 2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 260 - 263