Digital Image Security Using Hybrid Visual Cryptography

被引:0
|
作者
Bhatia, Shradha [1 ]
Khatri, Sunil Kumar [1 ]
Singh, Ajay Vikram [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttar Pradesh, India
来源
2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO) | 2018年
关键词
RC4; pixel shuffling; KSA; PRGA; Security Quality; Visual Cryptography; Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet is become the most used medium for communication of information like text, images, videos etc. The information exchanged on internet is through unsecured network, maintaining security of the information is the most important issue. To secure information from unauthorized users, there is need to convert the information into an unrecognizable format. Visual cryptography is the best known techniques which encrypts an image into n number of shares and decrypt the image with the human visual system without any additional mathematical computations. This paper proposes an improved color image security algorithm. The algorithm encrypt and decrypt the color image using the decomposition of RGB components (sieving), Pixel shuffling, RC4 cipher algorithm, image division and combining using visual cryptography to result in shares of image. The generated encrypted shares are further shared over the network.
引用
收藏
页码:570 / 576
页数:7
相关论文
共 50 条
  • [31] Sharing a Secret Image with Encapsulated Shares in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 462 - 468
  • [32] Information cryptography using cellular automata and digital image processing
    Kumar, Anil
    Sharma, Sandeep Kumar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (04): : 1105 - 1111
  • [33] Visual Cryptography For Image Depend on RSA & AlGamal Algorithms
    Kadhim, Alaa
    Mohamed, Rand Mahmoud
    2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA), 2016,
  • [34] Effective Design of a Parametrical Security Model for Digital Signatures Using Cryptography
    Anandapriya, B.
    Sheshasaayee, Ananthi
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 293 - 295
  • [35] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [36] Image size invariant visual cryptography
    Ito, R
    Kuwakado, H
    Tanaka, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (10) : 2172 - 2177
  • [37] Image security using steganography and cryptography with sweeping computational ghost imaging
    Rajabi-Ghaleh, Sajjad
    Olyaeefar, Babak
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    FRONTIERS IN PHYSICS, 2024, 12
  • [38] Hierarchical Visual Cryptography for Grayscale Image
    Patel, Trupti
    Srivastava, Rohit
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [39] RETRACTED ARTICLE: Hybrid optimization with cryptography encryption for medical image security in Internet of Things
    Mohamed Elhoseny
    K. Shankar
    S. K. Lakshmanaprabu
    Andino Maseleno
    N. Arunkumar
    Neural Computing and Applications, 2020, 32 : 10979 - 10993
  • [40] On the security of a visual cryptography scheme for color images
    Leung, Bert W.
    Ng, Felix Y.
    Wong, Duncan S.
    PATTERN RECOGNITION, 2009, 42 (05) : 929 - 940