RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

被引:25
|
作者
Shankar, K. [1 ]
Eswaran, P. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi 630003, Tamil Nadu, India
关键词
Visual cryptography; pixel; shares; elliptic curve cryptography; encryption; PSNR; mean square error; cuckoo search algorithm; decryption;
D O I
10.1142/S0218126616501383
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many shares are generated from the secret images that are illogical containing certain message within them in visual cryptography. When all shares are piled jointly, they tend to expose the secret of the image. The multiple shares are used to transfer the secret image by using the encryption and decryption process by means of the elliptic curve cryptography (ECC) technique. In ECC method, the public key is randomly generated in the encryption process and decryption process, the private key (H) is generated by utilizing the optimization technique and for evaluating the performance of the optimization by using the peak signal to noise ratio (PSNR). From the test results, the PSNR has been exposed to be 65.73057, also the mean square error (MSE) value is 0.017367 and the correlation coefficient (CC) is 1 for the decrypted image without any distortion of the original image and the optimal PSNR value is attained using the cuckoo search (CS) algorithm when compared with the existing works.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography
    Sangram Ray
    G. P. Biswas
    Mou Dasgupta
    Wireless Personal Communications, 2016, 90 : 1331 - 1354
  • [42] Efficient and secure business model for content centric network using elliptic curve cryptography
    Adhikari, Sharmistha
    Ray, Sangram
    Biswas, Gosta P.
    Obaidat, Mohammad S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [43] Secure Multi-Purpose Mobile-Banking Using Elliptic Curve Cryptography
    Ray, Sangram
    Biswas, G. P.
    Dasgupta, Mou
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) : 1331 - 1354
  • [44] Secure Data Transfer in Android using Elliptical Curve Cryptography
    Ruprah, Taranpreet Singh
    Kore, Vishal S.
    Mali, Yogesh K.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [45] Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
    Aldabbagh, Ghadah
    Alghazzawi, Daniyal M.
    Hasan, Syed Hamid
    Alhaddad, Mohammed
    Malibari, Areej
    Cheng, Li
    APPLIED SCIENCES-BASEL, 2021, 11 (12):
  • [46] Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
    Shukla, Saurabh
    Thakur, Subhasis
    Breslin, John G.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 261 - 266
  • [47] Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication
    Assa-Agyei, Kwame
    Owa, Kayode
    Al-Hadhrami, Tawfik
    Olajide, Funminiyi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 1037 - 1047
  • [48] Implementation of ElGamal Elliptic Curve Cryptography Over Prime Field Using C
    Boruah, Debabrat
    Saikia, Monjul
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [49] A secure medical image encryption technique based on DNA cryptography with elliptic curves
    V. N. Senthil Kumaran
    T. Manikandan
    Rajesh Kumar Dhanaraj
    Taher Al-Shehari
    Nasser A. Alsadhan
    Shitharth Selvarajan
    Scientific Reports, 15 (1)
  • [50] Cryptography in IoT Using Elliptic Curve Cryptography with Adaptive Hunter-Prey Optimization
    Yogaraja, C. A.
    Sankarasubramanian, R. S.
    Geetha, M.
    Keerthanadevi, R.
    IETE JOURNAL OF RESEARCH, 2025,