CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data

被引:10
|
作者
Sherine, Anli [1 ]
Peter, Geno [2 ]
Stonier, Albert Alexander [3 ]
Praghash, K. [4 ]
Ganji, Vivekananda [5 ]
机构
[1] Univ Technol Sarawak, Sch Comp & Creat Media, Sarawak, Malaysia
[2] Univ Technol Sarawak, Sch Engn & Technol, CRISD, Sarawak, Malaysia
[3] Kongu Engn Coll, Dept Elect & Elect Engn, Perundurai, Tamil Nadu, India
[4] Koneru Lakshmaiah Educ Fdn, Dept Elect & Commun Engn, Vaddeswaram, Andhra Pradesh, India
[5] Debre Tabor Univ, Dept Elect & Comp Engn, Debra Tabor, Ethiopia
关键词
Compendex;
D O I
10.1155/2022/6040902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares. For security reasons, it ensures that hackers cannot find any clues about the secret image from a single cover image. The proposed technique uses CMY (cyan, magenta, yellow) color space to enhance visual cryptography, and mean visual cryptography can be used on color images. The other techniques used were color decomposition and error diffusion. Error diffusion is a type of half toning in which the quantization residual is distributed to neighboring pixels that have not yet been processed. The image will be encrypted by four shares which is cyan, magenta, yellow, and mask. Mask will be using random function to random generate half black and half white pixel in 2x2 block. Stack all the shares for reviewing the secret image. After that, do the image preprocessing of the image and use OCR (optical character recognition) to recognize the message.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Enhanced block based progressive visual secret sharing scheme for grayscale and color image
    Vishal V. Panchbhai
    Suchita W. Varade
    [J]. Multimedia Tools and Applications, 2024, 83 : 50519 - 50555
  • [32] A novel two-in-one image secret sharing scheme based on perfect black visual cryptography
    Li, Peng
    Yang, Ching-Nung
    Kong, Qian
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 41 - 50
  • [33] Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography
    Choudhary, Arvind Singh
    Kumar, Manoj
    [J]. CYBERNETICS AND SYSTEMS, 2024, 55 (01) : 42 - 60
  • [34] Randomness in secret sharing and visual cryptography schemes
    De Bonis, A
    De Santis, A
    [J]. THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) : 351 - 374
  • [35] A novel two-in-one image secret sharing scheme based on perfect black visual cryptography
    Peng Li
    Ching-Nung Yang
    Qian Kong
    [J]. Journal of Real-Time Image Processing, 2018, 14 : 41 - 50
  • [36] ESSVCS: An enriched secret sharing visual cryptography
    Liu, Feng
    Yan, Wei Q.
    Li, Peng
    Wu, Chuankun
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 1 - 24
  • [37] Hybrid (2, n) Visual Secret Sharing Scheme for Color Images
    Lee, Jung-San
    Le, T. Hoang Ngan
    [J]. 2009 IEEE-RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES: RESEARCH, INNOVATION AND VISION FOR THE FUTURE, 2009, : 320 - +
  • [38] A (2,2) Secret Sharing Scheme for Visual Cryptography without Pixel Expansion
    Hodeish, Mahmoud E.
    Humbe, V. T.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [39] AN IMPROVED SECRET SHARING USING XOR-BASED VISUAL CRYPTOGRAPHY
    Purushothaman, Vandana
    Sreedhar, Sreela
    [J]. PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [40] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755