Digital Image Security Using Hybrid Visual Cryptography

被引:0
|
作者
Bhatia, Shradha [1 ]
Khatri, Sunil Kumar [1 ]
Singh, Ajay Vikram [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttar Pradesh, India
关键词
RC4; pixel shuffling; KSA; PRGA; Security Quality; Visual Cryptography; Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet is become the most used medium for communication of information like text, images, videos etc. The information exchanged on internet is through unsecured network, maintaining security of the information is the most important issue. To secure information from unauthorized users, there is need to convert the information into an unrecognizable format. Visual cryptography is the best known techniques which encrypts an image into n number of shares and decrypt the image with the human visual system without any additional mathematical computations. This paper proposes an improved color image security algorithm. The algorithm encrypt and decrypt the color image using the decomposition of RGB components (sieving), Pixel shuffling, RC4 cipher algorithm, image division and combining using visual cryptography to result in shares of image. The generated encrypted shares are further shared over the network.
引用
收藏
页码:570 / 576
页数:7
相关论文
共 50 条
  • [21] A New Security Protocol Using Hybrid Cryptography Algorithms
    Alkady, Yasmin
    Habib, Mohmed I.
    Rizk, Rawya Y.
    [J]. 2013 9TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO 2013): TODAY INFORMATION SOCIETY WHAT'S NEXT?, 2014, : 109 - 115
  • [22] File Security Using Hybrid Cryptography and Face Recognition
    Khadka, Shekhar
    Shah, Niranjan
    Shrestha, Rabin
    Acharya, Santosh
    Karna, Neha
    [J]. MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 539 - 553
  • [23] Multiple Secret Image Communication Using Visual Cryptography
    A. John Blesswin
    G. Selva Mary
    S. Manoj Kumar
    [J]. Wireless Personal Communications, 2022, 122 : 3085 - 3103
  • [24] Multiple Secret Image Communication Using Visual Cryptography
    Blesswin, A. John
    Mary, G. Selva
    Kumar, S. Manoj
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3085 - 3103
  • [25] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    [J]. 18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [26] A Double Security Approach for Visual Cryptography using Transform Domain
    Ravikumar, Arya
    Mredhula, L.
    [J]. 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), 2015, : 141 - 144
  • [27] Security and Privacy for Medical Images Using Chaotic Visual Cryptography
    Abdul, Wadood
    Ali, Zulfiqar
    Ghouzali, Sanaa
    Alsulaiman, Mansour
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (06) : 1296 - 1301
  • [28] Visual Cryptography for Image Privacy protection using Diverse Image media
    Rao, Jyoti
    Patil, Vikram
    [J]. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 855 - 859
  • [29] Security analysis of authentication of images using recursive Visual Cryptography
    Yang, Ching-Nung
    Chen, Tse-Shih
    [J]. CRYPTOLOGIA, 2008, 32 (02) : 131 - 136
  • [30] Image Hatching for Visual Cryptography
    Weir, Jonathan
    Yan, Wei-Qi
    [J]. 2009 13TH INTERNATIONAL MACHINE VISION AND IMAGE PROCESSING CONFERENCE, 2009, : 59 - 64