Visual Cryptographic Mechanism for Secret Information Sharing

  • Authors

    • Prasanna Kumar H.R
    • Dr Niranjan N. Chiplunkar
    https://doi.org/10.14419/ijet.v7i3.34.19566
  • Cryptography, Security, Random numbers, shares, Multi layer security
  • Security and confidentiality aspects are very much essential for sharing secret information. To provide security to the information conventional encryption technique may be used; which requires high computation and the security is also not in acceptable level. The quality of input image and the recovered image is same. The other approach involves use of visual cryptographic techniques where shares are created for the secret images and the recovered image quality is an issue. We proposed a method for transferring confidential image, which make use of two stages during encryption. Instead of sending the confidential image directly to the receiver, send an encrypted form of the image along with three shares. During decryption decrypt the encrypted image using random numbers and flag values. The proposed method provides multi- layered security for transmitting the confidential image.

     

     
  • References

    1. [1] J. K.Mandal, SubhankarGhatak, “A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptographyâ€, International Symposium on Electronic System Design (ISED), 2011, pp. 329-334

      [2] J. K.Mandal, SubhankarGhatak, “Constant Aspect Ratio Based ( 2, 2) Visual cryptography Through Meaningful Sharesâ€, International Conference on Communication and Industrial Application (ICCIA), 2014, pp. 1-4

      [3] Jaya, Siddharth Malik, AbhinavAggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptographyâ€, 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, 2011

      [4] John Justin M, Manimurugan S, Alagendran B, “ Secure Color Visual Secret Sharing Scheme Using Shifting Coefficient with No Pixel Expansionâ€, International Journal of Computer Science and Information Technologies, Vol. 3(2), pp. 3793-3800, 2012

      [5] Chetana Hegde, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applicationsâ€, Proceedings of the 16th International Conference on Advanced Computing and Communications, 2008

      [6] MoniNaor, Adi Shamir, “Visual cryptographyâ€, Advances in Cryptography, Eurocrypt’94, Lecture notes in Computer Science, Springer-Verlag, Vol. 950, pp. 1-12, 1995

      [7] Young-Chang Hou, Pei-Hsiu Huang, “Image Protection Based on Visual Cryptography and Statistical Propertyâ€, IEEE Statistical Signal Processing Workshop, pp. 481-484, 2011

      [8] John Blesswin, Rema, Jenifer Joselin, “Recovering Secret Image in Visual Cryptographyâ€, International Conference on Communications and Signal Processing(ICCSP), IEEE Conference Publications, 2011, pp. 538-542

      [9] Warjri, Janailin, E. George Dharma Prakash Raj, “KED-A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69â€, International Journal of Computer Network and Information Security, 2013

      [10] J. Ramya, B. parvathavarthini, “An Extensive review on Visual Cryptography Schemesâ€, Proceedings of the IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014, pp. 223-228

      [11] Wei-QiYan, Duo Jin, M.S. kankanhalli, “Visual Cryptography for Print and Scan Applicationsâ€, Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’04), Volume 5, 2004, pp. V-572-V-575

      [12] Jaya, Siddharth Malik, Anjali Sardana, Jaya, “A Keyless Approach to Image Encryptionâ€, Proceddings of the International Conference on Communication Systems and Network Technologies, 2012

      [13] Alharthi, Saeed s, pradeep K. atrey, “Further improvement on secret image sharing schemeâ€, Proceedings of the 2nd ACM workshop on Multimedia in forensics security and intelligence, 2010

      [14] Shetty Deepesh Sadananda, Anusha Karkala, “Image Encryption and Decryption Using Image Gradient Techniqueâ€, International Journal of Emerging Technology and Advanced Engineering, Volume. 3, Issue. 1, January 2013. Pp. 511-515

      [15] Liguo Fang, BinYu, “Research on Pixel Expansion of (2, n) Visual Threshold Schemesâ€, 1st International Symposium on Pervasive Computing and application, pp. 856-860, 2014.

      [16] Yaseen Hikmat Ismaiel, Muna Mahmood Khether, “Binary Image Visual Cryptographyâ€, Vol. 177, No. 6, November 2017.


  • Downloads

  • How to Cite

    Kumar H.R, P., & Niranjan N. Chiplunkar, D. (2018). Visual Cryptographic Mechanism for Secret Information Sharing. International Journal of Engineering & Technology, 7(3.34), 810-812. https://doi.org/10.14419/ijet.v7i3.34.19566