Research Article

A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes

by  D. Madhavi, A. Vasu Devasastry
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Issue 2
Published: January 2014
Authors: D. Madhavi, A. Vasu Devasastry
10.5120/14959-3131
PDF

D. Madhavi, A. Vasu Devasastry . A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes. International Journal of Computer Applications. 86, 2 (January 2014), 27-29. DOI=10.5120/14959-3131

                        @article{ 10.5120/14959-3131,
                        author  = { D. Madhavi,A. Vasu Devasastry },
                        title   = { A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 86 },
                        number  = { 2 },
                        pages   = { 27-29 },
                        doi     = { 10.5120/14959-3131 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A D. Madhavi
                        %A A. Vasu Devasastry
                        %T A Survey on Perceived Visual Quality and Secured Visual Cryptography Schemes%T 
                        %J International Journal of Computer Applications
                        %V 86
                        %N 2
                        %P 27-29
                        %R 10.5120/14959-3131
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

VC, EVCS and Color EVCS are the three techniques used for Visual Cryptography Schemes. Visual Cryptography Scheme (VCS) is one of the techniques used to encrypt the image by dividing the original image into transparencies called Shares. A set of qualified participants is able to recover the secret image. An Extended Visual Cryptography Scheme (EVCS) is a kind of VCS which consists of embedded random shares realized by embedding shares into covering shares. Color Visual Cryptography (VC) encrypts a color secret image into n color halftone image shares. Different methods for VC have different algorithms to provide cryptography for images. Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and the security of encrypted transparency shares. Generally, Visual Cryptography suffers from the deterioration of the image quality and security. Many authors are proposed different algorithms for these parameters. This paper describes the trade-off between the image quality and the security is discussed by comparing these VC schemes.

References
  • M. Naor, A. Shamir, 1994. "Visual Cryptography". Lecture Notes in Computer Science, Vol. 950, pp. 1-12. http://link. springer. com/chapter/10. 1007%2FBFb0053419
  • Jim Cai, 2003. A Short Survey on Visual Cryptography Schemes. Technical Paper. CiteSeerx, Penn State University, doi: 10. 1. 1. 85. 3060. http://www. cs. toronto. edu/~jcai/paper. pdf
  • J. K Mandal, A. Khamuri, 2011. A Data Embedding Technique for Gray scale Image using Genetic Algorithm (DEGGA). IEEE sponsored International Conference on Communication, Computing and Security, Proceedings by Excel India Publishers. ISBN-978-93-80697-505, NIT Rourkela, 7-9 January 2011, pp. 19-22, (SP_2011_2001). http://jkmandal. com/pdf/DEGGA. pdf
  • Nakajima, M. and Yamaguchi, Y. , 2002. Extended Visual Cryptography for Natural Images, WSCG02, 303. http://wscg. zcu. cz/wscg2002/papers_2002/a73. pdf
  • Anuprita Mande, Manish Tibdewal, 2013. "A Fast Encryption Algorithm for Color Extended Visual Cryptography" International Journal of Emerging Technology and Advanced Engineering. ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013. http://www. ijetae. com/files/Volume3Issue4/IJETAE_0413_64. pdf
  • T. Rajitha, P. Pradeep Kumar, V. Laxmi, 2012. Construction of Extended Visual Cryptography Scheme for Secret Sharing. International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4 (August 2012), ISSN 2277-5420. http://ijcsn. org/IJCSN-2012/1-4/IJCSN-2012-1-4-56. pdf
  • Mohsen Heidarinejad, K. N. Plataniotis, Edward S. Rogers. 2007. A Karnaugh Map Based {2, 2} Visual Cryptographic Scheme for Color Images. Technical Paper. University of Toronto. April 3, 2007.
  • Wang Dao-Shun, Zhang Lei, Ma Ning and Huang Lian-Sheng. Secret Color Images Sharing Schemes based on XOR operation. Technical Paper. Tsinghua University, Beijing, 100084, China. http://eprint. iacr. org/2005/372. pdf
  • H. Koga, H. Yamamoto, 1998. Proposal of a Lattice-based Visual Secret Sharing Scheme for Color and Gray Scale Images. IEICE Transaction on Fundamentals, Vol. E81-A (6):1262-1369. http://hirosuke. it. k. u-tokyo. ac. jp/files/abst/pdfs/E81-A-6-1262. pdf
  • Adi Shamir, 1979 "How to share a secret". Computer Communications. ACM, vol. 22, no. 11, pp. 612-613, doi:10. 1145/359168. 359176. http://www. iacr. org/archive/asiacrypt2001/22480554. pdf
  • M. Naor, A. Shamir, in: M. Lomas, ed. , Visual Cryptography II: Improving the Contrast via the Cover Base, Presented at Seurity in Communication Networks, AmalE, Italy, September 16-17, 1996. Lecture Notes in Computer Science, Vol. 1189, Springer, Berlin, 1997, pp. 197-202. Available also at Theory of Cryptography Library, Report 96-07. http://citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 21. 4631&rep=rep1&type=pdf
  • Sozan Abdulla, 2010. "New Visual Cryptography Algorithm for Colored Image". Journal of Computing, Vol. 2, Issue 4 (21-25), April 2010, ISSN: 2151-9617. http://arxiv. org/ftp/arxiv/papers/1004/1004. 4445. pdf
  • L. W. Hawkes, A. Yasinsac, C. Cline, 2000. An Application of Visual Cryptography to Financial Documents. Technical Paper. Security and Assurance in Information technology Laboratory, Florida State University, Tallahassee, FL 32306-4530. http://websrv. cs. fsu. edu/research/reports/TR-001001. pdf
  • Chang-Chou Lin, Wen-Hsiang Tsai, 2003. Visual Cryptography for Gray-level Images by Dithering Techniques, Pattern Recognition Letters 24 (2003) 349-358. ELSEVIER. Available at Computer Science Web, powered by SCIENCE DIRECT. http://www. cis. nctu. edu. tw/~whtsai/Journal%20Paper%20PDFs/Lin_&_Tsai_PRL_2003. pdf
  • Young-Chang Hou, 2003. Visual Cryptography for Color Images. Technical report. Pattern recognition 36 (2003) 1619-1629. Journal of the Pattern recognition society, PERGAMON. Published by ELSEVIER. http://csis. bits-pilani. ac. in/faculty/murali/netsec-10/seminar/refs/muralikrishna3. pdf
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

VCS (Visual Cryptography Scheme) EVCS (Extended Visual Cryptography Scheme) Color EVCS DEGGA (Data Embedding Technique for Grayscale Image using Genetic Algorithm)

Powered by PhDFocusTM