Enhanced Visual Cryptography: An Augmented Model for Image Security

被引:2
|
作者
Tripathi, Jyoti [1 ]
Saini, Anu [1 ]
Kishan [1 ]
Nikhil [1 ]
Shazad [1 ]
机构
[1] GB Pant Govt Engn Coll, New Delhi 110020, India
关键词
Visual Cryptography; Secret key; transformed pixel; (3,3) - EVS; (2,3)- VCS;
D O I
10.1016/j.procs.2020.03.232
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security of data has become a necessity in today's world. Data as all know is the raw form and information can be extracted from it. Thus, data needs to be secured. This concern becomes even more significant when share information and it mostly constitute of images. As already know that a picture speaks a thousand words, there is no reason not to believe that picture carry the most information. Furthermore, they can be easily manipulated. This paper presents two schemes to secure such information in the form of images. Under the concept of (k, n) - Visual Cryptography, authors present these two schemes to secretly share images, that can be practically used to secure the information sent. The (3, 3) - enhanced visual cryptographic scheme, enhances security of the currently existing (3, 3) - visual cryptographic scheme by utilizing the concept of keys to secure information. Authors also introduce a new scheme, (2, 3) - visual cryptographic scheme. The (2, 3) - visual cryptographic scheme also utilizes the concepts of keys but reduces the bandwidth requirement or increases reliability. This provides us two modes of operation that are more practical than existing scheme. The paper shall discuss the scheme with a schematic analysis and an analysis of its implementation both subjectively and objectively. Using several parameters of security, this paper presents our findings as our results. The schemes discussed are found to be more secure than existing visual cryptographic scheme and are more reliable and imperceptible. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:323 / 333
页数:11
相关论文
共 50 条
  • [1] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [2] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [3] Digital Image Security Using Hybrid Visual Cryptography
    Bhatia, Shradha
    Khatri, Sunil Kumar
    Singh, Ajay Vikram
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 570 - 576
  • [4] A Model for Biometric Security using Visual Cryptography
    Gupta, Himanshu
    Sharma, Nupur
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 328 - 332
  • [5] A Comparative Study on Visual Cryptography Method for Handwriting Image Security
    Suharjito
    Sugianto
    Surantha, Nico
    [J]. 2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
  • [6] Visual cryptography for gray scale images with enhanced security mechanisms
    Narayana, V. Lakshman
    Gopi, A. Peda
    [J]. TRAITEMENT DU SIGNAL, 2017, 34 (3-4) : 197 - 208
  • [7] Security-Enhanced Visual Cryptography Schemes Based on Recursion
    Monoth, Thomas
    Anto, P. Babu
    [J]. CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 258 - 265
  • [8] A Dynamic Security Model for Visual Cryptography and Digital Watermarking
    Chitra, K.
    Venkatesan, V. Prasanna
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 351 - 357
  • [9] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298
  • [10] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402