Extended visual cryptography techniques for true color images

被引:17
作者
Dhiman, Kirti [1 ]
Kasana, Singara Singh [1 ]
机构
[1] Thapar Univ, Comp Sci & Engn Dept, Patiala 147004, Punjab, India
关键词
Secret sharing; Visual cryptography techniques; Extended visual cryptography techniques; RGB decomposition; RSA; DES; SCHEMES;
D O I
10.1016/j.compeleceng.2017.09.017
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, two extended visual cryptography techniques for sharing color images are proposed. Three meaningful shares are generated in both techniques using a block size of 5 x 5 corresponding to each pixel of original secret image. First proposed technique is (3, 3)-EVCT in which first share contains R component, second contains G component and third contains B component of the secret image. All three shares are required to reconstruct the original secret image on the receiver side. Second technique is (2, 3)-EVCT in which any 2-out-of-3 shares are needed to recover the original secret image on the receiver side. Out of these shares, first share contains the RG components, second contains GB components and third contains RB components of the secret image. All shares in both techniques are meaningful as they contain the cover images along with the information of the original secret image. These shares are made meaningful in order to increase the security and to avoid the suspicion that something is hidden there. The proposed techniques are lossless in nature and are less complex. The dimensions of the original secret image, cover images, regenerated secret image are same. The effectiveness of the proposed techniques have been shown by comparing their results with the results of the existing techniques on the basis of various parameters. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:647 / 658
页数:12
相关论文
共 22 条
[1]  
Abdulla S., 2010, J COMPUT, V2, P2151
[2]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[3]  
Chang C.C., 1999, P 9 NAT C INF SEC TE, pLXIII
[4]   Hiding a secret colour image in two colour images [J].
Chang, CC ;
Tai, WL ;
Lin, CC .
IMAGING SCIENCE JOURNAL, 2005, 53 (04) :229-240
[5]  
Chang Chin-Chen, 2002, P 1 INT S CYB WORLDS
[6]  
Chao K., 2006, P 6 WSEAS INT C SIGN, V2006, P89
[7]  
Gurung S, 2014, INT J COMPUT APPL TA, V86, P19
[8]   Contrast-optimal k out of n secret sharing schemes in visual cryptography [J].
Hofmeister, T ;
Krause, M ;
Simon, HU .
THEORETICAL COMPUTER SCIENCE, 2000, 240 (02) :471-485
[9]   Visual cryptography for color images [J].
Hou, YC .
PATTERN RECOGNITION, 2003, 36 (07) :1619-1629
[10]   Hiding a picture in two pictures [J].
Hwang, RJ ;
Chang, CC .
OPTICAL ENGINEERING, 2001, 40 (03) :342-351