IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 5 - Issue 1, January 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

[Full Text]

 

AUTHOR(S)

Linju P.S, Sophiya Mathews

 

KEYWORDS

Cheating, Cover image, Halftone image, Pixel expansion, Sealing

 

ABSTRACT

Visual cryptography is a technique of cryptography in which secret images are divided into multiple shares and are distributed to different entities. Each secret can be reconstructed by superimposing these shares using different operations. Common traditional drawbacks of all existing methods are pixel expansion and noise at output. Another major issues that can occur in existing visual cryptography systems are Cheating between share holders and Share holders cheating owner. In order to overcome these limitations, sealing algorithm is used with two applications of VC such as MIVC and EVC. Here two secret images can be send at the same time by converting them to halftone representations which in turn are partitioned as three shares in total.

 

REFERENCES

[1] Nazanin Askari, Howard M. Heys, Member, IEEE, and Cecilia R. Moloney, Member, IEEE Novel Visual Cryptography Schemes Without Pixel Expansion for Halftone Images" IEEE Trans. 2014

[2] Xiaotian Wu and Wei Sun, Extended Capabilities for XOR-Based Visual Cryptography" in IEEE, 2014.

[3] Young-Chang Hou, Shih-Chieh Wei and Chia-Yin LinRandom-Grid-Based Visual Cryptography Schemes" in the year 2013 in IEEE, 2013

[4] N. Askari, C. Moloney, and H. M. Heys, A novel visual secret sharing scheme without image size expansion" in Proc. 25th IEEE Canadian Conf. Electr. Comput. Eng. (CCECE), Montreal, QC, Canada, May 2012, pp. 14.

[5] Pallavi V. Chavan and Dr. Mohammad Atique, Design of Hierarchical Visual Cryptograpghy" in IEEE, 2012.

[6] Nitty Sarah Alex and L. Jani Anbarasi, Enhanced Image Secret Sharing via Error Di_usion in Halftone Visual Cryptography" in IEEE 2011.

[7] A. Ross and A. A. Othman, Visual cryptography for biometric privacy" IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 7081, Mar. 2011.

[8] Hsien-Chu Wu, Hao-Cheng Color Visual Cryptography Scheme Using Meaningful Shares" IEEE, 2008.

[9] Z. Zhou, G. R. Arce, and G. D. Crescenzo, Halftone visual cryptography" IEEE Trans. Image Process., vol. 15, no. 8, pp. 24412453, Aug. 2006.

[10] M. Naor and A. Shamir, Visual cryptography" in EUROCRYPT94 (Lecture Notes in Computer Science), vol. 950. Berlin, Germany: Springer-Verlag, 1995, pp. 112.