Enhanced Visual Cryptography Scheme for Secret Image Retrieval using Average Filter

被引:0
作者
Pujari, Vandana G. [1 ]
Khot, Shivchandra R. [2 ]
Mane, Kishor T. [3 ]
机构
[1] DY Patil Coll Engn & Tech, Kolhapur, Maharashtra, India
[2] DY Patil Coll Engn & Tech, Dept Informat Tech, Kolhapur, Maharashtra, India
[3] DY Patil Coll Engn & Tech, Comp Sci & Engn Dept, Kolhapur, Maharashtra, India
来源
2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN) | 2014年
关键词
Visual cryptography; Security; Encoding; Decoding; Color halftoning; Jarvis error diffusion; Average filter;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Visual cryptography is one of the emerging technology which has been used for sending secret images in highly secure manner without performing the complex operations while encoding. This technology can be used in the many fields like transferring military data, financial scan documents, sensitive image data and so on. In the literature different methods are used for black and white image which produce good result but for color images the quality of the decoded secret image is not good. In this paper, the system has been proposed which increase the quality of color decoded image. In this system sender takes one secret image which is encoded into n share images using Jarvis halftoning and encoding table. For decoding, the share images are used with decoding table to get original secret image. The average filter has been applied to decrease the noise introduced between encoding operation so that decoded secret image quality has been increased. The result analysis has been made by considering various image quality analysis parameters such as MSE, PSNR, SC, NAE and so on. The results are better than previous systems which are mentioned in the literature.
引用
收藏
页码:88 / 91
页数:4
相关论文
共 11 条
  • [1] Chang CC, 2002, FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, P230, DOI 10.1109/CW.2002.1180884
  • [2] Kang I, 2009, INT CONF ACOUST SPEE, P1473, DOI 10.1109/ICASSP.2009.4959873
  • [3] Blue- and green-noise halftoning models - A review of the spatial and spectral characteristics of halftone textures.
    Lau, DL
    Ulichney, R
    Arce, GR
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2003, 20 (04) : 28 - 38
  • [4] Embedded Extended Visual Cryptography Schemes
    Liu, Feng
    Wu, Chuankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 307 - 322
  • [5] Liu YF, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC 2012), P746
  • [6] Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
  • [7] Sahai Gazal, 2005, P 11 NAT C COMM NCC
  • [8] Shikha sharda Sumit, 2013, INT J COMPUTER APPL, V69
  • [9] Color Visual Cryptography Scheme Using Meaningful Shares
    Wu, Hsien-Chu
    Wang, Hao-Cheng
    Yu, Rui-Wen
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 173 - +
  • [10] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    [J]. 2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +