2,663 Hits in 4.5 sec

A Secure Approach for Data Hiding using Visual Cryptography

Sankar Das, Asoke Nath
2016 International Journal of Innovative Research in Computer and Communication Engineering  
In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share.  ...  Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System.  ...  RESULTS AND DISCUSSIONS Test Reports: All the test cases mentioned above passed successfully. A. 24-bit Color image: 1. Example-1: The RKO technique was implemented on color image showed in Fig.4.  ... 
doi:10.15680/ijircce.2016.0406004 fatcat:vsqaxc6hpba2dab4uajhr7qtom

Password Protected Visual Cryptography via Cellular Automaton Rule 30 [chapter]

Roman V. Yampolskiy, Jovan D. Rebolledo-Mendez, Musa M. Hindi
2014 Lecture Notes in Computer Science  
Visual cryptography depends on two shares.  ...  Only one of these shares has to be random. The developed encryption system is a hybrid between visual and classical cryptographic approaches.  ...  The authors of this manuscript would like to thank Dr. Stephen Wolfram for his guidance and support in crafting this methodology, as well as his great feedback.  ... 
doi:10.1007/978-3-642-55046-1_4 fatcat:vsxfg7cwvjhmboslfkevtkhpzu

Error Filtering Schemes for Color Images in Visual Cryptography

Shiny Malar, Jeya Kumar
2011 International Journal of Advanced Computer Science and Applications  
The color visual cryptography methods are free from the limitations of randomness on color images. The two basic ideas used are error diffusion and pixel synchronization.  ...  The proposed color image visual cryptic filtering scheme presents a deblurring effect on the non-uniform distribution of visual cryptic share pixels.  ...  The limitation of the above method is its randomness without any visual information. Extended Visual Cryptography have been suggested which also suffers from the same drawbacks of randomness.  ... 
doi:10.14569/ijacsa.2011.021112 fatcat:t5oba53y2rhezogzhdla2yogxq

A Review on Various Implemented Techniques for Visual Cryptography

Amit Kumar, Anurag Jain
2016 International Journal of Computer Applications  
The area of Visual Cryptography has progressed progressively over the past some years.  ...  color images.  ...  In [7] , case of color graphic cryptography methods, there is no limitation of randomness on color images. Error dispersion and pixel harmonization are the two basic methods used.  ... 
doi:10.5120/ijca2016912314 fatcat:zsqlqlfyvzherpgsltra4pecj4

RKO Technique for Color Visual Cryptography

Ms. Moushmee Kuri, Dr. Tanuja Sarode
2014 IOSR Journal of Computer Engineering  
In this paper we propose a novel approach with the use of random share and key share. The approach employs generating two shares of the original image. One random share and the other key share.  ...  To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography.  ...  This paper proposes a method called RKO technique for visual cryptography of color images based on past studies in black-and-white visual cryptography.  ... 
doi:10.9790/0661-162108993 fatcat:iijggsxmnndgfbvdmfm2zumi4m

Improved the Security Strength of Visual Cryptography using Feature based Watermarking Technique

Sandeep Singh, Ajay Goyal
2016 International Journal of Computer Applications  
The color feature property generates a key value and texture feature property generates the value of share for the visual cryptography.  ...  The process of visual cryptography used technique of share generation for the authentication of image. The process of share generation used mathematical formula and derivations.  ...  INTRODUCTION The concept of share generation in visual cryptography proposed by Nair and Shamir in 1995 [1, 2] .  ... 
doi:10.5120/ijca2016912192 fatcat:xdlppu7hmjfujhudblusplj7fa

Visual Cryptography: A Review

Dipesh Vaya, Sarika Khandelwal, Teena Hadpawat
2017 International Journal of Computer Applications  
In visual cryptography a secret image is transformed into several share images. These share images are meaningful but noisy or distorted images.  ...  Here in this paper we are going to review an advanced method of information hiding i.e. Visual Cryptography.  ...  In this the concept of arcs was used to construct a colored visual cryptography theme. the multiple secrets sharing in visual cryptography was first proposed by S J Shyu et al [11] .  ... 
doi:10.5120/ijca2017915406 fatcat:kpknfhwu4zfebppe3jchn7zhkq

A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes

Rola I. Al-Khalid, Randa A. Al-Dallah, Aseel M. Al-Anani, Raghad M. Barham, Salam I. Hajir
2017 Journal of Software Engineering and Applications  
In this paper we proposed a method that is based on the concept of visual cryptography for color images and without any pixel expansion which requires less space.  ...  The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed.  ...  In this paper, we proposed a visual cryptography method for color images and without any pixel expansion compared to [1] . The proposed method is used to encrypt halftone color images.  ... 
doi:10.4236/jsea.2017.101001 fatcat:7ll5dqs475cyra65kpn3rp42ti

Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images

Lu Wang, Bin Yan, Hong-Mei Yang, Jeng-Shyang Pan
2020 Symmetry  
To counteract potential cheating attacks, Lin et al. proposed flip visual cryptography in 2010, where a second secret image can be revealed by stacking one share with a flipped version of another share  ...  Visual cryptography (VC) has found numerous applications in privacy protection, online transaction security, and voting security, etc.  ...  Acknowledgments: The authors would like to thank Molefi Itumeleng Alice for proof-reading the whole manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym13010065 fatcat:sr3qmbukefg4thh5oao2r6blkq

New Visual Cryptography Algorithm For Colored Image [article]

Sozan Abdulla
2010 arXiv   pre-print
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. Each layer holds some information.  ...  The proposed algorithm is for color image, that presents a system which takes four pictures as an input and generates three images which correspond to three of the four input pictures.  ...  ACKNOWLEDGMENT I would like to express my gratitude to the anonymous reviewers for their comments to improve the quality of this paper.  ... 
arXiv:1004.4445v1 fatcat:wscsjhkjjrc3lmlxjme5g47muu

A Survey on Secure Server Verification Using Visual Cryptography on Normal Images

Saili Pawar
2019 International Journal for Research in Applied Science and Engineering Technology  
Here we propose an abstract view of the system which we are developing named as "Secure Server Verification by Using Visual Cryptography and normal image" to solve the problem of phishing using Visual  ...  This paper gives a survey of different method used by the researcher to avoid phishing attacks which is one of the online attacks that have been increased due to an online transaction.  ...  If the server under test sends some unusual share then the loading of shares will create an unrecognizable form of an image. a) Visual Cryptography based phishing Website b) Creation of multiple image  ... 
doi:10.22214/ijraset.2019.4237 fatcat:layxzj3x7zclrki5gdijnemty4

Extended Visual Cryptography for Color Images and its PSNR Analysis

L MVaralakshmi, Prithy R, Radhika Parameswari
2013 International Journal of Computer Applications  
Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.  ...  In order to reduce the size and the distortion of decrypted image we propose the visual cryptography for color image using visual information pixel (VIP) synchronization and floyd error diffusion dithering  ...  Naor and Shamir proposed a new cryptography area, visual cryptography [1] , in 1994.  ... 
doi:10.5120/11487-7189 fatcat:w6m3u7l6rzappohk7jdusvtlu4

A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme

Elavarasi G, Dr.Vanitha M
2017 International Journal of Engineering and Technology  
Here a new Color Visual Secret Sharing (CVSS)plot is connected to produce shares for input medicinal picture.  ...  The visual mystery sharing (VSS) plot, which starts from the visual cryptography, is an impeccable secure technique that ensures a picture by separating it into many offer pictures.  ...  Savita Patil used the concept of visual information pixel synchronization and error diffusion to attain a color visual cryptography encryption method that produces color shares [6] .  ... 
doi:10.21817/ijet/2017/v9i5/170905313 fatcat:ibyst6kyebcuhfmyqbuhstfrba

An Advance Halftone Secure Secret Sharing Scheme with Error Diffusion Technique in Visual Cryptography

I. Diana, G.J. Joyce
2016 International Journal of Computer Applications  
To overcome those kind of security issues, we propose the advance halftone secure secret sharing scheme with error diffusion techniques in the visual cryptography.  ...  Previous visual cryptography technology, privacy of the share images is not preserved because of the other duplicate shares which can so easily alter or insert some other images, it remains to be the major  ...  in the visual cryptography.  ... 
doi:10.5120/ijca2016909952 fatcat:lhbmkrloojappd62dknahxbehy

Halftone Image Watermarking based on Visual Cryptography

Jaishri Chourasia, M. B. Potdar, Abdul Jhummarwala, Keyur Parmar
2012 International Journal of Computer Applications  
At the time of watermark embedding verification share is generated and at the time of watermark extraction master share is generated using (2, 2) visual cryptography scheme.  ...  In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme.  ...  The random numbers are generated to implement the concept of visual cryptography to generate the shares. Step3.  ... 
doi:10.5120/5805-8010 fatcat:x3v4yqz2qfgardgoarn2s6xuiu
« Previous Showing results 1 — 15 out of 2,663 results