RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

被引:25
|
作者
Shankar, K. [1 ]
Eswaran, P. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi 630003, Tamil Nadu, India
关键词
Visual cryptography; pixel; shares; elliptic curve cryptography; encryption; PSNR; mean square error; cuckoo search algorithm; decryption;
D O I
10.1142/S0218126616501383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many shares are generated from the secret images that are illogical containing certain message within them in visual cryptography. When all shares are piled jointly, they tend to expose the secret of the image. The multiple shares are used to transfer the secret image by using the encryption and decryption process by means of the elliptic curve cryptography (ECC) technique. In ECC method, the public key is randomly generated in the encryption process and decryption process, the private key (H) is generated by utilizing the optimization technique and for evaluating the performance of the optimization by using the peak signal to noise ratio (PSNR). From the test results, the PSNR has been exposed to be 65.73057, also the mean square error (MSE) value is 0.017367 and the correlation coefficient (CC) is 1 for the decrypted image without any distortion of the original image and the optimal PSNR value is attained using the cuckoo search (CS) algorithm when compared with the existing works.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    Shankar, K.
    Eswaran, P.
    CHINA COMMUNICATIONS, 2017, 14 (02) : 118 - 130
  • [2] RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography
    K.Shankar
    P.Eswaran
    中国通信, 2017, 14 (02) : 118 - 130
  • [3] Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography
    Karolin, M.
    Meyyappan, T.
    IETE JOURNAL OF RESEARCH, 2024, 70 (02) : 1638 - 1645
  • [4] Authentic secret share creation techniques using visual cryptography with public key encryption
    M. Karolin
    T. Meyyappan
    Multimedia Tools and Applications, 2021, 80 : 32023 - 32040
  • [5] Authentic secret share creation techniques using visual cryptography with public key encryption
    Karolin, M.
    Meyyappan, T.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (21-23) : 32023 - 32040
  • [6] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [7] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) : 521 - 530
  • [8] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [9] A novel hybrid image hiding technique using elliptic curve cryptography and DNA computing technique
    Bharadwaja, A. Vyasa
    Ganesan, V.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (04) : 460 - 473
  • [10] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163