CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data

被引:10
|
作者
Sherine, Anli [1 ]
Peter, Geno [2 ]
Stonier, Albert Alexander [3 ]
Praghash, K. [4 ]
Ganji, Vivekananda [5 ]
机构
[1] Univ Technol Sarawak, Sch Comp & Creat Media, Sarawak, Malaysia
[2] Univ Technol Sarawak, Sch Engn & Technol, CRISD, Sarawak, Malaysia
[3] Kongu Engn Coll, Dept Elect & Elect Engn, Perundurai, Tamil Nadu, India
[4] Koneru Lakshmaiah Educ Fdn, Dept Elect & Commun Engn, Vaddeswaram, Andhra Pradesh, India
[5] Debre Tabor Univ, Dept Elect & Comp Engn, Debra Tabor, Ethiopia
关键词
Compendex;
D O I
10.1155/2022/6040902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares. For security reasons, it ensures that hackers cannot find any clues about the secret image from a single cover image. The proposed technique uses CMY (cyan, magenta, yellow) color space to enhance visual cryptography, and mean visual cryptography can be used on color images. The other techniques used were color decomposition and error diffusion. Error diffusion is a type of half toning in which the quantization residual is distributed to neighboring pixels that have not yet been processed. The image will be encrypted by four shares which is cyan, magenta, yellow, and mask. Mask will be using random function to random generate half black and half white pixel in 2x2 block. Stack all the shares for reviewing the secret image. After that, do the image preprocessing of the image and use OCR (optical character recognition) to recognize the message.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space
    Dahat, Ankush V.
    Chavan, Pallavi V.
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 563 - 570
  • [2] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    [J]. 2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [3] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [4] Secret Information Sharing Using Extended Color Visual Cryptography
    Sharma, Shivam
    Modi, Shivam
    Sharma, Akanksha
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 403 - 412
  • [5] Visual cryptography scheme for secret color images with color QR codes
    Pan, Jeng-Shyang
    Liu, Tao
    Yang, Hong-Mei
    Yan, Bin
    Chu, Shu-Chuan
    Zhu, Tongtong
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 82
  • [6] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [7] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [8] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [9] A Novel Color Multi-Secret Visual Cryptography Scheme
    Sun, Rui
    Fu, Zhengxin
    Yu, Bin
    Huang, Hangying
    [J]. AIPR 2020: 2020 3RD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION, 2020, : 140 - 144
  • [10] Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme
    Raphel, Roshni Kadeparambil
    Ilyas, H. Muhammed
    Panicker, Janu R.
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 476 - 486