SlideShare a Scribd company logo
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
INTERNATIONAL JOURNAL OF ELECTRONICS AND 
17 – 19, July 2014, Mysore, Karnataka, India 
COMMUNICATION ENGINEERING  TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 8, August (2014), pp. 194-199 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
www.jifactor.com 
194 
 
IJECET 
© I A E M E 
A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR 
MAINTAINING THE SECURITY OF VISUAL INFORMATION 
TRANSACTION 
Akshatha M M#1 Lokesh B#2 Nuthan A C#3 
#1Student, Dept. of ECE, SIT Mangalore 
#2Dept. of EEE, SIT Mangalore 
#3Research Scholar, Jain University 
ABSTRACT 
As the growth in the technology increases maintaining the security of visual information 
during its transaction has to be increased. Rapid growth in the techniques for doing so is also 
increasing. Internet has become most commonly used media for communication and hence text, 
voice, video, Images and many more are transmitted through Internet. These might include Military 
Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by 
safer means with enhanced security. In the process of Visual Cryptography a secret image is 
encrypted into shares which refuse to divulge information about the original secret image. In this 
paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to 
reduce the degradation of the resultant image is proposed by an extension from gray to color image. 
Pixel Index Method is discussed to improve the security for images. 
Keywords: Security, Visual Information, Visual Cryptography. 
I. INTRODUCTION 
Cryptography refers to the study of mathematical techniques and related aspects of 
information security like data confidentiality, data integrity and of data authentication. In the process 
of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information 
about the original secret image. Decryption is through a separate decryption algorithm. A basic 
model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the 
resultant image is twice the size of secret image. 
As the advent of electronic applications increases, providing the security for information in 
an open network environment is required. Encryption is a method of transforming original data,
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
called plain text or clear text into a form that appears to be random and unreadable which is called 
Cipher text. Plain text is either in the form that can be understood by a person (document) or by a 
computer (executable code). 
195 
 
Once it is transformed into Cipher text, neither human nor machine can properly process it 
until it is decrypted. This enables the transmission of confidential information over insecure channels 
without unauthorized disclosure. When data is stored on a computer it is protected by logical and 
physical access controls. When this same sensitive information is sent over a network, the 
information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual 
Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They 
proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares 
[3], revealing the secret image through Share Stacking. 
Fig. 1: Example of Visual Cryptography 
In figure 1 a secret image that has to be sent is divided into shares. When these two shares are 
stacked together and put into a Human Visual System the resultant image is revealed. In the visual 
secret sharing model [1], a secret picture must be shared among n participants. The picture is divided 
into n shares so that if m transparencies (shares) are placed together the picture is visible. When there 
are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of 
black and white pixels with each pixel being handled separately. 
II. RELATED WORK 
2.1 Basic (2, 2) Scheme 
The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an 
image from a share is impossible. Each share is printed in transparency. A share is a random noise. 
Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. 
The figure shows how a pixel in a image in divided into two sub pixels depending on whether the 
pixel is black or white. By doing so the width of the share increases. This is termed as Pixel 
Expansion.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
196 
 
Fig. 2: A (2,2) Visual Cryptography Scheme 
2.2 Pseudo Randomized Visual Cryptography Scheme 
Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random 
technique [10]. Each pixel is being handled separately. The input is a secret image and the output is 
the shares. Here there is no pixel expansion. The decoded image and the original secret image are of 
the same sizes. But the secret image which is decoded had a darker resolution than the original 
image. Preprocessing technique was used to overcome this problem [6]. 
Fig. 3: Pseudo Random Scheme 
III. PROPOSED WORK 
In this paper, the problem of pixel expansion is eliminated and also a method is proposed for 
color image usage and thus the degradation of the resultant image is reduced. Chaotic random 
number generation technique is used to provide much more security. Pixel index reversal is applied 
where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase 
the scrambling and thus there will be increase in the security. The secret image can be revealed by a 
decryption algorithm. A secret image is first split into R G B component and then the security 
techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB 
components. Each component is handled separately. Each pixel is decomposed using Bit Plane
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This 
result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered 
and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the 
Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the 
Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 
197 
 
Fig. 4: Block Diagram of the Cryptographic Technique 
3.1 Simulations and Results 
The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the 
gray image. 
Fig. 5: Results for gray image as input
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
198 
 
Fig. 6: Results for Color Image as input 
Fig. 7: Results for Color Image after applying the Security Methods 
Fig. 8: Complete Encrypted Result 
3.2 Comparison of the Algorithms 
Table. 1: Comparison of Algorithms 
Algorithm Pixel Security Quality 
Naor, 
Double Increase Poor 
Shamir 
(k, n) 
scheme 
Double Increase Poor 
Existing 
Method 
No 
Expansion 
Increase Increase 
Proposed 
Work 
No 
Expansion 
Increase Color 
Image 
In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was 
expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant 
image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the 
concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna 
Babu and team the problem of pixel expansion was eliminated and pixel reversal method was 
suggested [10]. The security also increased because of Chaotic Randomization. In the proposed 
technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The 
security increases due to Scan Pattern method and Chaotic Randomization. This technique is also 
applicable for color images and so the quality increases.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
199 
IV. CONCLUSION AND FUTURE WORK 
 
The security increases as the scrambling is more. The time consumption is also in terms of 
Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel 
expansion is also eliminated. Future work can include the application of this technique for bit map 
images. Some techniques can be made to improve the quality of resultant image and also to reduce 
the power consumption. 
V. REFERENCES 
1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, 
Massachusetts Institute of Technology, 1979. 
2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 
9–12, LNCS 950, Springer Verlag, 1994, 1–12. 
3. “What are Visual Secret Sharing Schemes”, General concept. 
4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual 
Cryptography for general access structure”, ICALP'96, Italy, 1996. 
5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 
1998, http://www.cl.cam.ac.uk/~fms27/vck/. 
6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, 
IEEE Transaction on image processing, vol.15, no.8, 2006. 
7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast 
visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 
8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 
9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. 
Theory of Cryptography Library, (96-07), 1996. 
10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray 
Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual 
Information Security”, IEEE, 2013. 
BIOGRAPHY 
Akshatha M M 
Completed her BE under Visvesvaraiah Technological University, Belgaum in 
Electronics and Communication Engineering. She completed her M. Tech degree, 
under the same university in VLSI and Embedded Systems. At present she is 
working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. 
Lokesh B 
Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, 
Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. 
Nuthan A C 
Completed his BE in Electronics and Communication Engineering and M. Tech in Digital 
Electronics under Visvesvaraiah Technological University. At present he is working as Assistant 
Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a 
research scholar under Jain University, Bangalore.

More Related Content

What's hot

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
AM Publications,India
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
Kaur2013
Kaur2013Kaur2013
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
Dr. Amarjeet Singh
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
IJET - International Journal of Engineering and Techniques
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
IRJET Journal
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
IJERA Editor
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
IRJET Journal
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
eSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 

What's hot (20)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
IRJET- GSVD Algorithm for Image Encryption
IRJET-  	  GSVD Algorithm for Image EncryptionIRJET-  	  GSVD Algorithm for Image Encryption
IRJET- GSVD Algorithm for Image Encryption
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 

Viewers also liked

LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
Bhagwat Singh Rathore
 
LDPC
LDPCLDPC
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
Kavi
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
Bhagwat Singh Rathore
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
Sahar Foroughi
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

Viewers also liked (7)

LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
LDPC
LDPCLDPC
LDPC
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 

Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction

IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
F42022628
F42022628F42022628
F42022628
IJERA Editor
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
IJERA Editor
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
IRJET Journal
 
R04405103106
R04405103106R04405103106
R04405103106
IJERA Editor
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
Editor IJMTER
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
IAEME Publication
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
inventionjournals
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 

Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction (20)

IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
F42022628
F42022628F42022628
F42022628
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
R04405103106
R04405103106R04405103106
R04405103106
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 

A novel technique of visual cryptography for maintaining the security of visual information transaction

  • 1. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 INTERNATIONAL JOURNAL OF ELECTRONICS AND 17 – 19, July 2014, Mysore, Karnataka, India COMMUNICATION ENGINEERING TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 8, August (2014), pp. 194-199 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com 194 IJECET © I A E M E A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR MAINTAINING THE SECURITY OF VISUAL INFORMATION TRANSACTION Akshatha M M#1 Lokesh B#2 Nuthan A C#3 #1Student, Dept. of ECE, SIT Mangalore #2Dept. of EEE, SIT Mangalore #3Research Scholar, Jain University ABSTRACT As the growth in the technology increases maintaining the security of visual information during its transaction has to be increased. Rapid growth in the techniques for doing so is also increasing. Internet has become most commonly used media for communication and hence text, voice, video, Images and many more are transmitted through Internet. These might include Military Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by safer means with enhanced security. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. In this paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to reduce the degradation of the resultant image is proposed by an extension from gray to color image. Pixel Index Method is discussed to improve the security for images. Keywords: Security, Visual Information, Visual Cryptography. I. INTRODUCTION Cryptography refers to the study of mathematical techniques and related aspects of information security like data confidentiality, data integrity and of data authentication. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. Decryption is through a separate decryption algorithm. A basic model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the resultant image is twice the size of secret image. As the advent of electronic applications increases, providing the security for information in an open network environment is required. Encryption is a method of transforming original data,
  • 2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India called plain text or clear text into a form that appears to be random and unreadable which is called Cipher text. Plain text is either in the form that can be understood by a person (document) or by a computer (executable code). 195 Once it is transformed into Cipher text, neither human nor machine can properly process it until it is decrypted. This enables the transmission of confidential information over insecure channels without unauthorized disclosure. When data is stored on a computer it is protected by logical and physical access controls. When this same sensitive information is sent over a network, the information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares [3], revealing the secret image through Share Stacking. Fig. 1: Example of Visual Cryptography In figure 1 a secret image that has to be sent is divided into shares. When these two shares are stacked together and put into a Human Visual System the resultant image is revealed. In the visual secret sharing model [1], a secret picture must be shared among n participants. The picture is divided into n shares so that if m transparencies (shares) are placed together the picture is visible. When there are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of black and white pixels with each pixel being handled separately. II. RELATED WORK 2.1 Basic (2, 2) Scheme The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an image from a share is impossible. Each share is printed in transparency. A share is a random noise. Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. The figure shows how a pixel in a image in divided into two sub pixels depending on whether the pixel is black or white. By doing so the width of the share increases. This is termed as Pixel Expansion.
  • 3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 196 Fig. 2: A (2,2) Visual Cryptography Scheme 2.2 Pseudo Randomized Visual Cryptography Scheme Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random technique [10]. Each pixel is being handled separately. The input is a secret image and the output is the shares. Here there is no pixel expansion. The decoded image and the original secret image are of the same sizes. But the secret image which is decoded had a darker resolution than the original image. Preprocessing technique was used to overcome this problem [6]. Fig. 3: Pseudo Random Scheme III. PROPOSED WORK In this paper, the problem of pixel expansion is eliminated and also a method is proposed for color image usage and thus the degradation of the resultant image is reduced. Chaotic random number generation technique is used to provide much more security. Pixel index reversal is applied where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase the scrambling and thus there will be increase in the security. The secret image can be revealed by a decryption algorithm. A secret image is first split into R G B component and then the security techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB components. Each component is handled separately. Each pixel is decomposed using Bit Plane
  • 4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 197 Fig. 4: Block Diagram of the Cryptographic Technique 3.1 Simulations and Results The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the gray image. Fig. 5: Results for gray image as input
  • 5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 198 Fig. 6: Results for Color Image as input Fig. 7: Results for Color Image after applying the Security Methods Fig. 8: Complete Encrypted Result 3.2 Comparison of the Algorithms Table. 1: Comparison of Algorithms Algorithm Pixel Security Quality Naor, Double Increase Poor Shamir (k, n) scheme Double Increase Poor Existing Method No Expansion Increase Increase Proposed Work No Expansion Increase Color Image In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna Babu and team the problem of pixel expansion was eliminated and pixel reversal method was suggested [10]. The security also increased because of Chaotic Randomization. In the proposed technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The security increases due to Scan Pattern method and Chaotic Randomization. This technique is also applicable for color images and so the quality increases.
  • 6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 199 IV. CONCLUSION AND FUTURE WORK The security increases as the scrambling is more. The time consumption is also in terms of Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel expansion is also eliminated. Future work can include the application of this technique for bit map images. Some techniques can be made to improve the quality of resultant image and also to reduce the power consumption. V. REFERENCES 1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, Massachusetts Institute of Technology, 1979. 2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 9–12, LNCS 950, Springer Verlag, 1994, 1–12. 3. “What are Visual Secret Sharing Schemes”, General concept. 4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual Cryptography for general access structure”, ICALP'96, Italy, 1996. 5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 1998, http://www.cl.cam.ac.uk/~fms27/vck/. 6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, IEEE Transaction on image processing, vol.15, no.8, 2006. 7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. Theory of Cryptography Library, (96-07), 1996. 10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual Information Security”, IEEE, 2013. BIOGRAPHY Akshatha M M Completed her BE under Visvesvaraiah Technological University, Belgaum in Electronics and Communication Engineering. She completed her M. Tech degree, under the same university in VLSI and Embedded Systems. At present she is working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. Lokesh B Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. Nuthan A C Completed his BE in Electronics and Communication Engineering and M. Tech in Digital Electronics under Visvesvaraiah Technological University. At present he is working as Assistant Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a research scholar under Jain University, Bangalore.