Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS)

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 101 - Number 12
Year of Publication: 2014
Authors:
Harinandan Tunga
10.5120/17738-3733

Harinandan Tunga. Article: A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS). International Journal of Computer Applications 101(12):13-15, September 2014. Full text available. BibTeX

@article{key:article,
	author = {Harinandan Tunga},
	title = {Article: A New Secret Coloured Image Encryption and Decryption Scheme based on (2, 2) Visual Cryptography Scheme (VCS)},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {101},
	number = {12},
	pages = {13-15},
	month = {September},
	note = {Full text available}
}

Abstract

Cryptography is an art and science of achieving security by en-coding the message to make them non-readable. Extended Visual Cryptography is a type of cryptography which encodes a number of images in the way that when the images on transparencies are stacked together, the hidden message appears without a trace of original images. The decryption is done directly by the human visual system(HVS) with no special cryptographic calculations. We present a system which takes three pictures as an input and generates two images which correspond to two of the three input pictures. The third picture is reconstructed by printing the two output images onto transparencies and stacking them together. Generally, visual cryptography suffers from the deterioration of the image quality. This paper also describes the method to improve the quality of the output images.

References

  • M. Naor and A. Shamir, Visual cryptography. Advances in Cryptology EUROCRYPT '94. Lecture Notes in Computer Science, (950):1–12, 1995)
  • E. Verheul, H. V. Tilborg. ,"Constructions and properties of k out of n visual secret sharing schemes", Designs, Codes and Cryptography, 11(2), pp. 179–196, 1997.
  • Chang, C. C. and Yu. T. X. , Sharing a Secret Gray Image in Multiple Images, in the Proceedings of International Sympo-sium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp. 230-237
  • C. Chang, C. Tsai, and T. Chen, A new scheme for sharing secret color images in computer network. In the Proceedings of International Conference on Parallel and Distributed Sys-tems, pages 21–27, July 2000)
  • C. Yang and C. Laih. , New colored visual secret sharing schemes. Designs, Codes and Cryptography, 20:325–335,2000.
  • A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping by Musheer Ahmad and M. Shamsher Alam.
  • "Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Vis-ual Secret Sharing Scheme", by Harinandan Tunga, and Soumen Mukherjee, IJCSI Vol. 9 Issue 3, No 1, May 2012, ISSN (Online): 1694-0814. www. ijcsi. org.
  • Atul, Kahate, Cryptography and Network Security, (Second Edition 2008).