Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

Similar documents
Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Evaluation of Visual Cryptography Halftoning Algorithms

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

International Journal of Advance Research in Computer Science and Management Studies

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

A Novel Technique in Visual Cryptography

Fig 1: Error Diffusion halftoning method

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Webpage: Volume 4, Issue VI, June 2016 ISSN

Digital Image Sharing using Encryption Processes

Various Visual Secret Sharing Schemes- A Review

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

An Overview of Visual Cryptography Schemes for Encryption of Images

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Secret Sharing Image Between End Users by using Cryptography Technique

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Analysis of Secure Text Embedding using Steganography

A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Monochrome Image Reproduction

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Error Diffusion and Delta-Sigma Modulation for Digital Image Halftoning

Visual Secrete Sharing by Diverse Image Media

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

A Simple Scheme for Visual Cryptography

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Secured Bank Authentication using Image Processing and Visual Cryptography

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Fixed Unmitigated Image Cryptography Schemes

Digital Halftoning. Sasan Gooran. PhD Course May 2013

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

C. A. Bouman: Digital Image Processing - January 9, Digital Halftoning

Tutorial Version 5.1.xx March 2016 John Champlain and Jeff Woodcock

A Robust Nonlinear Filtering Approach to Inverse Halftoning

Survey on Size Invariant Visual Cryptography

Visual Cryptography for Face Privacy

Chapter 4 MASK Encryption: Results with Image Analysis

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

Image Processing. Michael Kazhdan ( /657) HB Ch FvDFH Ch. 13.1

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

A Novel (2,n) Secret Image Sharing Scheme

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

PART II. DIGITAL HALFTONING FUNDAMENTALS

Progressive Color Visual Cryptography

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Improved color image segmentation based on RGB and HSI

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Fuzzy Logic Based Adaptive Image Denoising

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Image Denoising Using Statistical and Non Statistical Method

Image Processing. Adam Finkelstein Princeton University COS 426, Spring 2019

Low Noise Color Error Diffusion using the 8-Color Planes

Bit-level based secret sharing for image encryption

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES AN EFFICIENT METHOD FOR SECURED TRANSFER OF MEDICAL IMAGES M. Sharmila Kumari *1 & Sudarshana 2

Image Forgery. Forgery Detection Using Wavelets

Meta-data based secret image sharing application for different sized biomedical

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Image Rendering for Digital Fax

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic

A Survey Paper on Visual Cryptography for Grey Scale Images

Error Diffusion without Contouring Effect

S. BOSU BABU, S.S.P KUMAR, Avanthi College of Engg & Tech, Tamaram, Visakhapatnam, Andhra Pradesh, India.

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise

Prof. Feng Liu. Fall /04/2018

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Local prediction based reversible watermarking framework for digital videos

A Secure Image Encryption Algorithm Based on Hill Cipher System

Image Encryption Based on New One-Dimensional Chaotic Map

Fast Inverse Halftoning

Copyright protection scheme for digital images using visual cryptography and sampling methods

What is an image? Images and Displays. Representative display technologies. An image is:

Image Encryption using Pseudo Random Number Generators

Image Compression Supported By Encryption Using Unitary Transform

1826. Dynamic visual cryptography scheme on the surface of a vibrating structure

Visual Secret Sharing Based Digital Image Watermarking

A New Compression Method for Encrypted Images

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Secret Image Sharing by Diverse Image Media

Double Phase Image Encryption and Decryption Using Logistic Tent Map and Chaotic Logistic Map

Transcription:

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan 1 Digvijay Singh, 2 Pratibha Sharma 1 Student M.Tech, CSE 4 th SEM., 2 Assistant Professor CSE Career Point University, Hamirpur (H.P.), India Abstract: This paper represents the encoding of secrets image into halftone image with in the scheme of Visual Cryptography. Halftone generation is the first step in the Visual Cryptography. Visual cryptography is a cryptographic technique which allows optical information to be encrypted. A particular halftoning method named as error diffusion method is used for the better generation of halftoned image.here we can use 3 error diffusion algorithms with raster scan and serpentine scan in order to generate halftone of secret image. Simulation results shows which algorithm is best for halftone generation as compare to others with raster scan and serpentine scan. Keywords: Error Diffusion, Half toning, Raster scan, Serpentine scan, PSNR,,,. I. INTRODUCTION Visual cryptography (VC), proposed by Naor and Shamir [1], is a method for protecting image based secrets that has a computation-free decryption process. In the (2, 2) VC scheme each secret image is divided into two shares such that no information can be reconstructed from any single share. Each share is printed in transparencies. The decryption process is performed by stacking the two shares and the secret image can be visualized by naked eye without any complex cryptographic computations. Visual cryptography is a new type of cryptographic technique in which no cryptographic computation is needed at the decryption end. In this technique text or picture should be fed as a digital image in the system as the input and the system generates n (2_n) numbers of different images (called shares), look like images of random noise.[1]halftone generation is the first step of visual cryptography. It is used to make visual cryptography process fast because it reduces the size of image with effective way. in VC we deals with larger size image. So its make processing slow.with the help of halftoning it is easy to deal with such type of larger image in visual cryptography. In order to generate halftone of image we use various error diffusion algorithms. We deal with error diffusion algorithms with raster scan and serpentine scan. In the below basic VC scheme, each pixel of the secret image is encrypted into a pair of sub pixels in each of the two shares. If pixel is white, one of the two columns under the white pixel in Fig. 1 is selected. If pixel is black, one of the two columns under the black pixel is selected. In each case, the selection is performed randomly such that each column has 50% probability to be chosen. Then, the first two pairs of sub pixels in the selected column are assigned to share 1 and share 2, respectively. Since, in each share, pixel is Encrypted into a black white or white black pair of sub pixels, an individual share gives no clue about the secret image. By stacking the two shares as shown in the last row of Fig.1, if pixel is white it always outputs one black and one white sub pixel, irrespective of which column of the sub pixel pairs is chosen during encryption. If pixel is black, it outputs two black sub pixels [2]. II. HALFTONING Fig. 1- Construction of (2, 2) VC Scheme IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1967

Halftone visual cryptography (HVC) is a visual sharing scheme where a secret image is encoded into halftone shares taking meaningful visual information s that can use here error diffusion half toning concept. 0 (BLACK) 96(GRAY) 256(WHITE) Error-Diffusion half toning Error diffusion is a simple but efficient way to halftone a grayscale image. The quantization error at each pixel is filtered and fed into a set of future inputs. The quantization error depends upon not only the current input and output but also the entire past history. The error filter is designed in such a way that the low frequency difference between the input and output image is minimized. The error that is diffused away by the error filter is high frequency or blue noise. These features of error diffusion produce halftone images that are pleasant to human eyes with high visual quality. [4] Error diffusion works by diffusing or spreading the error of each calculation to neighboring pixels. If it finds a pixel of 96 gray, it too determines that 96 are closer to 0 than to 255 and so it makes the pixel black., because 96 is closer to 0. When it moves to the next pixel, the error diffusion algorithm adds the error of the previous pixel to the current pixel. If the next pixel is also 96 gray, instead of simply forcing that to black as well, the algorithm adds the error of 96 from the previous pixel. This results in a value of 192, which is actually closer to 255 and thus closer to white! So it makes this particular pixel white, and it again makes note of the error in this case, the error is -63, because 192 is 63 less than 255, which is the value this pixel was forced to. In case of color images it deals with more colors but in case of gray scale images it deals only black, gray and white colors [3] Raster scan and Serpentine scan: In this paper I implement the halftone share of select image with Raster scan type and Serpentine scan. In raster scan beam will move across the screen, one row at time. The direction of movement is top to bottom. When beam move from top to bottom beam will be on or off so pattern of spots is created. In Serpentine scan, the horizontal direction of scan alternates between lines. This process is called as serpentine scanning or Boustrophedon transforms dithering. III. HALFTONED BASED ERROR DIFFUSION ALGORITHMS WITH RASTER SCAN AND SERPENTINE SCAN There are 3 error diffusion algorithms to perform halftoning on color images. A. Floyd Halftoning algorithm. B. Jarvis halftoning algorithm. C. Stuckie halftoning algorithm. A. Floyd Halftoning algorithm This error-diffusion algorithm is proposed by Floyd and. Here the idea to keep track of the error. The algorithm compares the grayscale value of the current pixel that is represented by an integer value between 0 and 255, to some threshold value (typically 128). If the grayscale value is greater than the threshold, the output pixel is considered to be black (value 0), else it is considered white (value 1). The difference between the pixel s original grayscale value and the threshold is considered as an error. And the track of this error is kept by this algorithm. This error is different from pixel to pixel. In below figure star symbol is indicating the pixel and its error which is distributed to other pixels. error 3/8 1/8 1/8 B. Jarvis half toning algorithm: Another error diffusion algorithm has been proposed by Jarvis, Judice and Ninke. It diffuses the error in the 12 neighboring cells instead of 4 cells as in the Floyd- algorithm as shown in figure below. As a result, this algorithm is even slower. error IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1968

C. Stuckie Error Diffusion Half toning Algorithm: Stucki diffused the error in the 12 neighboring cells as shown in Figure below. The only difference between Jarvis algorithm and Stucki algorithm is the fraction which is added to the neighboring pixels. error IV.RESULT AND ANALYSIS The experimental results of the entire error-diffusion half-toning algorithms used in color visual cryptography. We will compare these algorithms on the basis of following parameters and the algorithm which leads to better quality of image will be considered as the best error diffusion algorithm. All 3 algorithms are compared with Raster scan and Serpentine Scan. At the end we got the result that which algorithm is best with Raster scan and Serpentine scan. And which scan type is good with these 3 algorithms. PSNR (peak signal to noise ratio): Higher is better (weighted signal to noise ratio): Higher is better (Linear Distortion measure): lower is better (Universal quality index): higher is better The table showing the different parameter values in case of 2 input images named as School.jpg Tulips.jpg. one image named as Tulips.jpg is taken from computer system and second is self clicked named as School.jpg. both images are used as input data set. The error diffusion algorithms are generated halftone of selected images with raster scan and serpentine scan. IN CASE OF tulips.jpg with Raster Scan: IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1969

IN CASE OF School.jpg with Raster Scan IN CASE OF tulips.jpg with Serpentine Scan: IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1970

IN CASE OF School.jpg with Serpentine Scan IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1971

Parameters value with Raster Scan :- For image named as Tulips.jpg with raster scan type,the parameters are given below: Tulips Raster Floyd- 4.62744 9.93803 0.20134 0.270399 Tulips Raster Jarvis 4.5602 9.30273 0.221207 0.250528 Tulips Raster Stuckie 4.588 9.50367 0.213806 0.253641 Parameters value with Serpentine Scan :- For image named as Tulips.jpg with Serpentine scan type,the parameters are given below: Tulips Serpentine Floyd- 4.62245 9.928344 0.201996 0.292496 Tulips Serpentine Jarvis 4.55706 9.32296 0.222275 0.253883 Tulips Serpentine Stuckie 4.5832 9.50926 0.214279 0.255657 Parameters value with Raster Scan:- For image named as School.jpg with Raster scan type,the parameters are given below: School Raster Floyd- 5.20004 10.6025 0.232498 0.119385 School Raster Jarvis 5.01133 9.2424 0.28537 0.111756 School Raster Stuckie 5.08471 9.6814 0.266525 0.112498 Parameter values with Serpentine Scan :- For image named as School.jpg with Serpentine scan type, the parameters are given below: School Serpentine Floyd- 5.19512 10.5392 0.234863 0.119256 School Serpentine Jarvis 5.00782 9.22385 0.28653 0.108482 School Serpentine Stuckie 5.07969 9.64936 0.267929 0.10874 V.CONCLUSION IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1972

Different algorithms for error diffusion are compared. The comparison is done on the basis of,, and the PSNR values. From the implementation of all the algorithms, it is observed that : 1. Image quality is high when Floyd algorithm is implemented. 2. Floyd Algorithm is best either we use Raster scan or Serpentine scan. 3. Floyd Algorithm is best with raster scan as Compare to Serpentine scan. Thus, Floyd- can be concluded as the best Error Diffusion algorithm out of 2 other algorithms with Raster Scan as Compare to Serpentine Scan. REFERENCES [1] Jayanta Kumar Pal1, J. K. Mandal et.al, A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FORBANKING APPLICATIONS, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010 [2] Morampudi Naresh kumar et.al, A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011 [3] Meenakshi Rana, Comparison and Review of Various Error Diffusion Algorithms used in Visual Cryptography International Journal of Engineering and Computer Science Volume 2, Volume 6 Issue No. 6, 2016. [4] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half toning algorithms used in Color Visual Cryptography International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 8, February 2013. IJEDR1702306 International Journal of Engineering Development and Research (www.ijedr.org) 1973