Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing

被引:0
作者
Gundapuneni, Manas Abhilash [1 ]
Bano, Anzum [1 ]
Singh, Navjot [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Prayagraj, India
来源
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2020年
关键词
Visual Cryptography; Secret Sharing; Cellular Automata;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper provides an approach to a new encryption architecture using double layer encryption standards for the existing secret sharing methodology. The image encryption standard in this scheme deals with both gray scale and color images and provides the experimental results. The paper deals with the transmission of multimedia such as images over insecure and secure networks, secret sharing helps to mask the image from the attacker by breaking it down to shares which are not at all related in the sense of content to the original image and provide the security of only reconstructing the original image when the client has all the shares.
引用
收藏
页码:749 / 755
页数:7
相关论文
共 10 条
  • [1] [Anonymous], 2016, IJCSET, V6, P138
  • [2] Visual cryptography for color images
    Hou, YC
    [J]. PATTERN RECOGNITION, 2003, 36 (07) : 1619 - 1629
  • [3] Mantri Jibendu Kumar, 2019, 2019 International Conference on Information Technology (ICIT), P382, DOI 10.1109/ICIT48102.2019.00074
  • [4] Nandi S, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P521, DOI 10.1109/ICCICCT.2014.6993017
  • [5] Naor M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P1, DOI 10.1007/BFb0053419
  • [6] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [7] XOR based continuous-tone multi secret sharing for store-and-forward telemedicine
    Shivani, Shivendra
    Rajitha, B.
    Agarwal, Suneeta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 3851 - 3870
  • [8] Thien CC, 2002, COMPUT GRAPH-UK, V26, P766
  • [9] Constructions and Properties of k out of n Visual Secret Sharing Schemes
    Verheul E.R.
    Van Tilborg H.C.A.
    [J]. Designs, Codes and Cryptography, 1997, 11 (2) : 179 - 196
  • [10] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    [J]. 2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +