Author : R. Sathishkumar 1
Date of Publication :7th March 2017
Abstract: Visual Cryptography Scheme (VCS) is an image based secret sharing technique which encrypts the secret image into binary shares. These binary shares are then overlapped to decrypt the secret image, but with a reduction in the image quality. In Extended Visual Cryptography Scheme (EVCS), shares are embedded with different cover images to generate meaningful shares. Two in One Image Secret Sharing Scheme (TiOISSS) was implemented to improve the decoded image quality, which perfectly retrieve of the secret image. In this proposed scheme, the TiOISSS implemented to share multiple secret images with perfect reconstruction made possible. Adaptive Halftoning was implemented to improve the image quality. Additionally, a textual message is also embedded in GVCS shares to protect the secret images from the intruders. The quality and the security of the reconstructed secret images are enhanced, in the proposed scheme.
Reference :
-
[1] M. Naor and A. Shamir, “Visual Cryptography”, Alfredo De Santis (Ed.), Advances in Cryptology Proceedings of Eurocypto 94, Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1994.
[2] M. Naor, A. Shamir, in: M. Lomas (Ed.), VisualCryptography, II: “Improving the Contrast via the Cover Base”Presented at Security in Communication Networks, Amalfi,Italy, September 16–17, 1996.
[3] G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, “Visualcryptography for general access structures”, Inform. Comput.129 (1996) 86–106.
[4] S. Arumugam, R. Lakshmanan and Atulya K. Nagar, “On (k,n) visual cryptography scheme”, Journal of Designs, Codes and Cryptography, vol. 71, no. 1, pp. 153-162, July 2014
[5] R.W. Floyd and L. Steinberg, “An adaptive algorithm for spatialgrayscale”, Proc.SID, 17/2:75–77, 1975
[6] C. Blundo, A. De Santis, M. Naor, “Visual cryptography for greylevel images”, Inf. Process. Lett. 75 (2000) 255– 259.
[7] C.C. Lin, W.-H. Tsai, “Visual cryptography for greylevel images bydithering techniques”, Pattern Recognition Lett. 24 (2003) 349–358.
[8] Nakajima, M. and Yamaguchi, Y., “Extended visual cryptography fornatural images”, Journal of WSCG, v10 i2. 303-310.
[9] G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, “Extendedcapabilities for visual cryptography”, Theor. Comput. Sci. 250 (2001)143–161
[10]V. Rijmen, B. Preneel, “Efficient colour visual encryption forshared colors of Benetton”, Eurocrypto’96, Rump Session,Berlin, 1996.
[11]Wu, C.C. & Chen, L.H., “A study on visual cryptography”. Master thesis. Institute of Computer and Information Science, National Chaio Tung University, Taiwan, R.O.C., 1998.
[12]Wu, H. C., & Chang, C. C., “Sharing visual multi-secrets using circle shares”, Computer Standards & Interfaces, 28, 123–135, 2005
[13]Shyu, S. J., Huang, S. Y., Lee, Y. K., Wang, R. Z., & Chen, K., “Sharing multiple secrets in visual cryptography”. Pattern Recognition, 40, 3633–3651, 2007.
[14]Feng, J. B., Wu, H. C., Tsai, C. S., Chang, Y. F., & Chu, Y. P., “Visual secret sharing for multiple secrets”. Pattern Recognition, 41, 3572–3581, 2008.
[15]H.Y. Chien, J.K. Jan, Y.M. Tseng, “A practical ðt; nÞ multi-secret sharing scheme”, IEICE Transactions on Fundamentals E83-A (12), 2762–2765, 2000.
[16]Chih-Ching Thien and Ja-Chen Lin, “Secret image sharing”, Journal of Computers & Graphics, vol. 26, no. 5, pp. 765-770, October 2002.
[17]Sian-Jheng Lin and Ja-Chen Lin, “VCPSS:A two-in-one two-decoding options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches”, Journal of Pattern Recognition Letters, vol. 40, no. 12, pp. 3652-3666, April 2007.
[18]Peng Lia, Pei-Jun Maa, Xiao-Hong Sua and Ching-Nung Yang, “Improvements of a two-in-one image secret sharing scheme based on gray mixing model”, Journal of Visual Communication and Image Representation, vol. 23, no. 3, pp. 441-453, January 2012.
[19]Srividhya Sridhar, R. Sathishkumar, Gnanou Florence Sudha, “Adaptive halftoned visual cryptography with improved quality and security”, Journal of Multimedia Tools and Applications, pp.1-20, November 2015.
[20]S.Srividhya, R. Sathishkumar, Gnanou Florence Sudha, “Implementation of TiOISSS with meaningful shadows and with an additional authentication Image”, Journal of Visual Communication and Image Representation, vol.38, pp.284-296, July 2016.