VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION
|
|
- Mae Peters
- 5 years ago
- Views:
Transcription
1 VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati Pannyagol Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka ABSTRACT-Visual Cryptography (VC) is not sufficient in terms of providing color meaningful shares with high visual quality. This paper produces visual cryptography encryption method for color images which use the error diffusion and visual information pixel (VIP) synchronization techniques to generate meaningful color shares with high visual quality. Low frequency differences between the input and output images are minimized in Error diffusion method and consequently it produces pleasing halftone images to human vision. Synchronization of the VIPs across the color channels improves visual contrast of shares. Comparison of Jarvis halftone with Floyd halftone shows good result of Jarvis method. Keywords Color meaningful shares, halftoning, error diffusion, visual cryptography (VC). I INTRODUCTION Visual Cryptography (VC) is a data security technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption operation does not require a computer. Visual Cryptography (VC) for black and white was first formally introduced by Naor and Shamir [1]. In which one secret binary image is cryptographically encoded into n shares of random binary patterns. The n shares are distributed amongst group of n participants, one for each participant. No participants can retrieve any information from his own transparency, but any k or more participants can visually reveal the secret image by polling there transparencies together. The secret cannot be decoded by any k-1 or less participants, even if higher computational power is available to them. In VC the decryption process requires only human visual system. This property makes visual cryptography especially useful for the low computation load requirement. VC scheme has been applied to many applications. Apart from the obvious applications to information hiding, there are many applications of VC [2, 3], which include general access control [4]. VC can also be used in a number of other applications such as threshold cryptography, electronic cash, private multiparty computations and digital electronics etc. Vol. 1 Issue 2 July ISSN: X
2 Fig.1: Construction of (2, 2) VC scheme Generally, the black-and-white (2, 2) visual cryptography decomposes every pixel in a secret image into a 2 2 block in the two transparencies according to the rules in figure 1, two of them black and white. If pixel is white (black) one of the above six columns of figure 1 is chosen to generate Share1 and Share2. Then, the characteristics of two stacked pixels are: black and black is black, white and black is black, and white and white is white. Therefore, when stacking two transparencies the blocks corresponding to black pixels in the secret image are full black and those corresponding to white pixels are half-black-and-half-white. As concern to information security, one of the six columns is selected with equal probability. (a) Binary secret image. (b) Encrypted share 1. (c) Encrypted share 2. (d) Decrypted secret message. Fig.2: Example of 2-out-of-2 scheme. The secret image is encoded into two shares showing random patterns. The decoded image shows the secret image with 50% contrast loss. Figure 2 shows an example of a simple (2, 2)-VC scheme with a set of subpixels shown in figure 1. Figure 2(a) shows a secret binary message, Figure 2(b) and (c) depict encrypted shares for two participants. Stacking these two shares leads to the output secret message as shown in figure 2(d). Little research has been carried out on VC, a more general method for VC scheme is based upon general access structure [4]. The access structure is a specification of qualified and forbidden subsets of shares. The participants in a qualified subset can recover the secret image while the participants in a forbidden subset cannot. But this technique gives good result on binary images. In extended visual cryptography (EVC)[5] method, a shares contain not only the secret information but are also some meaningful binary images are developed. In this method Hypergraph colorings are used for constructing meaningful binary shares. Since, hypergraph colorings are constructed by random pixels distribution, the resultant binary shares contain strong white noise leading to insufficient results. A VCS for color images based upon an additive color Vol. 1 Issue 2 July ISSN: X
3 mixing [6] method is introduced. In this scheme, each pixel is expanded by a factor of three, which will increase the size of encrypted shares. This paper introduces a color VC encryption method to generates meaningful shares. It based on two fundamental concepts used in the generation of shares they are error diffusion[7] and pixel synchronization[8]. Error diffusion is a procedure that produces pleasing halftone images to human vision. Synchronization of the pixels of secret image and covering images across the color channels improves visual quality of shares. Visual Information Pixel (VIP) synchronization prevents colors and contrast of original shares from degradation even with matrix permutation. This paper is organized as follows. Section II describes the proposed method which uses Error diffusion and VIP Synchronization. Section III shows experimental results of the new method and comparisons of Error diffusion methods. Finally, we conclude this paper in Section IV. II. IMPLEMENTATION System is designed into 2 phases. The first phase generates shares by using the error diffusion [11] algorithm and Pixel Synchronization. The Figure 3 explains the working of the system. N covering Secret Img Share Generation Halftoning VIP synchronization Secret image Stacking Fig.3 Block Diagram of System Design A. Halftoning Error diffusion [7],[9] produces halftone images of much higher quality than other halftone. It quantifies each pixel using a neighborhood operation. A schematic diagram of error diffusion method is given in figure 4. The error diffusion scans the image one row at a time and one pixel at a time. The current pixel is compared to a threshold (127) value. If it is above the value a white pixel is generated in the resulting image. If the pixel is below the half way value, a black pixel is generated. The generated pixel is either full bright, or full black. Fig.4: Error Diffusion Block Diagram Vol. 1 Issue 2 July ISSN: X
4 Fig.5: Two error diffusion weight matrixes (a) Jarvis, Judice, and Ninke (b) Floyd and Steinberg Error is calculated which is the difference between original image and halftone image. The error is then added to the next pixel in the image and the process repeats. To which neighbor and how this error is pushed is decided by an error diffusion matrix. Algorithm: Jarvis error diffusion halftoning 1: procedure JARVIS ERROR DIFFUSION (g) 2: for i=1,..n do 3: for j=1,.m do (This algorithm goes through all pixels in the original image, normally starting from the pixel up to the left and then goes through all pixels from left to right and up down). 4: if f[i j ] >127 then else b[i j ]=1 b[i j ]=0 5: Since the pixel value in f, which is a real number between 0 and 255, has been replaced by 0 or 1 in b and error has been calculated. e= f - b(i,j) The error is the difference between the pixel value in f and b at that position. 6: The error occurred at the position (i, j) is weighted by 7/48 and added to the pixel value at (i+1, j). The same error is weighted by 5/48 and added to the pixel at (i+1, j+1) and so on. After the error has been diffused the pixel value of the next position is compared to the threshold and the same process continues until all pixels have been met. 7: end for 8: end for 9: end procedure Floyd and Steinberg error diffusion method follow the same algorithm except that while distributing error it uses Floyd and Steinberg matrix as shown in figure 5(b). B.VIP Synchronization Vol. 1 Issue 2 July ISSN: X
5 Visual Information Pixel (VIP) is pixel on the encrypted shares that have color values of the original images, which make shares meaningful. In the proposed method each subpixel n carries visual information as well as message information,while other methods in [1] and [5] extra pixels are needed in addition to the pixel expansion n to produce meaningful shares. Algorithm: VIP synchronization Input: C1, C2 covering Images of size n x m, Sc secret image of size K1xK2. Output: 2 meaningful shares 1: procedure: VIP Synchronization and Matrix Distribution 2: for p=1,..k1 and for q=1, K2 do 3: for the color channel R of the secret image Sc R (p,q) do 4: if the bit Sc R (p,q)=1 then for i=1,..k1 do for j=1,.k2 do if C1(i,j)=C2(i,j) then Randomly select any one Ci and complement Ci(i,j) end if 5: end for end for 6: else if Sc R (p,q)=0 then for i=1,..k1 do for j=1,.k2 do if C1(i,j) end if end for end for end if 7: Repeat 3 to 6 for the channel G and Y. 8: end for 9: end for 10: end procedure then Randomly select any one Ci and make them equal i.e.c1(i,j)=c2(i,j) or C2(i,j)= C1(i,j) This algorithm takes the input as halftone images which are created by error diffusion method. It decomposes the color images into 3 basic colors (Red, Green, and Blue) and then it executes VIP Synchronization algorithm on each color bit. The output of this block are meaningful shares. Now each bit on share contains information regarding covering image as well as secret image without giving any clue about encryption. C. Stacking Decoding does not need any algorithm. The meaningful shares are XORed to reconstruct the secret image by simply human vision system. III RESULTS and ANALYSIS The algorithms discussed above are implemented using MATLAB 2008 and higher version on 2.40GHz, 2.92 GB RAM. To test the performance of these algorithms 4 color images belonging to different classes of size 128x128 are used. A. Results In this section, we provide some experimental results to illustrate the effectiveness of the proposed method. Example are composed with (2, 2) Color VC, (2,3) Color VC and (3,4) color VC. The secret message of size 128x128 pixels and covering images of size 256x256 in natural colors are provided for the share Vol. 1 Issue 2 July ISSN: X
6 generation. Figure 6 to 10 represent the results of each step of the system. Size of images is resized to fit in the paper. (a) (b) (c) (d) (e) Fig.6 (a) (d) Covering Input Images of size 256x256 (e) secret input image of size 128x128 (a) (b) (c) (d) (e) Fig.7 Halftone shares using error diffusion method All the images are halftone before encryption process. Halftone images create a space so that we can embed secret message into covering image. A. (2, 2) Visual Cryptography (a)share 1 (b) Share 2 (c) Reconstructed secret image Fig 8 (a)-(b) result of encrypting images (a),(b) and (e) of figure 7. fig.8 (c) Result of stacking (a) and (b) of figure 8. B. (2, 3) Visual Cryptography Vol. 1 Issue 2 July ISSN: X
7 image (a)share1 (b) Share 2 (c) Share 3 (d) Reconstructed secret Fig 9 (a)-(c) Result of encrypting images (a),(b),(c)and (e) of figure 7.fig 9 (d) Result of stacking (a),(b) and (c) of figure 9 C. (2, 4) Visual Cryptography (a) Share1 (b) Share2 (c) Share3 (d) Share4 (e) reconstructed image Fig.10 (a)-(d) Result of encrypting images (a),(b),(c),(d) and (e) of figure 7.fig.10 (e) Result of stacking (a),(b),(c)and (d) of figure 10 B.Analysis Table-I,II and III shows the result of 4 sample images of different categories for Jarvis[13] and Floyd and Steinberg[8] error diffusion algorithm for (2,2),(2,3) and (2,4) VC schemes,respectively. TABLE I: PSNR AND CORRELATION PARAMETERS USED FOR DIFFERENT IMAGES AND HALF TONE METHODS FOR 2 SHARES. Image Parameter Floyd-Steinberg method Jarvis method Letter img PSNR Correlation Map Img PSNR Correlation Chi Img PSNR Correlation Logo Img PSNR Correlation Fig.11 (a) Different images versus PSNR with different halftone methods Fig.11 (b) Different images versus Correlation Coefficient with different halftone methods. Vol. 1 Issue 2 July ISSN: X
8 Figure 11 (a) shows the PSNR values for the sample images. Stacked image produced by Jarvis [13] is very good retains pictorial details as compared to Floyd and Steinberg [8] half tone method. Since, Jarvis halftone method give clearer image compared to Floyd and Steinberg halftone method. Figure 11 (b) shows the correlation values for the sample images. Reconstructed image produced by Jarvis [13] is very much similar to original image as compared to Floyd and Steinberg [8] halftone method. This means there is very small amount of data loss in Jarvis halftone method. TABLE II: PSNR AND CORRELATION PARAMETERS USED FOR DIFFERENT IMAGES AND HALF TONE METHODS FOR 3 SHARES. Image Parameter Floyd-Steinberg method Jarvis method Letter img PSNR Correlation Map Img PSNR Correlation Chi Img PSNR Correlation Logo Img PSNR Correlation Fig.12 (a): Different images versus PSNR with different halftone methods Fig.12 (b): Different images versus Correlation coefficient with different halftone methods. Figure 12 a) and b) shows the PSNR and correlation values for the sample images, respectively. Jarvis halftone method produce clearer image compared to Floyd and Steinberg halftone method. If less information is present secret image then in (2,3) VC Floyd and Steinberg provide clear picture compared to Jarvis. TABLE III: PSNR AND CORRELATION PARAMETERS USED FOR DIFFERENTIMAGES AND HALF TONE METHODS FOR 4 SHARES. Image Parameter Floyd-Steinberg Jarvis method method Letter PSNR img Correlation Map Img PSNR Correlation Chi Img PSNR Correlation Logo Img PSNR Correlation Vol. 1 Issue 2 July ISSN: X
9 Fig.13 (a) Different images versus PSNR with different halftone methods images Fig 13 (b) shows the correlation values for the sample Figure 13(a) and (b) shows the PSNR and correlation values for the sample images, respectively for (2,4) VC. Jarvis halftone method produce clearer image compared to Floyd and Steinberg halftone method. TABLE IV PSNR PAMETERS USED FOR DIFFERENT IMAGES AND NO.OF SHARES GENERATED Images 2 Shares 3 Shares 4 Shares Letter img Map Img Chi Img Logo Img Fig.14 Different images versus PSNR with different No. of share generation. Figure 14 shows PSNR value for different VC scheme. Stacked image of (2,2) VC scheme is very good retains pictorial details as compared to another two VC schemes. As we increase the number of covering images performance of Synchronization process is less. As the security point of view (2,2) has more security ratio compared to (2,3) and (2,4) VC. IV. CONCLUSION AND FUTURE WORK The proposed system presents an encryption method for color Visual Cryptography scheme with Error diffusion and VIP Synchronization for visual quality improvement. Jarvis and Floyd and Steinberg halftone methods are compared. Jarvis kernel gives better visual quality. For encryption VIP synchronization is used. It hold the original pixels in the actual VIP values to produce meaningful shares. The secret information is revealed by overlapping of meaningful shares. V. REFERENCES [1] M. Naor and A. Shamir, Visual cryptography, in Proc. EUROCRYPT, 1994, pp [2] M. S. Fu and O. C. Au, Joint visual cryptography and watermarking, in Proc. IEEE Int. Conf. Multimedia Expo, 2004, pp [3] M. Naor and B. Pinkas, Visual authentication and identification, Adv.Cryptol., vol. 1294, pp , [4] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Visual cryptography for general access structures, Inf. Comput., vol. 129, no. 2, pp , Vol. 1 Issue 2 July ISSN: X
10 [5] G. Ateniese, C. Blundo, A. Santis, and D. R. Stinson, Extended capabilities for visual cryptography, ACM Theor. Comput. Sci., vol. 250,pp , [6] C. N. Yang and T. S. Chen, Visual cryptography scheme based on additive color mixing, Pattern Recognit.,vol. 41, pp , [7] S. Gooran, Digital Halftoning,Thesis, Linkoping University, Linkoping,Sweden. [8] InKoo Kang,Gonzalo R.Arce,heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion, IEE Trans. On Image processing,vol.20.no [9] Sadan Ekdemir, Xunxun Wu, Digital Halftoning Improvements on the Two-by-Two Block Re-placement Method.333,jan Vol. 1 Issue 2 July ISSN: X
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,
More informationPerformance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography
Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationVarious Visual Secret Sharing Schemes- A Review
Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse
More informationEvaluation of Visual Cryptography Halftoning Algorithms
Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer
More informationAn Overview of Visual Cryptography Schemes for Encryption of Images
An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim
More informationAN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney
26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney
More informationComparison of Visual Cryptographic Algorithms for Quality Images Using XOR
Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Sathiya K 1, Senthamilarasi K 2, Janani G 3, Akila victor 4 1,2,3 B.Tech CSE, VIT University, Vellore-632014. 4 Assistant Professor,
More informationImplementation of Colored Visual Cryptography for Generating Digital and Physical Shares
Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Ahmad Zaky 13512076 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi
More informationEnhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing
Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology
More informationFixed Unmitigated Image Cryptography Schemes
IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,
More informationComparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan
Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan 1 Digvijay Singh, 2 Pratibha Sharma 1 Student M.Tech, CSE 4 th SEM., 2 Assistant Professor
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH
More informationSecret Sharing Image Between End Users by using Cryptography Technique
Secret Sharing Image Between End Users by using Cryptography Technique SRINIVASA RAJESH KUMAR D. M.Tech Scholar Department of CSE, B V C Engineering college, Odalarevu P.MARESWARAMMA Associate Professor
More informationInternational Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page
Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology
More informationA Novel Technique in Visual Cryptography
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2
More informationVisual Secrete Sharing by Diverse Image Media
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11615-11620 Visual Secrete Sharing by Diverse Image Media Aparna Bhosale 1, Jyoti
More informationVisual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.
Visual Cryptography Frederik Vercauteren University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB frederik@cs.bris.ac.uk Frederik Vercauteren 1 University of Bristol 21 November
More informationComparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan
Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan 1 Digvijay Singh, 2 Pratibha Sharma 1 Student M.Tech, CSE 4 th SEM., 2 Assistant Professor CSE Career Point
More informationAn Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images
An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in
More informationEXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationSecured Bank Authentication using Image Processing and Visual Cryptography
Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth 1, G.Padmaja 2, Dr. Syed Khasim 3, Dr. P.V.S.Lakshmi 4, A.Haritha 5 1 Assistant Professor, Department of CSE, PSCMRCET,
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering
More informationBidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography
Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography P.Mohamed Fathimal 1, Dr.P.Arockia Jansi Rani 2 Abstract Visual Cryptography is a cryptographic technique
More informationDigital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media
1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College
More informationAnalysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone
Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone Surabhi Tiwari MTech Scholar, DC (ECE), TIEIT Bhopal (RGPV), India Neetu Sharma AP, ECE, TIEIT Bhopal (RGPV),
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationSurvey on Size Invariant Visual Cryptography
Survey on Size Invariant Visual Cryptography Biswapati Jana 1,Gargi Hait 2,Shyamal Kumar Mondal 3 1 Assistant Professor, Department of Computer Science, Vidyasagar University, PaschimMedinipur, 2 Student,
More informationDigital Image Sharing using Encryption Processes
Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University
More informationMulti Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
More informationA Recursive Threshold Visual Cryptography Scheme
A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding
More informationAn Image Database Security Using Multilayer Multi Share Visual Cryptography
ISSN (Online): 29-7064 Index Copernicus Value (20): 6.4 Impact Factor (20): 4.48 An Image Database Security Using Multilayer Multi Share Visual Cryptography Apurva A. Mohod, Prof. Komal B. Bijwe 2, 2 Amravati
More informationA STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi
More informationIMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY Naoyuki Awano Department of Computer and Information Science, Seikei University, Tokyo, Japan ABSTRACT Using
More informationA Cost-Effective Private-Key Cryptosystem for Color Image Encryption
A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationProgressive Color Visual Cryptography
1 Progressive Color Visual Cryptography (Final version of the manuscript ID: JEI03158) Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli School of Computing, National University of Singapore Singapore 117543 This
More informationEFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING
EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING 1 P.Lakshmi, 2 S.Baskari ABSTRACT -- Visual cryptography is a popular solution for image encryption. The encryption
More informationAbstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory
The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information
More informationMeta-data based secret image sharing application for different sized biomedical
Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy
More informationVisual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap
Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap N Krishna Prakash, Member, IACSIT and S Govindaraju Abstract This paper proposes a method
More informationCheating Prevention in Visual Cryptography using. Steganographic Scheme
Cheating Prevention in Visual Cryptography using Steganographic Scheme Biswapati lana Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: biswapatijana@gmail.com)
More informationFig 1: Error Diffusion halftoning method
Volume 3, Issue 6, June 013 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Approach to Digital
More informationProtection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 60 Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique 1 Mr.A.Duraisamy, 2 Mr.M.Sathiyamoorthy,
More informationCopyright protection scheme for digital images using visual cryptography and sampling methods
44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.
More informationVisual Cryptography for Face Privacy
Visual Cryptography for Face Privacy Arun Ross and Asem A. Othman Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506 USA ABSTRACT We discuss
More informationVisual Cryptography Scheme for Gray Scale Images based on Intensity Division
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Pradeep
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationAn EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
I.J.Computer Network and Information Security, 2014, 2, 54-60 Published Online January 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.02.08 An EVCS for Color Images with Real Size Image
More informationVisual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE
70 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE Abstract
More informationData Security Using Visual Cryptography and Bit Plane Complexity Segmentation
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography
More informationHalftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis
Pavan Kumar Gupta et al,int.j.comp.tech.appl,vol 3 (1), 17-22 Halftone based Secret Sharing Visual Cryptographic Scheme for Color using Bit Analysis Pavan Kumar Gupta Assistant Professor, YIT, Jaipur.
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationA Novel Visual Cryptography Coding System for Jam Resistant Communication
Issues in Informing Science and Information Technology Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication Leemon C. Baird III, Dino Schweitzer, and William L. Bahn
More informationA Steganography Algorithm for Hiding Secret Message inside Image using Random Key
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationKeywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy
More informationA Simple Scheme for Visual Cryptography
135 Mihir Das 1, Jayanta Kumar Paul 2, Priya Ranjan Sinha Mahapatra 3, Dept. of Computer Sc. & Engg., University of Kalyani, Kalyani, India, E-mail:das.mihir20@gmail.com 1, E-mail:jayantakumar18@yahoo.co.in
More informationData Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)
Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD) Abstract: In this paper a data hiding technique using pixel masking and message digest algorithm (DHTMMD) has been presented.
More informationDual Visual Cryptography Using the Interference Color of Birefringent Material
Journal of Software Engineering and Applications, 2017, 10, 754-763 http://www.scirp.org/journal/jsea ISSN Online: 1945-3124 ISSN Print: 1945-3116 Dual Visual Cryptography Using the Interference Color
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationAuthentication of grayscale document images using shamir secret sharing scheme.
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret
More informationA Novel (2,n) Secret Image Sharing Scheme
Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet
More informationA COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE Meharban M.S 1 and Priya S 2 1 M.Tech Student, Dept. of Computer Science, Model Engineering College
More informationA Novel Watermarking Technique Based on Visual Cryptography
A Novel Watermarking Technique Based on Visual Cryptography A.Umaamaheshvari, K.Thanushkodi Abstract Digital Watermark processing technology has developed very rapidly during the recent years and widely
More informationBit-level based secret sharing for image encryption
Pattern Recognition 38 (2005) 767 772 Rapid and briefcommunication Bit-level based secret sharing for image encryption Rastislav Lukac 1 Konstantinos N. Plataniotis www.elsevier.com/locate/patcog Bell
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationReviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication
Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information
More informationChapter 4 MASK Encryption: Results with Image Analysis
95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including
More informationENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY
Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationA Modified Image Template for FELICS Algorithm for Lossless Image Compression
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Modified
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationImage Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator
Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator Geetha C.R. Senior lecturer, ECE Dept Sapthagiri College of Engineering Bangalore, Karnataka. ABSTRACT This paper
More informationC. A. Bouman: Digital Image Processing - January 9, Digital Halftoning
C. A. Bouman: Digital Image Processing - January 9, 2017 1 Digital Halftoning Many image rendering technologies only have binary output. For example, printers can either fire a dot or not. Halftoning is
More informationA Survey Paper on Visual Cryptography for Grey Scale Images
RESEARCH ARTICLE OPEN ACCESS A Survey Paper on y for Grey Scale Images Kirti Rawat [1], Vijay Kumar Joshi [2] Department of Computer Science and Engineering IFTM University Moradabad- India ABSTRACT y
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationFour Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2
RESEARCH ARTICLE Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2 1 M.Tech. Scholar, Raipur Institute of Technology
More informationA NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME
Volume 119 No. 15 2018, 135-140 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME M.Jagadeeswari,
More informationHalf-Tone Watermarking. Multimedia Security
Half-Tone Watermarking Multimedia Security Outline Half-tone technique Watermarking Method Measurement Robustness Conclusion 2 What is Half-tone? Term used in the publishing industry for a black-andwhite
More informationDirect Binary Search Based Algorithms for Image Hiding
1 Xia ZHUGE, 2 Koi NAKANO 1 School of Electron and Information Engineering, Ningbo University of Technology, No.20 Houhe Lane Haishu District, 315016, Ningbo, Zheiang, China zhugexia2@163.com *2 Department
More informationSecure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography
Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography Prajakta Akole 1, Nikita Mane 2, Komal Shinde 3, Prof. Swati A. Khodke 4 123Student of Computer Engineering, JSPM s BSIOTR
More informationError Diffusion without Contouring Effect
Error Diffusion without Contouring Effect Wei-Yu Han and Ja-Chen Lin National Chiao Tung University, Department of Computer and Information Science Hsinchu, Taiwan 3000 Abstract A modified error-diffusion
More informationPassport Authentication Using PNG Image with Data Repair Capability
Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair
More informationA Robust Nonlinear Filtering Approach to Inverse Halftoning
Journal of Visual Communication and Image Representation 12, 84 95 (2001) doi:10.1006/jvci.2000.0464, available online at http://www.idealibrary.com on A Robust Nonlinear Filtering Approach to Inverse
More informationImage Encryption Based on New One-Dimensional Chaotic Map
Image Encryption Based on New One-Dimensional Chaotic Map N.F.Elabady #1, H.M.Abdalkader *2, M. I. Moussa #3,S. F. Sabbeh #4 # Computer Science Department, Faculty of Computer and Informatics, Benha University,
More informationReversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School
More informationREVERSIBLE data hiding, or lossless data hiding, hides
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,
More informationHistogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences
Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India
More informationA Novel Image Steganography Based on Contourlet Transform and Hill Cipher
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More information