An Intelligent 2D Secret Share Construction using Visual Cryptography for Secure Transmission

被引:1
作者
Kumar, N. Rajesh [3 ]
Krishnan, R. Bala [3 ]
Manikandan, G. [1 ]
Raajan, N. R. [2 ]
机构
[1] SASTRA Deemed Univ, Sch Comp, Thanjavur, India
[2] SASTRA Deemed Univ, Sch Elect & Elect Engn, Thanjavur, India
[3] SASTRA Deemed Univ, SRC, Kumbakonam, India
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 07期
关键词
Diwy; secret sharing; image transmission; bound level; visual cryptography; PROTECTION SCHEME;
D O I
10.3837/tiis.2020.07.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data Security is the most challenging area in Internet communication, where most of the secret sharing schemes are proposed for binary images. But still it lacks in providing security for data communication, especially in image transmission. Traditional visual cryptography scheme generate meaningless diwies and the reconstruction phase leads to quality degradation over the secret image. In this work, an intelligent two dimensional secret share construction scheme is proposed. A secret image is expanded into n diwies with the choice of scheme selection. By Stacking all the qualified diwies to revert the secret image without content loss and less than s* -1 shares could not reveal any information about the secret image. The experimental results emphasize that the proposed secret share scheme is highly secured for image transmission.
引用
收藏
页码:2862 / 2878
页数:17
相关论文
共 23 条
[1]  
Anbarasi J., 2015, INT ARAB J INF TECHN, V12, P708
[2]   A Novel Reversible Data Hiding Algorithm Based on Probabilistic XOR Secret Sharing in Wavelet Transform Domain [J].
Avci, Engin ;
Tuncer, Turker ;
Avci, Derya .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (08) :3153-3161
[3]   Affine Boolean classification in secret image sharing for progressive quality access control [J].
Bhattacharjee, Tapasi ;
Rout, Ranjeet Kumar ;
Maity, Santi P. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :16-29
[4]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[5]   XOR-based progressive visual secret sharing using generalized random grids [J].
Chao, Her-Chang ;
Fan, Tzuo-Yau .
DISPLAYS, 2017, 49 :6-15
[6]   A Secure Visual Secret Checking of Meaningful Sharing Images [J].
Chen, Chin-Ling ;
Chen, Wen-Hu ;
Chen, Chih-Cheng ;
Lai, Yeong-Lin ;
Tseng, Kuo-Kun .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05) :2327-2335
[7]   A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography [J].
Chen, Yu-Chi ;
Tsai, Du-Shiau ;
Horng, Gwoboa .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (08) :1225-1233
[8]   Visual secret sharing for multiple secrets [J].
Feng, Jen-Bang ;
Wu, Hsien-Chu ;
Tsai, Chwei-Shyong ;
Chang, Ya-Fen ;
Chu, Yen-Ping .
PATTERN RECOGNITION, 2008, 41 (12) :3572-3581
[9]  
Han Yanyan, 2009, Journal of Electronics (China), V26, P631, DOI 10.1007/s11767-008-0064-1
[10]   Improved Contrast for Threshold Random-grid-based Visual Cryptography [J].
Hu, Hao ;
Shen, Gang ;
Fu, Zhengxin ;
Yu, Bin .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07) :3401-3420