A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES Web Site: www.ijaiem.org Email:

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
A SURVEY ON VISUAL CRYPTOGRAPHY
TECHNIQUES
M.SIVA KUMAR1, A.SHILPA2, J.R.VIJAYALAKSHMI3
1,2,3
Department of Computer Science and Engineering,
Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India.
ABSTRACT
Visual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual
Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned
participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which
performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security,
quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but
later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used
different techniques for visual cryptography from 2011 to 2015.
Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares.
1.INTRODUCTION
Visual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic technique
which allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way that
the decryption can be performed by thehuman visual system, without the aid of computers.
This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into
consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansion
results in smaller size of the share. Encoding multiple secret images in to the same share images requires less overhead
while sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over the
communication channels.
This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visual
cryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme.
1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME:
Naor and Shamir’s proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel is
white one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the
below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into two
whiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secret
image is shown only when both of the images became shares are upper imposed.
Figure 1 Black and White image VCS
Volume 5, Issue 2, February 2016
Page 100
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
Table 1: Construction of Black and White image VC
To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hiding
schemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages,
embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fang
recommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and OR
operation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .The
disadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share large
amounts of confidential messages several shares have to be generated.
1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME:
The (2, 2)–VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption
process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In the
decryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold
visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size of
decrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality of
halftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filing
curve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray level
image is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the case
of (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed
by mound binary shares.
254: [1 1 1 1 1 1 1 0]
Table 2-Construction of gray scale image VC
Share1 (1st half): 0 1 0 1 0 1 0 0
Share2 (1st half): 1 0 1 0 1 0 1 0
-------------------1 1 1 1 1 1 1 0 = 254
Share3 (1st half) : 0 0 1 0 0 1 0 0
Share1 (2nd half): 1 1 0 1 1 0 1 0
------------------1 1 1 1 1 1 1 0 = 254
Share2 (2nd half): 1 1 1 0 1 1 1 0
Share3 (2nd half): 1 0 0 1 0 1 0 0
------------------1 1 1 1 1 1 1 0 = 254
Volume 5, Issue 2, February 2016
Page 101
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
Secret image
share1
share2
Figure 2 Gray scale image VCS
Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives
perfect high quality image when reconstructed without any loss of contrast.
1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME:
Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual
cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with the
concept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel is
transformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly one
color region colored, and all the other color regions are black. The color of one pixel depends on the interrelations
between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c× 3.
Yang and Laihimproved the pixel expansion to c × 2 of Verheul and Van Tilborg . But in both of these schemes share
generated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmit
secret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image two
significant color images areselected as cover images which are the same size as the secret color image. Then according
to a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantage
of this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in the
secret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a
secret color image sharing scheme based on modified visual cryptography.
Table 3: Construction of color image VC
Figure 3 Color image VCS
Volume 5, Issue 2, February 2016
Page 102
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
2. ANALYSIS OF VARIOUS VISUAL CRYPTOGRAPHY SCHEME:
Table 4: Table for Visual Cryptography problems and solving techniques
AUTHOR NAME
TITLE AND YEAR
METHOD TO SOLVE
PROBLEM
Xuehu Yan et al
Halftone Visual Cryptography
With Minimum Auxiliary
Black Pixel & Uniform Image
Quality
2015
A New Visual Cryptography
Technique For Color Images
2015
A Secure Authentication Using
Visual Cryptography
& Steganography
2015
Feed Forward Networks In
Color Extended Visual
Cryptography To
Generate Meaningful Shares
2015
Secure Authentication By
Image Processing And Visual
Cryptography For Banking
Applications.
2015
Security Approach By Using
Visual Cryptographic
Technique
2015
Steganography Using Genetic
Encryption Along With Visual
Cryptography
2015
Visual Cryptography Scheme
For Color Image Using K-N
Secret Sharing Algorithm
2015
HVCS(Halftone Visual Cryptography
Scheme)
Error diffusion
P.G.Haritha et al
Ms.Deepti
Chaudhary et al
J. Ida Christy et al
AlfiyaSaiyyad et al
RiteshD.Yelane et
al
ShrutiSekra et al
SujitAhirrao et al
Sankar Das et al
Fersna et al
AparnaBhosale et
al
Jainthi.K. et al
Visual Cryptography using
Three Independent Shares in
Color Images
2015
Progressive VCS Without Pixel
Expansion For Color Images
2015
Reducing Transmission Risk
Using Diverse Image
Media
2015
A Novel Cryptographic
Technique That Emphasis
Visual
Volume 5, Issue 2, February 2016
VSS
Error Diffusion
Chen technique
Steganography(LSB)
VC (k,n)
EVCS
Large auxiliary
black pixel
distribution
Visual quality
Pixel expansion
Contrast loss
Authenticity
Random pixel
management
ColorHalftoning
Pixel expansion
Image processing
Authenticity
Correlation method
EVCS
Information
security
Halftone
Steganography (using LSB-Genetic
algorithm)
VCS
K n secret sharing algorithm
Contrast
Authenticity
Malicious attacks
Secure Visual Crytography
Water Marking(LSB)
(3,3)VCS
Random insertion of bits
Reconstruction of
secret message
Floyds error diffusion Halftone
Progressive Visual Cryptography
Pixel expansion
Halftone
Security
Digital watermarking algorithms
Contrast
(n,n) NVSS(natural image based VSS
scheme)
Transmission risk
problem
K out of k (EVCS)
Security
Floyds steinberg error diffusion
Visual quality
Page 103
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
Quality And Efficieny By Floyd
Steinberg Error
Diffusion Method
2015
ISSN 2319 - 4847
algorithm
Contrast
Random grids
Size
Halftone
Ketanraukundiya et
al
Vandhana.G.Pujari
et al
Alkhamohan et al
F.R.Shiny Malar
Kai-Hui Lee et al
Che-Wei Lee et al
Kai-Hui Lee et al
HaoLuo et al
Cheng-Chi Lee et
al
Shruti M.
Rakhunde
Jyoti Rao et al
Secure System Framework for
Secure Visual
Cryptography
2015
Novel Approach for Visual
Cryptography Using Adaptive
Local
Filter
2015
Contrast Enhancement in Color
Extended Visual Cryptography
2015
Secured Privacy Preserving
Mechanism for Distributed
Digital Documents
2015
Digital Image Sharing by
Diverse Image Media
2014
A Secret-Sharing-Based
Method for Authentication
of Grayscale Document Images
via the Use of the
PNG Image With a Data Repair
Capability
2014
Sharing Visual Secrets in
Single Image Random Dot
Stereograms
2014
Color Transfer In Visual
Cryptography
2014
A new Visual Cryptography
with Multi-level Encoding
2014
Reversible Data Hiding Using
Visual Cryptography: A
Review
2014
Survey Of Visual Cryptography
Schemes Without
Pixel Expansion
2014
Steganography(LSB)
Quality of
reconstructed
image
Pixel expansion
(CRT)Chinese Remainder Theorem
Security
RNS(Residual Number System)
Adaptive local filters
Image quality
Quality of
decrypted image
ABM(Additional Basis Matrix)
Contrast loss
Visual cryptic filtering scheme
Pixel
reconstruction
Image quality
Error transformission technique
Security
(n,n) NVSS (Natural Visual Secret
Sharing)
Transmission risk
problem
Shamir secret sharing scheme
Image
authentication
BVCS(Binocular Visual
Cryptography Scheme)
Transmission risk
problem
SIRDSS(Single Image Random Dot
Stereograms
(k-n)Secret Sharing Algorithm
Computational
complexity
VSS(Visual Secret Sharing)
Pixel expansion
RDH(Reversible Data Hiding)
Lossless image
SDS(Seiving-Divison Shuffling)
Algorithm
Encryption/decrypti
on cost
Wu –chen Scheme
Pixel expansion
Shyu et al scheme
Count of secret
image shares
Xia oyu et al Scheme
Share generation
Volume 5, Issue 2, February 2016
Page 104
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
K.V.Ramana et al
Error Diffusion Based Color
Visual Cryptography For
Secure Communication
2014
Tsungleihlin,horng-lee chen et al
scheme
Error diffusion
VIP Synchroniztion
ISSN 2319 - 4847
Less visual quality
of meaningful and
meaningless shares
Floyds and Steinberg error filters
Shekhachenthara et
al
LekhikaChettri
T.Anuradha et al
A Novel Approach On Color
Extended Visual Cryptography
For General Access Structures
Using Error Diffusion
2014
Visual Cryptography Scheme
Based On Pixel
Expansion for Black & White
Image
2014
A Novel Gaussian Error
Diffusion based Colour
Extended Visual Cryptography
2014
Color diffusion
PVC watermarking
Quality of
Meaningful share
(2,2) Visual cryptography algorithm
Pixel expansion
K out of k Visual Cryptography
Scheme
Security
Contrast
Color EVCS
Quality of shares
Gaussion Error Diffusion
Security
PSNR(Peak Signal to Noise Ratio)
Performace
NCC(Normalized Correlation
Cofficient)
Bharanivendhan .N
et al
Visual Cryptography Schemes
for Secret Image Sharing
using GAS Algorithm
2014
MSE(Mean Square Environment)
GAS algorithm
Visual quality
Stamping algorithm
Security
Resolution of
shares
Dhara Trivedi et al
ShyongJianShyu
ShyongJianShyu et
al
Kai-Hui Lee et al
Roberto De Prisco
et al
Pixel expansion
Authenticity
Visual Cryptography in
Biometrics Passport
2014
Bio metricies
Visual Cryptograms Of
Random Grids For General
Access Structures
2013
General Constructions For
Threshold Multi-Secret Visual
Cryptography Scheme
2013
Image Size Invariant Visual
Cryptography For General
Access Structures Subject To
Display Quality Constraints
2013
Color Visual Cryptography
Scheme for Black and White
VCRG-GAS(Visual Cryptograms Of
Random Grids For General Access
Structures)
Pixel expansion
(k,n,s,R)MVCS(Multi-Secret Visual
Cryptography Scheme)
Pixel expansion
Volume 5, Issue 2, February 2016
Security
ILP(Integer Linear Programming)
SIVCS(Size Invariant Visual
Cryptography Scheme)
CBW-VC(Color-Black And White)
Visual Cryptography
Pixel expansion
Uncontrollable
display quality
problem
Pixel expansion
Page 105
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
Secret Images
2013
Peng Li et al
Th. Rupachandra
Singh et al
Grishma R.
Bhokare et al
Dr.V.R.Anitha et al
Anuprita U. mande
Sharing More Information in
Gray VCS
2013
Video Watermarking Scheme
Based Visual Cryptography
And Scene Change & Detection
2013
Color Extended Visual
Cryptography Using Error
Diffusion With VIP
Synchronization
2013
Extending The Visual
Cryptography Algorithm Using
Image
Watermarking Technique
2013
Parameter Evaluation and
Review of Various
Error-Diffusion Half toning
algorithms used in
Color Visual Cryptography
2013
ISSN 2319 - 4847
BW-VC(Black And White) Visual
Cryptography
SHIGVCS(Sharing More Information
in Gray VCS)
Visual quality
Pixel expansion
PSSS(Polynomial-based Secret
Sharing Scheme)
Video watermarking scheme
Video pre
processing
Error diffusion
Visual quality
VIP Synchronization
Color shares
(k-n) Secret Sharing Algorithm
Pixel expansion
Watermarking
Pixel expansion
Display quality
(E-D) algorithms
Contrast loss
Floyds-stengberg halftone algorithm
Perceived loss
Jarvis halftone algorithm
Stucki halftone algorithm
Modification
Floyds-stengberg halftone algorithm
Anuprita U. mande
A Fast Encryption Algorithm
for Color Extended Visual
Cryptography
2013
Faster and easier color VC encryption
method
Floyds-stengberg halftone algorithm
Contrast
Image (visual)
quality
Jarvis halftone algorithm
Stucki halftone algorithm
Sathiya k et al
Dr.V.R.ANITH et
al
Comparison of Visual
Cryptographic
Algorithms for Quality Images
Using XOR
2013
Extending the Visual
Cryptography Algorithm
Without Removing Cover
Images
Volume 5, Issue 2, February 2016
Modification
Floyds-stengberg halftone algorithm
Floyds-stengberg halftone algorithm
Visual quality
Javris halftone algorithm
Stucki halftone
Algorithm
Pixel reversal technique
EVCS without Remove cover image
Management
problem
Pixel expansion
Page 106
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
SonalWange
MitsuguIwamoto
Ching-Nung Yang
et al
Amir Kolaman et
al
Duan-Yu Chen et
al
Kai - H ui L e e et
al
PankajaPatil et al
Anshul Sharma
Ananthakumar
Kendra et al
2013
A Visual Cryptography to
Secure Biometric Database: A
Review
2013
A Weak Security Notion For
Visual Secret Sharing Scheme
2012
K Out N Region Incrementing
Scheme In Visual Cryptography
2012
Quaternion Structured
Similarity A New Quality Index
For Color Images
2012
Visual Depth Guided Color
Image Rain Streaks Removal
Using Sparse Coding
2012
An Extended Visual
Cryptography For General
Access Structures
2012
Visual Cryptography For
Color Images Using Error
Diffusion And Pixel
Synchronization
2012
Performance Of Error Filters In
Halftone
Visual Cryptography
2012
An Improved (8, 8) Colour
Visual Cryptography Scheme
Using
Floyd Error Diffusion
2012
ISSN 2319 - 4847
Biometric identification technique
Authentication
WS-VSS
US-VSS
Contrast loss
RIVCS(Region Incrementing scheme
In Visual Cryptography Scheme)
Pixel expansion
Wang schemeIncorrect color
problem
VQM(Visual Quality Matrix)
Image quality
QTP(Quaternion Image Processing)
QSSIM(Quaternion Structured
SIMilarity
Rain removal framework
Rain removal
Sparse coding
EVCS(Extended Visual Cryptography
Scheme)
Stamping algorithm
Error diffusion
Pixel expansion,
Display quality,
Random pixel
management
problem
Low frequency
difference
VIP Synchronization
Visual contrast
Javris and Floyds error diffusion
Error diffusion filters
Image quality of
halftone shares
(PSNR&UQI)
Authentication
VIP
Synchroniztion
Security
CRC Algorithm
Color VC
Error diffusion
Manimurugan.S et
al
Visual Cryptography Based On
Modified
RLE Compression without
Pixel Expansion
2012
RLE compression
Pixel expansion
Decrypted image
quality
Security
Anushal Sharma et
al
Performance of Error Filters on
Shares in Halftone
Visual Cryptography via Error
Diffusion
2012
Volume 5, Issue 2, February 2016
All Error Diffusion Algorithm
Sierra,Stevenson-Arce error filters
Visual quality
Contrast
Page 107
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
InKoo Kang et al
Tzung-Her Chen et
al
ShyongJianShyu et
al
Velmurugan.N et
al
N Krishna Prakash
et al
MorampudiNaresh
kumar et al
Shiny Malar. F R et
al
Color Extended Visual
Cryptography Using Error
Diffusion
2011
User Friendly Random Grid
Based Visual Secret Sharing
2011
ISSN 2319 - 4847
Visual information pixel (VIP)
synchronization
Low visual quality
of shares
Error diffusion
RGVSS(Random Grid Based Visual
Secret Sharing)
Pixel expansion
Optimum Pixel Expansion For
Threshold Visual Secret
Sharing Scheme
2011
Visual Pixel Expansion of
Secret Image
2011
Visual Cryptography Scheme
For Color Images
Using Half Toning Via Direct
Binary Search With Adaptive
Search And Swap
2011
ILP(Integer Linear Programming)
A Novel Approach For
Cheating Prevention
Through Visual Cryptographic
Analysis
2011
Error Filtering Schemes for
Color Images in Visual
Cryptography
2011
Robust Cheating Prevention
Algorithm
Cheating problem
Visual cryptic filtering Scheme
Quality of image
Fourier transform
Blurring effects
VCSOR
VCSXOR
Direct Binary Search(DBS) with
adaptive search and swap method
Pixel expansion
Pixel expansion
Small contrast
Quality of halftone
image
Computational
compexity
Pixel expansion
3.PROPOSED METHODOLOGY
Proposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3D
images.
3.1 Halftone Image Creation
In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp).
Then the original image is halftoned using Floyd – Steinberg algorithm. In this algorithm takes less time to perform
halftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and also
highly contrasted.
3.2 Share Generation
In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number of
transparency shares are generated and every share was saved. These shares are same size, pixel and different in
transparency levels and also meaningful images.
3.3 Reconstruction
In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The final
reconstructed images is highly contrasted and free from pixel expansion problem.
4. FUTURE SCOPE:
We had suggested a future development of VC scheme to,
1.Apply VC for videos.
2. Using MSB algorithm in steganography for encoding and decoding in VC.
4.1 CONCLUSION
In today’s world security of the image is very important. In this paper we have surveyed different problems and
techniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding
Volume 5, Issue 2, February 2016
Page 108
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC history
the extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniques
are good for data hiding and have their own advantages and disadvantages and give a security so that no one can access
the image in open network.
REFERENCES
[1] P.G.Haritha, Mrs.M.MathinaKani, “A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
“, international journal for trends in engineering & technology, volume 4 issue 2 – April 2015 - ISSN: 2349 –
9303.
[2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar,” A Secure Authentication Using Visual Cryptography&
Steganography “, International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 –
March 2015.
[3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , “VISUAL CRYPTOGRAPHY SCHEME
FOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM “, International Journal of Advanced
Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN
(online): 2348 – 7550.
[4] ShrutiSekra, SamtaBalpande, KarishmaMulani, “STEGANOGRAPHY USING GENETIC ENCRYPTION
ALONG WITH VISUAL CRYPTOGRAPHY”, SSRG
International Journal of Computer Science and
Engineering(SSRG-IJCSE) – volume 2 issue 1 January 2015.
[5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, ”SECURE AUTHENTICATION BY IMAGE
PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS “,International Journal of
Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January
2015.ISSN 2348–4853.
[6] J. Ida Christy and V. Seenivasagam ,“FEED FORWARD NETWORKS IN COLOR EXTENDED VISUAL
CRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES” , International Journal of Security and Its
Applications Vol.9, No.1 (2015).
[7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X.
[8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication using
complementary colors, Science Direct computers & security48(2015) 167e181.
[9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary
black pixels and uniform image quality , Digital Signal Processing 38 (2015) 53–65.
[10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using Three
Independent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering
(IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015).
[11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation In
Visual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume
2, Issue 2, February 2015, ISSN 2348 – 4853.
[12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,International
Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
[13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications,
International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079.
[14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal of
Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084.
[15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND
EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research in
Engineering and Technology, Volume: 04 Issue: 02 | Feb-2015.
[16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, International
Journal of Computer Applications (0975 – 8887), Volume 109 – No. 14, January 2015.
[17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,International
Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015,
ISSN: 232 7782.
[18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, International
Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015
ISSN: 2277 128X.
[19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X.
[20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed Digital
Documents, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015.
Volume 5, Issue 2, February 2016
Page 109
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
[21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment Visible
Mosaic Images, International Journal of Application or Innovation in Engineering & Management
(IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 – 4847.
[22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY,
IJRET: International Journal of Research inEngineering and Technology,2014.
[23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visual
cryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243–250.
[24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images ,
Information Sciences 271 (2014) 246–263.
[25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual
cryptography,Measurement 51 (2014) 81–90, journal homepage: www.elsevier.com/locate/ measurement.
[26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual
Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277 –
8322.
[27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014.
[28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without Pixel
Expansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9,
September 2014 Page No. 8372-8376.
[29] K.V.Ramana,
Y.AdiLakshmi,Error
Diffusion
Based
Color
Visual
Cryptography for
Secure
Communication,International Journal of Advanced Research in Computer and Communication Engineering Vol.
3, Issue 1, January 2014.
[30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptography
for General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer and
Communication EngineeringVol. 3, Issue 2, February 2014.
[31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, International
Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193.
[32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography,
International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531.
[33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL
CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan2014.
[34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GAS
Algorithm, International Journal of Computer Applications (0975 – 8887) Volume 92 – No.8, April 2014.
[35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent and
Innovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 – 487, March
2014.
[36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEE
TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014.
[37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
[38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual
cryptography and scene change detection, International Journal of Electronics and Communications (AEÜ) , Int. J.
Electron. Commun.(AEÜ) 67 (2013) 645–651.
[39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual
cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 1380–1393.
[40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images ,
Theoretical Computer Science 510 (2013) 62–86.
[41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual
cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318–331.
[42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error
Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:23197242 Volume 2, Issue 10, October 2013, Page No. 3066-3069.
[43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHY
ALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers &
Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061.
[44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half
toning algorithms used in Color Visual Cryptography,International Journal of Engineering and Innovative
Technology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754.
Volume 5, Issue 2, February 2016
Page 110
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
[45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended Visual
Cryptography,International Journal of Emerging Technology and Advanced Engineering ,Website:
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).
[46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for Quality
Images Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
,Volume 2, Issue 2, March – April 2013 ISSN 2278-6856.
[47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm Without
Removing Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4April 2013.
[48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of Advanced
Research in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277
128X.
[49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONS
ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013.
[50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subject
to Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10,
OCTOBER 2013.
[51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple – Secret Visual
Cryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 ,
MAY 2013.
[52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal of
Global Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X.
[53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based on
Visual Cryptography, International Journal of Computer Applications (0975 – 8887) Volume 41– No.20, March
2012.
[54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION
AND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology
(IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X.
[55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY,
International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012.
[56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION,
KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 – 6779| NOV 12
TO OCT 13 | VOLUME – 02, ISSUE – 02.
[57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography Scheme
Using Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096.
[58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without Pixel
Expansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September
2012, ISSN: 2277-3754.
[59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via Error
Diffusion, International Journal of Computer Applications (0975 – 8887) Volume 45– No.12, May 2012.
[60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document
Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL.21, NO.1, JANUARY 2012.
[61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures,
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY
2012.
[62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Scheme
in Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
VOL. 22, NO. 5, MAY 2012.
[63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images,
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.
[64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science and
Technology,Volume 11, Issue 20 ,Version 1.0 December 2011.
[65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via
Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and Electrical
Engineering, Vol. 3, No. 6, December 2011.
Volume 5, Issue 2, February 2016
Page 111
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
ISSN 2319 - 4847
[66] MorampudiNareshkumar, DatrikaSrinivasRao,Sravanthi, A Novel Approach for Cheating Prevention through
Visual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2,
No.4, November 2011.
[67] Shiny Malar F.R, Jeya Kumar M.K, Error Filtering Schemes for Color Images in Visual Cryptography,
International Journal of Advanced Computer Science and Applications,Vol. 2, No. 11, 2011.
[68] InKoo Kang, Gonzalo R. Arce, and Heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion,
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011.
[69] Tzung-Her Chen and Kai-Hsiang Tsao, User-Friendly Random-Grid-Based Visual Secret Sharing, IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11,
NOVEMBER 2011.
[70] Ran-Zan Wang and Shuo-Fang Hsu, Tagged Visual Cryptography, IEEE SIGNAL PROCESSING LETTERS,
VOL. 18, NO.11, NOVEMBER 2011.
[71] ShyamalenduKandar, ArnabMaiti, Bibhas Chandra Dhara ,Visual Cryptography Scheme for Color Image Using
Random Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer Science
Issues, Vol. 8, Issue 3, No. 1, May 2011.
[72] RiteshD.Yelane, Dr.Nitiket. N. Mhala, Prof. B. J. ,”Chilke,Security Approach by Using Visual Cryptographic
Technique “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume
5, Issue 1, January 2015.
AUTHORS
M.Sivakumaris currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri
Ramakrishna Engineering College, Coimbatore.His interests include Cryptography&Network Security,Web
Development.
A.Shilpais currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri
Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security,
DBMS.
J.R.Vijayalakshmiis currently pursuing Bachelor of Engineeringin Computer Science&Engineering from
Sri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network
Security,Artificial Intelligence.
Volume 5, Issue 2, February 2016
Page 112
Download