An Approach for Visual Cryptography Scheme on Color Images
Visual cryptography, a popular and simple technique uses the characteristics of human vision to decrypt encrypted images. It requires no computation for decryption from the user end. This paper emphasizes on basic cryptographic scheme proposed by Naor and
- PDF / 362,460 Bytes
- 8 Pages / 439.37 x 666.142 pts Page_size
- 93 Downloads / 215 Views
Abstract Visual cryptography, a popular and simple technique uses the characteristics of human vision to decrypt encrypted images. It requires no computation for decryption from the user end. This paper emphasizes on basic cryptographic scheme proposed by Naor and Shamir with changed shares. Here, we focus on different shares with different combination of CMY color scheme to check whether proper encryption has taken place. Different combinations of shares were employed and the contrast reduction for decrypted images was 50% for some of the combinations which were also achieved earlier. Most of these studies, however, concentrated on binary images but very few on grayscale and color images. In this paper, a technique is presented to apply the visual cryptography scheme on colored images. Keywords Visual cryptography Halftone
RGB color model CMY color model
1 Introduction In the modern twenty-first century, multimedia data are transmitted via Internet, thereby evoking an urgent need of data security simultaneously. In order to secure data from the unintended recipients, many fields of science have evolved like cryptography, steganography, visual cryptography. Cryptography is a science of encrypting data, where the data get disordered after encryption and can only be C. Kar S.K. Kar (&) Sikkim Manipal Institute of Technology, Majitar, India e-mail: [email protected] C. Kar e-mail: [email protected] S. Banerjee Maulana Abul Kalam Azad University of Technology, Kolkata, India e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2018 A. Kalam et al. (eds.), Advances in Electronics, Communication and Computing, Lecture Notes in Electrical Engineering 443, https://doi.org/10.1007/978-981-10-4765-7_53
501
502
C. Kar et al.
recovered by a particular key [1]. In order to retrieve the data, it is very important for the retriever to know the appropriate key. Without knowing the appropriate key, the encrypted data can hardly be detected even if an unauthorized person has stolen the data [2]. Steganography is a science of hiding information such that the existence of message itself is hidden. Visual cryptography was mainly introduced for solving the problem of secret sharing. One of the main issues which arise in cryptographic techniques to be considered in cryptography is secret sharing. Secret sharing is one type of key establishment protocols [3]. Visual cryptography was introduced by Moni Naor and Adi Shamir in 1994. They proposed visual secret sharing scheme, in which an image is divided into ‘n’ shares so that only someone with all ‘n’ shares could decrypt the image, but the same is not possible with any ‘n−1’ shares of the original image [3]. Each share is imprinted upon a different transparent paper and decryption is performed by overlaying the shares when all ‘n’ shares are overlaid, the original image gets visible. The main objective of data hiding is to communicate securely in such a way that the secret message is not visible to the attacker. That is unauthorized person should not be abl
Data Loading...