Multiple Secret Image Communication Using Visual Cryptography

被引:10
作者
Blesswin, A. John [1 ]
Mary, G. Selva [2 ]
Kumar, S. Manoj [3 ]
机构
[1] K Ramakrishnan Coll Technol, Dept Comp Sci & Engn, Trichy, Tamil Nadu, India
[2] M Kumarasamy Coll Engn, Dept Informat Technol, Karur, Tamil Nadu, India
[3] KPR Inst Engn & Technol, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Color shares; Multiple grayscale secret; Visual Cryptography; SHARING SCHEME; QUALITY; XOR;
D O I
10.1007/s11277-021-09041-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Usage of Internet has increased enormously in this decade due to the pandemic began due to COVID19. Data in the form of Text, Image and Video are communicated across the world through mails, chat applications and meeting applications etc. Such third-party applications are vulnerable while sensitive information such as personal, financial, medical and military communications occurs. Visual Cryptography (VC) is an encryption scheme that protects data in the form of image. In source, VC encrypts the image by dividing into shares and distributes to the receiver side. At the destination, the shares are stacked together physically or digitally to reveal the original data. VC also uses cover images to enhance security. VC supports secret sharing of multiple images. In this research paper, a new Multiple grayscale Secret Image Sharing (MSIS) strategy is proposed for secure transmission of more than one grayscale secret image data to the destination. MSIS uses color cover images to enhance the security. It also minimizes the number of shares and cover images to reduce the complexity.
引用
收藏
页码:3085 / 3103
页数:19
相关论文
共 25 条
[1]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[2]   Enhanced semantic visual secret sharing scheme for the secure image communication [J].
Blesswin, John A. ;
Raj, Christhu ;
Sukumaran, Rajeev ;
Mary, Selva G. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :17057-17079
[3]   Visual cryptography for grey level images [J].
Blundo, C ;
De Santis, A ;
Naor, M .
INFORMATION PROCESSING LETTERS, 2000, 75 (06) :255-259
[4]   Efficient and secure multi secret sharing schemes based on boolean XOR and arithmetic modulo [J].
Deshmukh, Maroti ;
Nain, Neeta ;
Ahmed, Mushtaq .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) :89-107
[5]   Visual Cryptography Scheme With Meaningful Shares Based on QR Codes [J].
Fu, Zhengxin ;
Cheng, Yuqiao ;
Yu, Bin .
IEEE ACCESS, 2018, 6 :59567-59574
[6]   Collaborative Visual Cryptography Schemes [J].
Jia, Xingxing ;
Wang, Daoshun ;
Nie, Daxin ;
Zhang, Chaoyang .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (05) :1056-1070
[7]   Visual cryptography for gray-level images by dithering techniques [J].
Lin, CC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (1-3) :349-358
[8]   Multi-factor cheating prevention in visual secret sharing by hybrid codebooks [J].
Lin, Chih-Hung ;
Chen, Tzung-Her ;
Wu, Yan-Ting ;
Tsao, Kai-Hsiang ;
Lin, Kai-Siang .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (07) :1543-1557
[9]   A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication [J].
Mary, G. Selva ;
Kumar, S. Manoj .
MEASUREMENT SCIENCE AND TECHNOLOGY, 2019, 30 (12)
[10]   Randomised visual secret sharing scheme for grey-scale and colour images [J].
Mhala, Nikhil C. ;
Jamal, Rashid ;
Pais, Alwyn R. .
IET IMAGE PROCESSING, 2018, 12 (03) :422-431