Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 6
Year of Publication: 2014
Authors:
Prasanna Kumar H. R
Niranjan N. Chiplunkar
Archana R Priyadarshini

Prasanna Kumar H R, Niranjan N Chiplunkar and Archana R Priyadarshini. Article: Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(6):16-21, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Prasanna Kumar H. R and Niranjan N. Chiplunkar and Archana R Priyadarshini},
	title = {Article: Combined Operation of Secret Image Fusion, DCT based Compression and Visual Cryptography based Encryption},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {6},
	pages = {16-21},
	month = {October},
	note = {Full text available}
}

Abstract

In recent years, there has been a rapid growth on information technology for people to communicate on the Internet. Since Internet is public, anyone can easily read the information and perform successful transmissions without protection. In the present era of computers and fast communication, one needs to protect the communicated information from unauthorized users. For this purpose, Visual Cryptography is introduced to provide confidentiality and security when visual data are transmitted through unsecured communication channels. In this paper, we depict the security of image encryption by the concept of Visual Cryptography Scheme(VCS) . The concept of image fusion helps us to extract features from feature set of different sources and also in applications like remote sensing. Techniques such as DCT based image compression and decompression are used mainly to have high data rates. Further this paper also aims to reduce storage requirements and also our scheme is much more effective for multimedia image compression(energy compaction) and decorrelation by the application of DCT.

References

  • Prakash Chandra Jena1, Nikunja Kanta Das2, A Survey on Visual Cryptography using Image Encryption and Decryption, International Journal of Emerging Technology and Advanced Engineering ,ISSN 2250-2459l, Volume 3, Issue 8, August 2013.
  • Pravin B. Pokle, N. G. Bawane, Lossy Image Compression using Discrete Cosine Transform, National Conference on Innovative Paradigms in Engineering & Technology (NCIPET-2012) , Proceedings published by International Journal of Computer Application IJCA.
  • Jagdeep Verma, Dr. Vineeta Khemchandani ,A Visual Cryptographic Technique to Secure Image Shares, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 1, pp. 1121-1125, Jan-Feb 2012 .
  • S. Manimurugan, Dr. K. Porkumaran, New Fast and Efficient Visual Cryptography Scheme for Medical Images with Forgery Detection, Proceedings of ICETECT 2011.
  • Er. Supriya Kinger, Efficient Visual Cryptography, Journal of Emerging Technologies in Web Intelligence, VOL. 2, NO. 2, pp. 137-141,MAY 2010
  • P. S. Revenkar, Anisa Anjum, W . Z. Gandhare, Survey of Visual Cryptography Schemes, International Journal of Security and Its Applications, Vol. 4, No. 2, pp. 49-56,April- 2010
  • Z. Zhou, G. R. Arce, and G. Di Crescenzo, "Halftone Visual Cryptography," IEEE Trans on Image Processing to appear in 2006
  • R. C. Gonzalez and R. E. Woods, "Digital Image Processing", 2nd Ed. , Prentice Hall, 2004.
  • G. Ateniese, C. Blundo, A. DeSantis, D. R. Stinson, Visual Cryptography for general Access structures, Proc. ICALP96, Springer,Berlin,1996,pp. 416-428.
  • M. Naor and A. Shamir, "Visual cryptography," Adv. Cryptol. : EUROCRYPT, Lecture Notes Comput. Sci. , vol. 950, pp. 1-12, 1995.
  • Naor, M. , and Shamir, A. (1995), Visual cryptography, in ''Advances in Cryptogoly Eurocrypt '94'' (A. DeSantis, Ed. ), Lecture Notes in Computer Science, Vol. 950, pp. 112, Springer-Verlag, Berlin
  • Andrew B. Watson, Image Compression Using the Discrete Cosine Transform ,Mathematica Journal, 4(1), 1994, p. 81-88
  • www. ee. ic. ac. uk/hp/staff/dmb/courses/DSPDF/00300_Transforms. pdf
  • www. fe. infn. it/u/filimanto/scienza/webkrypto/visualdecryption. pdf?
  • R. L. Rivest and A. Shamir, "How to expose an eavesdropper", Communications of the Association for Computing Machinery, vol. 27, no. 4, pp. 393-395, 1984.