Research Article

k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence

by  Shyamalendu Kandar, Bibhas Chandra Dhara
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Issue 11
Published: July 2011
Authors: Shyamalendu Kandar, Bibhas Chandra Dhara
10.5120/3160-4377
PDF

Shyamalendu Kandar, Bibhas Chandra Dhara . k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. International Journal of Computer Applications. 25, 11 (July 2011), 6-11. DOI=10.5120/3160-4377

                        @article{ 10.5120/3160-4377,
                        author  = { Shyamalendu Kandar,Bibhas Chandra Dhara },
                        title   = { k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 25 },
                        number  = { 11 },
                        pages   = { 6-11 },
                        doi     = { 10.5120/3160-4377 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Shyamalendu Kandar
                        %A Bibhas Chandra Dhara
                        %T k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence%T 
                        %J International Journal of Computer Applications
                        %V 25
                        %N 11
                        %P 6-11
                        %R 10.5120/3160-4377
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a special type of encryption technique where visual information (Image, Text etc) gets encrypted in such a way that decryption can be performed by Human Visual System with a computation free decryption process. The beauty of the visual secret sharing scheme is in its decryption process where without any complex cryptographic computation encrypted data is decrypted using Human Visual System (HVS). But the encryption technique needs cryptographic computation to divide the image into a number of parts let n such that at least a group of k shares out of n shares reveals the secret information, less of it will reveal no information. In this paper we have discussed a technique called random sequence which needs very less computation for k-n secret sharing.

References
  • M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt’94, pp. 1–12, 1995.
  • Ranjan Parekh, “Principles of Multimedia”, TMH, 2006
  • John F Koegel Buford, Multimedia Systems, Addison Wesley, 2000.
  • Kandar Shyamalendu, Maiti Arnab, “K-N Secret Sharing Visual Cryptography Scheme For Color Image Using Random Number”, International Journal of Engineering Science and Technology, Vol.3 No. 3 March 2011, pp 1851-1857
  • Kandar Shyamalendu, Maiti Arnab, “Variable Length Key based Visual Cryptography Scheme for Color Image using Random Number”, International Journal of Computer Application, Vol. 19 No. 4, April 2011. pp34-39
  • Kandar Shyamalendu, Maiti Arnab, Dhara Bibhas Chandra “Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking” International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 pp543-549
  • A. Shamir: “How to share a secret ?” Comm ACM, 22(11):612-613, 1979.
  • G. Blakley : “Safeguarding cryptographic keys “ Proc. of AFIPS National Computer Conference, 1979.
  • C. Asmuth and J. Bloom “A modular approach to key safeguarding” IEEE transaction on Information Theory, 29(2):208-210, 1983.
  • Hartung F., Kuttter M., “Multimedia Watermarking Techniques”, 1999 IEEE
  • S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks and Implications. IEEE Journal on Selected Areas in Communications, 16(4):573–586, May 1998
  • Nakajima M. , Yamaguchi Y., Extended visual cryptography for natural images. Journal of WSCG.v10 i2. 303-310.
  • F. Liu, C. K. Wu, X.J. Lin, “Colour visual cryptography schemes” IET Information Security, 2008, Vol. 2, No. 4, pp. 151–165
  • Kang InKoo el. at., Color Extended Visual Cryptography using Error Diffusion, IEEE 2010.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Visual Cryptography Secret Sharing Random Sequence

Powered by PhDFocusTM