Visual Cryptography using KN Sharing Algorithm for Colour Images
Keywords:
Visual Cryptography, Shares, Encryption, Decryption,KN sharing AlgorithmAbstract
Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual cryptography is a secure process for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key given by the user. Further, the encrypted image is divided into N different shares. These N shares can be distributed but, the end user needs only K of these shares to regenerate the original image. After piling of K shares, the original image is generated but it is still in encrypted form. The key which is used to encrypt the image originally is now required again to decrypt the image, thus providing an additional level of security. This technique is proposed for binary image, Grey scale image & colour images. Here the symmetric key used for encryption and decryption is any string (like password). Such a technique thus would be lucrative for defence and security.
References
- Prof. Wu C., Chen L., A study on visual cryptography," Master?s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
- Sirisha B. L., Lakshmi G. S., A novel cryptographic technique under visual secret sharing scheme for binary image, International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
- Yu B., Xu X., Fang L., Multi-secret Sharing Threshold Visual Cryptography Scheme, International Conference on Computational Intelligence and Security, 2007
- Parakh A., Kak S., A Recursive Threshold Visual Cryptography Scheme, Dept. of Computer Science, Oklahoma State University.
- Jena D., Jena S. K., A Novel Visual Cryptographic Scheme," IEEE,2008, pp. 207-211.
- Kessler G. C., An Overview of Cryptography"-http://www.garykessler.net/library/crypto.html. 28 April 2013.
- Pal J. K., Mamdal J. K., Gupta K. D., A (2, N) Visual Cryptographic Technique For Banking Applications, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.
- Weir J., Yan W. Q., Sharing Multiple Secrets Using Visual Cryptography, IEEE, 2009
- Naor M., Shamir A., Visual cryptography, Advances in Cryptology EUROCRYPT ?94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
- Mandal, J.K.; Ghatak, S. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC), Electronic System Design (ISED), 2011 International Symposium on, On page(s): 329 - 334
- Mandal, J.K.; Ghatak, S. Secret image / message transmission through meaningful shares using (2, 2) visual cryptography (SITMSVC), Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 - 268
- Katta S., Recursive Information Hiding in Visual Cryptography, 2010
- Yue T. W., Chiang S., A Neural Network Approach for Visual Cryptography. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN?00) .pp. 1-2.
- Chakraborty U., Paul J. K., Mahapatra P. R. S., "Desigan and Implementaion of a (2,2) and a (2,3) Visual cryptographic scheme". IJCCT Vol.1 Issue 2,3,4; 2010 .
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.