International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES M.SIVA KUMAR1, A.SHILPA2, J.R.VIJAYALAKSHMI3 1,2,3 Department of Computer Science and Engineering, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India. ABSTRACT Visual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security, quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used different techniques for visual cryptography from 2011 to 2015. Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares. 1.INTRODUCTION Visual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic technique which allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way that the decryption can be performed by thehuman visual system, without the aid of computers. This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansion results in smaller size of the share. Encoding multiple secret images in to the same share images requires less overhead while sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over the communication channels. This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visual cryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme. 1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME: Naor and Shamir’s proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel is white one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into two whiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secret image is shown only when both of the images became shares are upper imposed. Figure 1 Black and White image VCS Volume 5, Issue 2, February 2016 Page 100 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 Table 1: Construction of Black and White image VC To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hiding schemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages, embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fang recommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and OR operation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .The disadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share large amounts of confidential messages several shares have to be generated. 1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME: The (2, 2)–VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In the decryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size of decrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality of halftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filing curve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray level image is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the case of (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed by mound binary shares. 254: [1 1 1 1 1 1 1 0] Table 2-Construction of gray scale image VC Share1 (1st half): 0 1 0 1 0 1 0 0 Share2 (1st half): 1 0 1 0 1 0 1 0 -------------------1 1 1 1 1 1 1 0 = 254 Share3 (1st half) : 0 0 1 0 0 1 0 0 Share1 (2nd half): 1 1 0 1 1 0 1 0 ------------------1 1 1 1 1 1 1 0 = 254 Share2 (2nd half): 1 1 1 0 1 1 1 0 Share3 (2nd half): 1 0 0 1 0 1 0 0 ------------------1 1 1 1 1 1 1 0 = 254 Volume 5, Issue 2, February 2016 Page 101 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 Secret image share1 share2 Figure 2 Gray scale image VCS Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives perfect high quality image when reconstructed without any loss of contrast. 1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME: Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with the concept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel is transformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly one color region colored, and all the other color regions are black. The color of one pixel depends on the interrelations between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c× 3. Yang and Laihimproved the pixel expansion to c × 2 of Verheul and Van Tilborg . But in both of these schemes share generated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmit secret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image two significant color images areselected as cover images which are the same size as the secret color image. Then according to a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantage of this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in the secret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a secret color image sharing scheme based on modified visual cryptography. Table 3: Construction of color image VC Figure 3 Color image VCS Volume 5, Issue 2, February 2016 Page 102 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 2. ANALYSIS OF VARIOUS VISUAL CRYPTOGRAPHY SCHEME: Table 4: Table for Visual Cryptography problems and solving techniques AUTHOR NAME TITLE AND YEAR METHOD TO SOLVE PROBLEM Xuehu Yan et al Halftone Visual Cryptography With Minimum Auxiliary Black Pixel & Uniform Image Quality 2015 A New Visual Cryptography Technique For Color Images 2015 A Secure Authentication Using Visual Cryptography & Steganography 2015 Feed Forward Networks In Color Extended Visual Cryptography To Generate Meaningful Shares 2015 Secure Authentication By Image Processing And Visual Cryptography For Banking Applications. 2015 Security Approach By Using Visual Cryptographic Technique 2015 Steganography Using Genetic Encryption Along With Visual Cryptography 2015 Visual Cryptography Scheme For Color Image Using K-N Secret Sharing Algorithm 2015 HVCS(Halftone Visual Cryptography Scheme) Error diffusion P.G.Haritha et al Ms.Deepti Chaudhary et al J. Ida Christy et al AlfiyaSaiyyad et al RiteshD.Yelane et al ShrutiSekra et al SujitAhirrao et al Sankar Das et al Fersna et al AparnaBhosale et al Jainthi.K. et al Visual Cryptography using Three Independent Shares in Color Images 2015 Progressive VCS Without Pixel Expansion For Color Images 2015 Reducing Transmission Risk Using Diverse Image Media 2015 A Novel Cryptographic Technique That Emphasis Visual Volume 5, Issue 2, February 2016 VSS Error Diffusion Chen technique Steganography(LSB) VC (k,n) EVCS Large auxiliary black pixel distribution Visual quality Pixel expansion Contrast loss Authenticity Random pixel management ColorHalftoning Pixel expansion Image processing Authenticity Correlation method EVCS Information security Halftone Steganography (using LSB-Genetic algorithm) VCS K n secret sharing algorithm Contrast Authenticity Malicious attacks Secure Visual Crytography Water Marking(LSB) (3,3)VCS Random insertion of bits Reconstruction of secret message Floyds error diffusion Halftone Progressive Visual Cryptography Pixel expansion Halftone Security Digital watermarking algorithms Contrast (n,n) NVSS(natural image based VSS scheme) Transmission risk problem K out of k (EVCS) Security Floyds steinberg error diffusion Visual quality Page 103 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 Quality And Efficieny By Floyd Steinberg Error Diffusion Method 2015 ISSN 2319 - 4847 algorithm Contrast Random grids Size Halftone Ketanraukundiya et al Vandhana.G.Pujari et al Alkhamohan et al F.R.Shiny Malar Kai-Hui Lee et al Che-Wei Lee et al Kai-Hui Lee et al HaoLuo et al Cheng-Chi Lee et al Shruti M. Rakhunde Jyoti Rao et al Secure System Framework for Secure Visual Cryptography 2015 Novel Approach for Visual Cryptography Using Adaptive Local Filter 2015 Contrast Enhancement in Color Extended Visual Cryptography 2015 Secured Privacy Preserving Mechanism for Distributed Digital Documents 2015 Digital Image Sharing by Diverse Image Media 2014 A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability 2014 Sharing Visual Secrets in Single Image Random Dot Stereograms 2014 Color Transfer In Visual Cryptography 2014 A new Visual Cryptography with Multi-level Encoding 2014 Reversible Data Hiding Using Visual Cryptography: A Review 2014 Survey Of Visual Cryptography Schemes Without Pixel Expansion 2014 Steganography(LSB) Quality of reconstructed image Pixel expansion (CRT)Chinese Remainder Theorem Security RNS(Residual Number System) Adaptive local filters Image quality Quality of decrypted image ABM(Additional Basis Matrix) Contrast loss Visual cryptic filtering scheme Pixel reconstruction Image quality Error transformission technique Security (n,n) NVSS (Natural Visual Secret Sharing) Transmission risk problem Shamir secret sharing scheme Image authentication BVCS(Binocular Visual Cryptography Scheme) Transmission risk problem SIRDSS(Single Image Random Dot Stereograms (k-n)Secret Sharing Algorithm Computational complexity VSS(Visual Secret Sharing) Pixel expansion RDH(Reversible Data Hiding) Lossless image SDS(Seiving-Divison Shuffling) Algorithm Encryption/decrypti on cost Wu –chen Scheme Pixel expansion Shyu et al scheme Count of secret image shares Xia oyu et al Scheme Share generation Volume 5, Issue 2, February 2016 Page 104 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 K.V.Ramana et al Error Diffusion Based Color Visual Cryptography For Secure Communication 2014 Tsungleihlin,horng-lee chen et al scheme Error diffusion VIP Synchroniztion ISSN 2319 - 4847 Less visual quality of meaningful and meaningless shares Floyds and Steinberg error filters Shekhachenthara et al LekhikaChettri T.Anuradha et al A Novel Approach On Color Extended Visual Cryptography For General Access Structures Using Error Diffusion 2014 Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image 2014 A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography 2014 Color diffusion PVC watermarking Quality of Meaningful share (2,2) Visual cryptography algorithm Pixel expansion K out of k Visual Cryptography Scheme Security Contrast Color EVCS Quality of shares Gaussion Error Diffusion Security PSNR(Peak Signal to Noise Ratio) Performace NCC(Normalized Correlation Cofficient) Bharanivendhan .N et al Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm 2014 MSE(Mean Square Environment) GAS algorithm Visual quality Stamping algorithm Security Resolution of shares Dhara Trivedi et al ShyongJianShyu ShyongJianShyu et al Kai-Hui Lee et al Roberto De Prisco et al Pixel expansion Authenticity Visual Cryptography in Biometrics Passport 2014 Bio metricies Visual Cryptograms Of Random Grids For General Access Structures 2013 General Constructions For Threshold Multi-Secret Visual Cryptography Scheme 2013 Image Size Invariant Visual Cryptography For General Access Structures Subject To Display Quality Constraints 2013 Color Visual Cryptography Scheme for Black and White VCRG-GAS(Visual Cryptograms Of Random Grids For General Access Structures) Pixel expansion (k,n,s,R)MVCS(Multi-Secret Visual Cryptography Scheme) Pixel expansion Volume 5, Issue 2, February 2016 Security ILP(Integer Linear Programming) SIVCS(Size Invariant Visual Cryptography Scheme) CBW-VC(Color-Black And White) Visual Cryptography Pixel expansion Uncontrollable display quality problem Pixel expansion Page 105 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 Secret Images 2013 Peng Li et al Th. Rupachandra Singh et al Grishma R. Bhokare et al Dr.V.R.Anitha et al Anuprita U. mande Sharing More Information in Gray VCS 2013 Video Watermarking Scheme Based Visual Cryptography And Scene Change & Detection 2013 Color Extended Visual Cryptography Using Error Diffusion With VIP Synchronization 2013 Extending The Visual Cryptography Algorithm Using Image Watermarking Technique 2013 Parameter Evaluation and Review of Various Error-Diffusion Half toning algorithms used in Color Visual Cryptography 2013 ISSN 2319 - 4847 BW-VC(Black And White) Visual Cryptography SHIGVCS(Sharing More Information in Gray VCS) Visual quality Pixel expansion PSSS(Polynomial-based Secret Sharing Scheme) Video watermarking scheme Video pre processing Error diffusion Visual quality VIP Synchronization Color shares (k-n) Secret Sharing Algorithm Pixel expansion Watermarking Pixel expansion Display quality (E-D) algorithms Contrast loss Floyds-stengberg halftone algorithm Perceived loss Jarvis halftone algorithm Stucki halftone algorithm Modification Floyds-stengberg halftone algorithm Anuprita U. mande A Fast Encryption Algorithm for Color Extended Visual Cryptography 2013 Faster and easier color VC encryption method Floyds-stengberg halftone algorithm Contrast Image (visual) quality Jarvis halftone algorithm Stucki halftone algorithm Sathiya k et al Dr.V.R.ANITH et al Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR 2013 Extending the Visual Cryptography Algorithm Without Removing Cover Images Volume 5, Issue 2, February 2016 Modification Floyds-stengberg halftone algorithm Floyds-stengberg halftone algorithm Visual quality Javris halftone algorithm Stucki halftone Algorithm Pixel reversal technique EVCS without Remove cover image Management problem Pixel expansion Page 106 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 SonalWange MitsuguIwamoto Ching-Nung Yang et al Amir Kolaman et al Duan-Yu Chen et al Kai - H ui L e e et al PankajaPatil et al Anshul Sharma Ananthakumar Kendra et al 2013 A Visual Cryptography to Secure Biometric Database: A Review 2013 A Weak Security Notion For Visual Secret Sharing Scheme 2012 K Out N Region Incrementing Scheme In Visual Cryptography 2012 Quaternion Structured Similarity A New Quality Index For Color Images 2012 Visual Depth Guided Color Image Rain Streaks Removal Using Sparse Coding 2012 An Extended Visual Cryptography For General Access Structures 2012 Visual Cryptography For Color Images Using Error Diffusion And Pixel Synchronization 2012 Performance Of Error Filters In Halftone Visual Cryptography 2012 An Improved (8, 8) Colour Visual Cryptography Scheme Using Floyd Error Diffusion 2012 ISSN 2319 - 4847 Biometric identification technique Authentication WS-VSS US-VSS Contrast loss RIVCS(Region Incrementing scheme In Visual Cryptography Scheme) Pixel expansion Wang schemeIncorrect color problem VQM(Visual Quality Matrix) Image quality QTP(Quaternion Image Processing) QSSIM(Quaternion Structured SIMilarity Rain removal framework Rain removal Sparse coding EVCS(Extended Visual Cryptography Scheme) Stamping algorithm Error diffusion Pixel expansion, Display quality, Random pixel management problem Low frequency difference VIP Synchronization Visual contrast Javris and Floyds error diffusion Error diffusion filters Image quality of halftone shares (PSNR&UQI) Authentication VIP Synchroniztion Security CRC Algorithm Color VC Error diffusion Manimurugan.S et al Visual Cryptography Based On Modified RLE Compression without Pixel Expansion 2012 RLE compression Pixel expansion Decrypted image quality Security Anushal Sharma et al Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion 2012 Volume 5, Issue 2, February 2016 All Error Diffusion Algorithm Sierra,Stevenson-Arce error filters Visual quality Contrast Page 107 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 InKoo Kang et al Tzung-Her Chen et al ShyongJianShyu et al Velmurugan.N et al N Krishna Prakash et al MorampudiNaresh kumar et al Shiny Malar. F R et al Color Extended Visual Cryptography Using Error Diffusion 2011 User Friendly Random Grid Based Visual Secret Sharing 2011 ISSN 2319 - 4847 Visual information pixel (VIP) synchronization Low visual quality of shares Error diffusion RGVSS(Random Grid Based Visual Secret Sharing) Pixel expansion Optimum Pixel Expansion For Threshold Visual Secret Sharing Scheme 2011 Visual Pixel Expansion of Secret Image 2011 Visual Cryptography Scheme For Color Images Using Half Toning Via Direct Binary Search With Adaptive Search And Swap 2011 ILP(Integer Linear Programming) A Novel Approach For Cheating Prevention Through Visual Cryptographic Analysis 2011 Error Filtering Schemes for Color Images in Visual Cryptography 2011 Robust Cheating Prevention Algorithm Cheating problem Visual cryptic filtering Scheme Quality of image Fourier transform Blurring effects VCSOR VCSXOR Direct Binary Search(DBS) with adaptive search and swap method Pixel expansion Pixel expansion Small contrast Quality of halftone image Computational compexity Pixel expansion 3.PROPOSED METHODOLOGY Proposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3D images. 3.1 Halftone Image Creation In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp). Then the original image is halftoned using Floyd – Steinberg algorithm. In this algorithm takes less time to perform halftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and also highly contrasted. 3.2 Share Generation In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number of transparency shares are generated and every share was saved. These shares are same size, pixel and different in transparency levels and also meaningful images. 3.3 Reconstruction In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The final reconstructed images is highly contrasted and free from pixel expansion problem. 4. FUTURE SCOPE: We had suggested a future development of VC scheme to, 1.Apply VC for videos. 2. Using MSB algorithm in steganography for encoding and decoding in VC. 4.1 CONCLUSION In today’s world security of the image is very important. In this paper we have surveyed different problems and techniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding Volume 5, Issue 2, February 2016 Page 108 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC history the extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniques are good for data hiding and have their own advantages and disadvantages and give a security so that no one can access the image in open network. REFERENCES [1] P.G.Haritha, Mrs.M.MathinaKani, “A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES “, international journal for trends in engineering & technology, volume 4 issue 2 – April 2015 - ISSN: 2349 – 9303. [2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar,” A Secure Authentication Using Visual Cryptography& Steganography “, International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015. [3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , “VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM “, International Journal of Advanced Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN (online): 2348 – 7550. [4] ShrutiSekra, SamtaBalpande, KarishmaMulani, “STEGANOGRAPHY USING GENETIC ENCRYPTION ALONG WITH VISUAL CRYPTOGRAPHY”, SSRG International Journal of Computer Science and Engineering(SSRG-IJCSE) – volume 2 issue 1 January 2015. [5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, ”SECURE AUTHENTICATION BY IMAGE PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS “,International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January 2015.ISSN 2348–4853. [6] J. Ida Christy and V. Seenivasagam ,“FEED FORWARD NETWORKS IN COLOR EXTENDED VISUAL CRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES” , International Journal of Security and Its Applications Vol.9, No.1 (2015). [7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X. [8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication using complementary colors, Science Direct computers & security48(2015) 167e181. [9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , Digital Signal Processing 38 (2015) 53–65. [10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using Three Independent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015). [11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation In Visual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume 2, Issue 2, February 2015, ISSN 2348 – 4853. [12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015. [13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications, International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079. [14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal of Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084. [15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research in Engineering and Technology, Volume: 04 Issue: 02 | Feb-2015. [16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, International Journal of Computer Applications (0975 – 8887), Volume 109 – No. 14, January 2015. [17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,International Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015, ISSN: 232 7782. [18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, International Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015 ISSN: 2277 128X. [19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X. [20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed Digital Documents, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015. Volume 5, Issue 2, February 2016 Page 109 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 [21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment Visible Mosaic Images, International Journal of Application or Innovation in Engineering & Management (IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 – 4847. [22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY, IJRET: International Journal of Research inEngineering and Technology,2014. [23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visual cryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243–250. [24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images , Information Sciences 271 (2014) 246–263. [25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual cryptography,Measurement 51 (2014) 81–90, journal homepage: www.elsevier.com/locate/ measurement. [26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277 – 8322. [27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014. [28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without Pixel Expansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9, September 2014 Page No. 8372-8376. [29] K.V.Ramana, Y.AdiLakshmi,Error Diffusion Based Color Visual Cryptography for Secure Communication,International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014. [30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptography for General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer and Communication EngineeringVol. 3, Issue 2, February 2014. [31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193. [32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography, International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531. [33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan2014. [34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GAS Algorithm, International Journal of Computer Applications (0975 – 8887) Volume 92 – No.8, April 2014. [35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 – 487, March 2014. [36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014. [37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014. [38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual cryptography and scene change detection, International Journal of Electronics and Communications (AEÜ) , Int. J. Electron. Commun.(AEÜ) 67 (2013) 645–651. [39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 1380–1393. [40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images , Theoretical Computer Science 510 (2013) 62–86. [41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318–331. [42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:23197242 Volume 2, Issue 10, October 2013, Page No. 3066-3069. [43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers & Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061. [44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half toning algorithms used in Color Visual Cryptography,International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754. Volume 5, Issue 2, February 2016 Page 110 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 [45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended Visual Cryptography,International Journal of Emerging Technology and Advanced Engineering ,Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013). [46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,Volume 2, Issue 2, March – April 2013 ISSN 2278-6856. [47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm Without Removing Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4April 2013. [48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277 128X. [49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013. [50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subject to Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10, OCTOBER 2013. [51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple – Secret Visual Cryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 , MAY 2013. [52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal of Global Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X. [53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based on Visual Cryptography, International Journal of Computer Applications (0975 – 8887) Volume 41– No.20, March 2012. [54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X. [55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY, International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012. [56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 – 6779| NOV 12 TO OCT 13 | VOLUME – 02, ISSUE – 02. [57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography Scheme Using Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096. [58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without Pixel Expansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September 2012, ISSN: 2277-3754. [59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via Error Diffusion, International Journal of Computer Applications (0975 – 8887) Volume 45– No.12, May 2012. [60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL.21, NO.1, JANUARY 2012. [61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY 2012. [62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Scheme in Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 22, NO. 5, MAY 2012. [63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012. [64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science and Technology,Volume 11, Issue 20 ,Version 1.0 December 2011. [65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and Electrical Engineering, Vol. 3, No. 6, December 2011. Volume 5, Issue 2, February 2016 Page 111 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 [66] MorampudiNareshkumar, DatrikaSrinivasRao,Sravanthi, A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011. [67] Shiny Malar F.R, Jeya Kumar M.K, Error Filtering Schemes for Color Images in Visual Cryptography, International Journal of Advanced Computer Science and Applications,Vol. 2, No. 11, 2011. [68] InKoo Kang, Gonzalo R. Arce, and Heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011. [69] Tzung-Her Chen and Kai-Hsiang Tsao, User-Friendly Random-Grid-Based Visual Secret Sharing, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11, NOVEMBER 2011. [70] Ran-Zan Wang and Shuo-Fang Hsu, Tagged Visual Cryptography, IEEE SIGNAL PROCESSING LETTERS, VOL. 18, NO.11, NOVEMBER 2011. [71] ShyamalenduKandar, ArnabMaiti, Bibhas Chandra Dhara ,Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011. [72] RiteshD.Yelane, Dr.Nitiket. N. Mhala, Prof. B. J. ,”Chilke,Security Approach by Using Visual Cryptographic Technique “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015. AUTHORS M.Sivakumaris currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri Ramakrishna Engineering College, Coimbatore.His interests include Cryptography&Network Security,Web Development. A.Shilpais currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security, DBMS. J.R.Vijayalakshmiis currently pursuing Bachelor of Engineeringin Computer Science&Engineering from Sri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security,Artificial Intelligence. Volume 5, Issue 2, February 2016 Page 112