SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



                   STUDY OF COLOR VISUAL CRYPTOGRAPHY
                          ASMITA KAPSEPATIL, APEKSHA CHAVAN
                           Pillai’s Institute of Information Technology, New Panvel, India 410206



Abstract:
This paper shows the study on the concept of color visual cryptography. This paper includes study of color visual
cryptography which involves visual information pixel (VIP) synchronization and error diffusion technique applicable for
color visual cryptography. VIP carries visual information of original image and VIP synchronization helps to keep the same
position of pixels throughout the color channels. Error diffusion generates shares which are clear and visible to human eyes
and it improves the visibility of shares. With the help of these two concepts it results in visual quality improvement of
images. It also includes a brief description of color model used for the process color visual cryptography.

Keywords: error diffusion, visual cryptography, visual information pixel, visual information pixel synchronization

Introduction
Visual cryptography, is an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted
images. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that
hackers cannot perceive any clues about a secret image from individual cover images. There have been many published
studies of visual cryptography. Most of them, however, have concentrated on discussing black-and-white images, and just
few of them have proposed methods for processing gray-level and color images. Based on previous study in binary image and
grey level images this analyzed concept gives a better visual cryptography method for color images and it provides pleasant
feel of shares and high visual quality to human eye using Visual Information Pixel and Error Diffusion Technique.

Visual Cryptography for Color Images
In visual cryptography the secret information that is an image is split into shares such that the decryption can be performed
by the human visual system by simply superimposing the shares. No computations are involved in the reconstruction of
images. This section provides an overview on a color visual cryptography which is simple and good. This method involves C,
M, Y subtractive color model in which the color is represented by applying the combinations of colored lights reflected from
the surface of an object because most of the objects do not radiate by them [1].




                                                 Fig 1. Subtractive color model [1]
This proposed method includes the concept of visual pixel information synchronization and error diffusion.
Error Diffusion: This is simple but efficient method for image halftone generation. The quantization error is filtered and fed
to future inputs. The error filter is designed in a way that the low frequency differences between the input and output images
are minimized and it produces pleasing halftone images to human vision.
VIP synchronization: Synchronization of the visual information pixel across the color channels improves visual contrast of
shares. In color VC schemes the colors of encrypted pixels and the contrast can be degraded due to random matrix
permutation. Random matrix permutations are key security features in VC schemes [3]. In gray scale VC schemes it does not
affect the visual schemes however in color schemes, independent execution of random matrix permutation for each color
channel can cause color distortion by placing VIPs at random positions in sub pixels which finally degrades the visual
quality. VIP synchronization prevents the color and contrast of original images from degradation even with matrix
permutations. In this concept it derives basis matrices from the given set of matrices which is used in standard VCS.

Issn 2250-3005(online)                                         August| 2012                                    Page 1047
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4



VIP pixels include the color information of original image which helps in making encrypted shares meaningful. In this
process a set of basis matrices Scc1,c2,,cn (c,c1,c2,,,cn € {0,1}) is generated where c is a pixel bit of message and c1,,,,cn
indicates the corresponding pixel bits from the shares. In each row of S cc1, c2, cn there are q number of VIPs which are denoted
as ci and the values are defined by halftone process. The actual bit values of ci are defined by referring the pixel values of
original shares which are not known at the matrix derivation stage and then errors are diffused away. In this analyzed method
each pixel carries visual information as well as message information [3], while other method used needs extra pixels in
addition to the pixel expansion to produce meaningful shares. Since each VIP is placed at the same position in sub pixels
across three color channels, VIP represents accurate colors of original image. In this method ω (Sc[i]) is a hamming weight of
‘OR’ -ed row vector up to ith rows in Scc1, c2, cn. This row vector should not contain any ci as elements. Since the values of ci are
undefined, it can be represented as 0 or 1 in the halftone stage which ensures the placement of ci at the same position in each
row of Sc [3].
Thus each encrypted sub pixel has the same VIP positions across three channels which mean that these sub pixels carry
accurate visual information of the original image and this result in high visual quality in encrypted shares.


EXAMPLE FOR ANALYZED METHOD




                                                      Fig. 2 Secret Image [2]




                                                Fig. 4 Shares of original image [2]




                                                Fig. 5 Reconstruction of shares [2]

Conclusion
Review of this proposed method provides a study on a better visual cryptography for color images and it provides pleasant
feel with high visual quality.

References
    1.   Young Chang Hou,2003,vol 36,pp 1619-1629
    2.   Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli ,”Progressive Color Visual Cryptography ” , JEI,2004
    3.   InKoo Kang, Gonzalo R Arce, Heung Kyu Lee, “Color Extended Visual Cryptography using Error Diffusion” ,
         2009




Issn 2250-3005(online)                                            August| 2012                                       Page 1048

More Related Content

What's hot

“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...Edge AI and Vision Alliance
 
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...CSCJournals
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingPriyanka Wagh
 
Sample Paper Techscribe
Sample  Paper TechscribeSample  Paper Techscribe
Sample Paper Techscribeguest533af374
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphologicalNaresh Chilamakuri
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesIAEME Publication
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Vocabulary length experiments for binary image classification using bov approach
Vocabulary length experiments for binary image classification using bov approachVocabulary length experiments for binary image classification using bov approach
Vocabulary length experiments for binary image classification using bov approachsipij
 
Depth preserving warping for stereo image retargeting
Depth preserving warping for stereo image retargetingDepth preserving warping for stereo image retargeting
Depth preserving warping for stereo image retargetingLogicMindtech Nologies
 
Visual Object Category Recognition
Visual Object Category RecognitionVisual Object Category Recognition
Visual Object Category RecognitionAshish Gupta
 
Shadow Detection and Removal for Traffic Surveillance System
Shadow Detection and Removal for Traffic Surveillance SystemShadow Detection and Removal for Traffic Surveillance System
Shadow Detection and Removal for Traffic Surveillance Systemijtsrd
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Pythonijtsrd
 

What's hot (18)

Cl4301502506
Cl4301502506Cl4301502506
Cl4301502506
 
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
“Person Re-Identification and Tracking at the Edge: Challenges and Techniques...
 
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
 
Multimedia searching
Multimedia searchingMultimedia searching
Multimedia searching
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with Smoothing
 
K018137073
K018137073K018137073
K018137073
 
Sample Paper Techscribe
Sample  Paper TechscribeSample  Paper Techscribe
Sample Paper Techscribe
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Vocabulary length experiments for binary image classification using bov approach
Vocabulary length experiments for binary image classification using bov approachVocabulary length experiments for binary image classification using bov approach
Vocabulary length experiments for binary image classification using bov approach
 
Depth preserving warping for stereo image retargeting
Depth preserving warping for stereo image retargetingDepth preserving warping for stereo image retargeting
Depth preserving warping for stereo image retargeting
 
Visual Object Category Recognition
Visual Object Category RecognitionVisual Object Category Recognition
Visual Object Category Recognition
 
Shadow Detection and Removal for Traffic Surveillance System
Shadow Detection and Removal for Traffic Surveillance SystemShadow Detection and Removal for Traffic Surveillance System
Shadow Detection and Removal for Traffic Surveillance System
 
Text Extraction from Image using Python
Text Extraction from Image using PythonText Extraction from Image using Python
Text Extraction from Image using Python
 

Viewers also liked

Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecurityCSCJournals
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107IJRAT
 
Research paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyResearch paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyAkshay Shelake
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 

Viewers also liked (8)

Survey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information SecuritySurvey Paper: Cryptography Is The Science Of Information Security
Survey Paper: Cryptography Is The Science Of Information Security
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
Research paper of quantum computer in cryptography
Research paper of quantum computer in cryptographyResearch paper of quantum computer in cryptography
Research paper of quantum computer in cryptography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research

A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes AmAl C
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Imagesiosrjce
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1patisa
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYcscpconf
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...iosrjce
 
A Comparative Study of Different Models on Image Colorization using Deep Lear...
A Comparative Study of Different Models on Image Colorization using Deep Lear...A Comparative Study of Different Models on Image Colorization using Deep Lear...
A Comparative Study of Different Models on Image Colorization using Deep Lear...IRJET Journal
 
A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalcsandit
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALcscpconf
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 

Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
J017335863
J017335863J017335863
J017335863
 
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital ImagesPassive Image Forensic Method to Detect Resampling Forgery in Digital Images
Passive Image Forensic Method to Detect Resampling Forgery in Digital Images
 
F017374752
F017374752F017374752
F017374752
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
B017640811
B017640811B017640811
B017640811
 
A Comparative Study of Different Models on Image Colorization using Deep Lear...
A Comparative Study of Different Models on Image Colorization using Deep Lear...A Comparative Study of Different Models on Image Colorization using Deep Lear...
A Comparative Study of Different Models on Image Colorization using Deep Lear...
 
A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrieval
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 STUDY OF COLOR VISUAL CRYPTOGRAPHY ASMITA KAPSEPATIL, APEKSHA CHAVAN Pillai’s Institute of Information Technology, New Panvel, India 410206 Abstract: This paper shows the study on the concept of color visual cryptography. This paper includes study of color visual cryptography which involves visual information pixel (VIP) synchronization and error diffusion technique applicable for color visual cryptography. VIP carries visual information of original image and VIP synchronization helps to keep the same position of pixels throughout the color channels. Error diffusion generates shares which are clear and visible to human eyes and it improves the visibility of shares. With the help of these two concepts it results in visual quality improvement of images. It also includes a brief description of color model used for the process color visual cryptography. Keywords: error diffusion, visual cryptography, visual information pixel, visual information pixel synchronization Introduction Visual cryptography, is an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that hackers cannot perceive any clues about a secret image from individual cover images. There have been many published studies of visual cryptography. Most of them, however, have concentrated on discussing black-and-white images, and just few of them have proposed methods for processing gray-level and color images. Based on previous study in binary image and grey level images this analyzed concept gives a better visual cryptography method for color images and it provides pleasant feel of shares and high visual quality to human eye using Visual Information Pixel and Error Diffusion Technique. Visual Cryptography for Color Images In visual cryptography the secret information that is an image is split into shares such that the decryption can be performed by the human visual system by simply superimposing the shares. No computations are involved in the reconstruction of images. This section provides an overview on a color visual cryptography which is simple and good. This method involves C, M, Y subtractive color model in which the color is represented by applying the combinations of colored lights reflected from the surface of an object because most of the objects do not radiate by them [1]. Fig 1. Subtractive color model [1] This proposed method includes the concept of visual pixel information synchronization and error diffusion. Error Diffusion: This is simple but efficient method for image halftone generation. The quantization error is filtered and fed to future inputs. The error filter is designed in a way that the low frequency differences between the input and output images are minimized and it produces pleasing halftone images to human vision. VIP synchronization: Synchronization of the visual information pixel across the color channels improves visual contrast of shares. In color VC schemes the colors of encrypted pixels and the contrast can be degraded due to random matrix permutation. Random matrix permutations are key security features in VC schemes [3]. In gray scale VC schemes it does not affect the visual schemes however in color schemes, independent execution of random matrix permutation for each color channel can cause color distortion by placing VIPs at random positions in sub pixels which finally degrades the visual quality. VIP synchronization prevents the color and contrast of original images from degradation even with matrix permutations. In this concept it derives basis matrices from the given set of matrices which is used in standard VCS. Issn 2250-3005(online) August| 2012 Page 1047
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 4 VIP pixels include the color information of original image which helps in making encrypted shares meaningful. In this process a set of basis matrices Scc1,c2,,cn (c,c1,c2,,,cn € {0,1}) is generated where c is a pixel bit of message and c1,,,,cn indicates the corresponding pixel bits from the shares. In each row of S cc1, c2, cn there are q number of VIPs which are denoted as ci and the values are defined by halftone process. The actual bit values of ci are defined by referring the pixel values of original shares which are not known at the matrix derivation stage and then errors are diffused away. In this analyzed method each pixel carries visual information as well as message information [3], while other method used needs extra pixels in addition to the pixel expansion to produce meaningful shares. Since each VIP is placed at the same position in sub pixels across three color channels, VIP represents accurate colors of original image. In this method ω (Sc[i]) is a hamming weight of ‘OR’ -ed row vector up to ith rows in Scc1, c2, cn. This row vector should not contain any ci as elements. Since the values of ci are undefined, it can be represented as 0 or 1 in the halftone stage which ensures the placement of ci at the same position in each row of Sc [3]. Thus each encrypted sub pixel has the same VIP positions across three channels which mean that these sub pixels carry accurate visual information of the original image and this result in high visual quality in encrypted shares. EXAMPLE FOR ANALYZED METHOD Fig. 2 Secret Image [2] Fig. 4 Shares of original image [2] Fig. 5 Reconstruction of shares [2] Conclusion Review of this proposed method provides a study on a better visual cryptography for color images and it provides pleasant feel with high visual quality. References 1. Young Chang Hou,2003,vol 36,pp 1619-1629 2. Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli ,”Progressive Color Visual Cryptography ” , JEI,2004 3. InKoo Kang, Gonzalo R Arce, Heung Kyu Lee, “Color Extended Visual Cryptography using Error Diffusion” , 2009 Issn 2250-3005(online) August| 2012 Page 1048