Random Grid based Visual Cryptography using a common share

被引:0
|
作者
Joseph, Sruthy K. [1 ]
Ramesh, R. [1 ]
机构
[1] Adi Shankara Inst Engn & Technol, Dept Comp Sci & Engn, Kalady, India
关键词
Common share; random grid; visual quality; visual cryptography; OR; XOR; pixel expansion; chaotic permutation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Visual cryptography (VC) is a paradigm of cryptography which prevents a secret from being modified or destructed by using the notions of perfect cipher and the secret can be reconstructed by the human visual system. It is a cryptographic technique which can encrypt visual information, such as images and text; and can decrypt the secret without a computer (stack operation). This visual secret sharing scheme is developed by Moni Naor and Adi Shamir in 1994. Most of the visual cryptography schemes suffer from many drawbacks such as: pixel expansion, share management difficulty, poor quality recovered image etc. So this paper discusses a visual cryptography scheme using random grids, where it uses a common share to transmit n binary secrets. The binary secret image is divided into two share images (random grids) as in (2, 2) visual cryptography scheme. Here we use n+1 share images to transmit n secrets and the extra share is common to all n secrets. Since RG is used it creates shares without pixel expansion. This scheme can be viewed as a modified scheme of (2, 2) random grid based visual cryptography. One share is considered as a common share to all n secrets, so it makes efficient network bandwidth utilization.
引用
收藏
页码:656 / 662
页数:7
相关论文
共 50 条
  • [21] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [22] Visual Cryptography and Random Grids Schemes
    Fu, Zheng-xin
    Yu, Bin
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2013, 2014, 8389 : 109 - 122
  • [23] ENHANCED SECURITY FOR MILITARY GRID REFERENCE SYSTEM USING VISUAL CRYPTOGRAPHY
    Thomas, Sandhya Anne
    Gharge, Saylee
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [24] Authentic secret share creation techniques using visual cryptography with public key encryption
    Karolin, M.
    Meyyappan, T.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) : 32023 - 32040
  • [25] Extended Visual Cryptography for General Access Structures Using Random Grids
    Mishra, Sonu K.
    Biswaranjan, Kumar
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1924 - 1929
  • [26] Authentic secret share creation techniques using visual cryptography with public key encryption
    M. Karolin
    T. Meyyappan
    Multimedia Tools and Applications, 2021, 80 : 32023 - 32040
  • [27] XOR-based region incrementing visual cryptography scheme with share block construction
    Information Engineering University, Zhengzhou
    450001, China
    不详
    100072, China
    Dianzi Yu Xinxi Xuebao, 8 (1978-1983):
  • [28] Share authentication based cheating prevention in naor-shamir's visual cryptography
    Chen, Yu-Chi
    Horng, Gwoboa
    Tsai, Du-Shiau
    Journal of Computers, 2011, 22 (01): : 58 - 66
  • [29] Multi-Secret Sharing Visual Cryptography based on Random Grids
    Han, Yanyan
    Xu, Zhuolin
    He, Wencai
    Ge, Xiaonan
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 612 - 617