SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1603
Visual Cryptography using Image Thresholding
Daisy Das
M.tech, Computer Science and Engineering, GIMT, Assam, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper proposes a novel visual cryptographic
algorithm using image thresholding. The technique used
simple image thresholding to generateakeylessschemewitha
minimal computationalload. Theapproachcreatestwoshares
of images from the original secret image. The shares are
produced by thresholding the secret image such that the
individual share do not reveal any information about the
secret image. Most visual cryptography algorithms result in a
wrong reconstruction of original image restricting the use of
the scheme. In this method, the original imagecould beformed
by Oring the pixel value of the shares with the threshold value
without any loss of information or image quality. At such the
secrecy, accuracy and confidentiality of the secret image is
maintained while sharing over a medium.
Key Words: Visual cryptography; shares; keyless; image;
computational complexity, accuracy; secrecy;
thresholding; algorithm
1.INTRODUCTION
With an exponential increase in technology, the internet has
become a prominent medium for sharing of multimedia
information over the network. Many cryptographic methods
have been developed in the recent past for sharing of secret
information over the network. This gave dimensiontoa new
cryptographic technique known as visual cryptography.
Visual cryptography was first introduced in 1994 by Naor
and Shamir [1]. The visual information encrypted using
Visual cryptography can bedecodedusinga standardhuman
visual system, without the aid of computers by a layman.
Visual cryptography scheme does not require complex
computation in decryption process, and overlapping
operation can regenerate the secret images. It does not need
any particular cryptographic knowledge toimplement.Most
of the technique concentrates on binary images; however
few of them proposed methods forprocessinggray-level and
color images[2]. The methods used for color images have a
poor reconstruction of an original image with quality and
information loss of the recovered image.
This paper describes a technique of visual cryptography
using image thresholding. Two shares are generated in this
scheme from the original secret image by thresholding the
secret image with some defined threshold value. One share
contains the image information for which pixel value is less
than the threshold value, and theotherprovidesinformation
for which pixel value is greater than the thresholdvalue.The
original image is obtained by Oring the pixel value of the
shares depending on the threshold value. This method is a
keyless technique and implies no loss of pixel information
from the original reconstructed image with less
computational complexity. In this paper global threshold is
used however adaptive and local threshold can also be
applied according to users choice.
2. LITERATURE REVIEW
2.1 Thresholding
Thresholding is replacing each pixel with black if the pixel
intensity value of the image is less than some fixed constant
T , or a white pixel if the image intensity value isgreaterthan
that constant. Colour images can also be thresholded by
thresholding each RGB component separately. Automatic
thresholding requires the computer to select the threshold
automatically. Sezgin and Sankur categorize thresholding
methods into the following six groups based on the
information the algorithm manipulates[9]
Histogram shape-histogram based method analyzed the
peak-valley and curvature of the histogram.
Clustering-based thresholding clusters image into two
groups as background and foreground.
Entropy-based methods use algorithmstofindthedegree of
randomness of foreground and background pixels and
separate them accordingly.
Object Attribute-based methods measure the similarity
between background and foreground using algorithms of
fuzzy shape similarity, edge coincidence, etc. to group the
image into separate background and foreground image.
Spatial methods uses higher-order probability distribution
algorithms and or measures the correlation between pixels
Local methods find threshold of each image pixel based on
local area thresholding of the image using pixel connectivity
between pixels.The thresholding values may differ
depending on the intensity values of pixels locally.
2.2 Visual Cryptography
Visual cryptography is splitting an image into n shares such
that no individual share gives any information of the image
only when a subset of the shares is stacked on another it
reveals the secret image. Table I provides a comparisonofsix
such techniques[3].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1604
Sr. No. Num
ber
of
Secr
et
Ima
ges
Pixe
l
Exp
ansi
on
Image
Form
at
Type of
Share
generated
1. Naor and
Shamir [1]
1 4 Binary Random
2. Wu and
Chen [4]
2 4 Binary Random
3. Chin-
Chen
Chang et
al [5]
1 4 Binary Meaningful
4. Liguo
Fang et al
[6]
1 2 Binary Random
5. S. J. Shyu
et al [7]
n(n>
=2)
2n Binary Random
6. W. P. Fang
[8]
2 9 Binary Random
3.PROPOSED METHOD
The proposed method uses visual cryptography with
image thresholding property to provide accuracy, secrecy,
and confidentiality of the secret image. Hereinthisalgorithm
global thresholding with predefined imagethresholdvalueis
used.However one can also use adaptive or local threshold
method according to requirement. An RGB image consists of
the red, green and blue pixel plane. In the encryption phase,
the schemeseparatesall the three planesand threshold each
plane on a predefined thresholdvalue.Eachshareconveysno
information of the original image. While decrypting it, the
original image planes are reconstructed by bitwise Oring the
pixel value of these shares. Finally, the RGB planes are
overlapped to form the original image. The method is used
for color image and also could be used for gray scale image.
The reconstructed image has no information loss and
correctly recover the original image with minimal
computational cost without any key management.
3.1 The algorithm
The proposed method involves four steps:
 Step 1 : Separation of an image into its constituent
red, blue , green planes.
 Step 2 : Shares generation of each plane accordingto
the predefined threshold value.
 Step 3 : Overlapping the two shares of each plane to
reconstruct the planes.
 Step 4 : Finally the three planes are stacked to form
the original secret image.
In step 1 the secret image is divided into its constituent RGB
plane. In additive model or RGB model the image in made up
of different RED, GREEN, and BLUE plane stack over each
other to define a particular intensity value.The value of each
plane range between 0-255.
In step 2 the threshold value is determined, and each
separate RGB plane of the colored image is a limit based on
this threshold value. Hence one share contains image
information having pixel values greater than the threshold
value and the other includes image data having pixel values
less than the threshold value. In total, the three RGB planes
have two shares each resulting in 6 shares.
In step 3 the shares obtained in step 2 are overlapped by
Oring the value of pixel information depending on the pixel
value from the two shares to a third image reconstructing
the desired RGB plane. This step is repeated for each RGB
plane restoring the three planes.
In step 4 the RGB planes obtained in step 3 are joined to
form the required color image.
Algorithm ( )
{
Red plane = Image(Redvalue(0-255))
Green plane = Image(Greenvalue(0-255))
Blue plane = Image(Bluevalue(0-255))
Th=threshold value
For each Red,Green,Blue Plane
{
For every pixel i=0 to n
{
If(pixel value<th)
{
Share 1=pixel value
}
Else
{
Share2 =pixel value
}
}
For every pixel i=0 to n
{
If(pixel value<th)
{
Reconstructed Image value=share1 OR
share2
}
}
3.2 Implementation details
The algorithm was implemented using Matlab on
Windows XP where two functions encrypt and decrypt were
used. encrypt encrypts the image by creating the two shares
by comparing it with the threshold value. decrypt decrypts
the image by Oring the shares pixel value with the defined
threshold value into the third image reconstructing the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1605
original image. This functions works for color images and
can be extended to gray scale images as well. In our
proposed technique the cost incurred for encryption and
decryption are less since the majority operations are
comparison and OR operations. In the proposed scheme
there are no keys involved, and hence there is no key
management.
4. EXPERIMENTAL RESULTS
4.1 Color Image
The method was implemented on a color image with the
threshold value (th=231) in Matlab showed in Table 2. The
two shares of the picture formed are share1 and share2
shown in column 3 and column 4 respectively. The
original image and resultant image which is reconstructed
after overlapping the three planes are shown in column 1
and column 6 respectively. Column 5 represents the
reconstructed planes after overlapping both share1 and
share2.
Table 2 Algorithm implementation for Colored Image
Original
image
plane
Share
1>th
Share
2<th
overlapped
Plane
Recovered
Image
Red
Green
Blue
5. RESULTS AND DISCUSSIONS
The method gives a replica of the original image without any
loss of information. The results were validated using
Normalized Correlation (NC)[3]. NC is used to calculate the
correlation between both the encoded and decoded image
NC=∑w
i=1 ∑h
j=1(Sij ⊕Rij)/w × h
S represents the secret image and R the recovered image.
w, h represents the width/height of the photographs and
represents the exclusive OR operator. The algorithm was
repeated for a test over multiple images, the NC for all the
recovered images was 1.000. Table 3 gives a detailed feature
set of our algorithm
Table 3: Feature set of the algorithm
Features Thresholdin
g
Noise
Correlation
Always
1.00
Image
transparenc
y Delivery
Depends on
threshold
value
Additional
Data
Structure
no
Key
Managemen
t
no
Pixel
expansion
no
3. CONCLUSIONS
In this paper, a novel hybrid Visual Cryptography
technique with image thresholding is presented.Itisahybrid
approach of the conventional Visual Cryptographic Scheme
and the traditional image encryption schemes together with
image thresholding method. A secret colored image is split
into its constituent RGB planes, and two shares from each
plane are generated, one share image has pixel value greater
than a predefined threshold, and another shared image has
pixel value lesser than the specified threshold, and with
minimum calculation, the original secret image can be
reconstructed. The proposed algorithm has the following
advantages (a) There is noinformationlosswhentheoriginal
image is restored back. (b) The storage requirement is same
as the original image as the exact original image is replicated
(c) It is a keyless encryption method (d) It can counter
attacks such as guessing, bruteforceattacksandshouldering.
(e) The sametechnique can be extended to grayscaleimages.
(f) The individual shares reveal no information about the
secret image thus can be sent via an unsecured network. The
proposed scheme is suited for entity authentication based
application where authenticationcanbedonebyoverlapping
the shares over one another to reveal the secret information.
If the hidden image matches the originalimage,thenaccessis
granted else denied
REFERENCES
[1]Moni Naor and Adi Shamir, "Visual Cryptography,"
Advances in cryptology– Eurocrypt, pp 1-12,1995.
[2] Y. C. Hou, “Visual cryptography for color images,”
Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
[3] Ms. Moushmee Kuri, Dr. Tanuja Sarode,"RKOTechnique
for Color Visual Cryptography," in : IOSR Journal of
ComputerEngineering(IOSR-JCE)e-ISSN:2278-0661,p-
ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr.
2014), PP 89-93
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1606
[4] C.C. Wu, L.H. Chen, "A Study On Visual Cryptography,"
Master Thesis, Institute of Computer and
[5] Chin-Chen Chang, Jun-ChouChuang,Pei-YuLin,"Sharing
A Secret Two-Tone Image In Two Gray-Level
[6] Liguo Fang, BinYu, “Research On Pixel Expansion Of
(2,n) Visual Threshold Scheme”, 1st International
[7] S. J. Shyu, S. Y. Huanga, Y. K. Lee, R. Z. Wang, and K. Chen,
"Sharing multiple secrets in visual
[8] Wen-Pinn Fang, “Visual Cryptography In Reversible
Style," IEEE Proceeding on the Third International
Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIHMSP2007),Kaohsiung,
Taiwan, R.O.C, 2007.
[9] Mehmet Sezgin and Bulent Sankur, Survey over image
thresholding techniques and quantitative performance
evaluation, Journal of Electronic Imaging 13(1), 146–165
(January 2004).

More Related Content

What's hot

Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging SystemVrushali Lanjewar
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operationsmukesh bhardwaj
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationiaemedu
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd Iaetsd
 
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsAnalysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsTELKOMNIKA JOURNAL
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicIRJET Journal
 
Stereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detectionStereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detectionTELKOMNIKA JOURNAL
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...sipij
 
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueQuality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueIJEEE
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...IRJET Journal
 
histogram equalization of grayscale and color image
histogram equalization of grayscale and color imagehistogram equalization of grayscale and color image
histogram equalization of grayscale and color imageSaeed Ullah
 

What's hot (20)

Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
1.arithmetic & logical operations
1.arithmetic & logical operations1.arithmetic & logical operations
1.arithmetic & logical operations
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsAnalysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
 
F42022628
F42022628F42022628
F42022628
 
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy LogicImproved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
Improved Weighted Least Square Filter Based Pan Sharpening using Fuzzy Logic
 
Stereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detectionStereo matching based on absolute differences for multiple objects detection
Stereo matching based on absolute differences for multiple objects detection
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
 
Oc2423022305
Oc2423022305Oc2423022305
Oc2423022305
 
Quality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion TechniqueQuality Assessment of Gray and Color Images through Image Fusion Technique
Quality Assessment of Gray and Color Images through Image Fusion Technique
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
A Simple Approach to Watermarking of Multiple Grayscale Images using Alpha Bl...
 
histogram equalization of grayscale and color image
histogram equalization of grayscale and color imagehistogram equalization of grayscale and color image
histogram equalization of grayscale and color image
 
Ijnsa050207
Ijnsa050207Ijnsa050207
Ijnsa050207
 
T01022103108
T01022103108T01022103108
T01022103108
 

Similar to Visual Cryptography using Image Thresholding

IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET Journal
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET Journal
 
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET-  	  Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET-  	  Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET Journal
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...IRJET Journal
 
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...eSAT Journals
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET Journal
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
A Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and TechniquesA Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and TechniquesIRJET Journal
 
Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...IRJET Journal
 

Similar to Visual Cryptography using Image Thresholding (20)

IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET-  	  Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET-  	  Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsLossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
Lossless Encryption using BITPLANE and EDGEMAP Crypt Algorithms
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...Use of horizontal and vertical edge processing technique to improve number pl...
Use of horizontal and vertical edge processing technique to improve number pl...
 
I07015261
I07015261I07015261
I07015261
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
A Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and TechniquesA Survey on Image Retrieval By Different Features and Techniques
A Survey on Image Retrieval By Different Features and Techniques
 
Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...Performance evaluation of Compressed images by using Gradient based optimizat...
Performance evaluation of Compressed images by using Gradient based optimizat...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Visual Cryptography using Image Thresholding

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1603 Visual Cryptography using Image Thresholding Daisy Das M.tech, Computer Science and Engineering, GIMT, Assam, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper proposes a novel visual cryptographic algorithm using image thresholding. The technique used simple image thresholding to generateakeylessschemewitha minimal computationalload. Theapproachcreatestwoshares of images from the original secret image. The shares are produced by thresholding the secret image such that the individual share do not reveal any information about the secret image. Most visual cryptography algorithms result in a wrong reconstruction of original image restricting the use of the scheme. In this method, the original imagecould beformed by Oring the pixel value of the shares with the threshold value without any loss of information or image quality. At such the secrecy, accuracy and confidentiality of the secret image is maintained while sharing over a medium. Key Words: Visual cryptography; shares; keyless; image; computational complexity, accuracy; secrecy; thresholding; algorithm 1.INTRODUCTION With an exponential increase in technology, the internet has become a prominent medium for sharing of multimedia information over the network. Many cryptographic methods have been developed in the recent past for sharing of secret information over the network. This gave dimensiontoa new cryptographic technique known as visual cryptography. Visual cryptography was first introduced in 1994 by Naor and Shamir [1]. The visual information encrypted using Visual cryptography can bedecodedusinga standardhuman visual system, without the aid of computers by a layman. Visual cryptography scheme does not require complex computation in decryption process, and overlapping operation can regenerate the secret images. It does not need any particular cryptographic knowledge toimplement.Most of the technique concentrates on binary images; however few of them proposed methods forprocessinggray-level and color images[2]. The methods used for color images have a poor reconstruction of an original image with quality and information loss of the recovered image. This paper describes a technique of visual cryptography using image thresholding. Two shares are generated in this scheme from the original secret image by thresholding the secret image with some defined threshold value. One share contains the image information for which pixel value is less than the threshold value, and theotherprovidesinformation for which pixel value is greater than the thresholdvalue.The original image is obtained by Oring the pixel value of the shares depending on the threshold value. This method is a keyless technique and implies no loss of pixel information from the original reconstructed image with less computational complexity. In this paper global threshold is used however adaptive and local threshold can also be applied according to users choice. 2. LITERATURE REVIEW 2.1 Thresholding Thresholding is replacing each pixel with black if the pixel intensity value of the image is less than some fixed constant T , or a white pixel if the image intensity value isgreaterthan that constant. Colour images can also be thresholded by thresholding each RGB component separately. Automatic thresholding requires the computer to select the threshold automatically. Sezgin and Sankur categorize thresholding methods into the following six groups based on the information the algorithm manipulates[9] Histogram shape-histogram based method analyzed the peak-valley and curvature of the histogram. Clustering-based thresholding clusters image into two groups as background and foreground. Entropy-based methods use algorithmstofindthedegree of randomness of foreground and background pixels and separate them accordingly. Object Attribute-based methods measure the similarity between background and foreground using algorithms of fuzzy shape similarity, edge coincidence, etc. to group the image into separate background and foreground image. Spatial methods uses higher-order probability distribution algorithms and or measures the correlation between pixels Local methods find threshold of each image pixel based on local area thresholding of the image using pixel connectivity between pixels.The thresholding values may differ depending on the intensity values of pixels locally. 2.2 Visual Cryptography Visual cryptography is splitting an image into n shares such that no individual share gives any information of the image only when a subset of the shares is stacked on another it reveals the secret image. Table I provides a comparisonofsix such techniques[3].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1604 Sr. No. Num ber of Secr et Ima ges Pixe l Exp ansi on Image Form at Type of Share generated 1. Naor and Shamir [1] 1 4 Binary Random 2. Wu and Chen [4] 2 4 Binary Random 3. Chin- Chen Chang et al [5] 1 4 Binary Meaningful 4. Liguo Fang et al [6] 1 2 Binary Random 5. S. J. Shyu et al [7] n(n> =2) 2n Binary Random 6. W. P. Fang [8] 2 9 Binary Random 3.PROPOSED METHOD The proposed method uses visual cryptography with image thresholding property to provide accuracy, secrecy, and confidentiality of the secret image. Hereinthisalgorithm global thresholding with predefined imagethresholdvalueis used.However one can also use adaptive or local threshold method according to requirement. An RGB image consists of the red, green and blue pixel plane. In the encryption phase, the schemeseparatesall the three planesand threshold each plane on a predefined thresholdvalue.Eachshareconveysno information of the original image. While decrypting it, the original image planes are reconstructed by bitwise Oring the pixel value of these shares. Finally, the RGB planes are overlapped to form the original image. The method is used for color image and also could be used for gray scale image. The reconstructed image has no information loss and correctly recover the original image with minimal computational cost without any key management. 3.1 The algorithm The proposed method involves four steps:  Step 1 : Separation of an image into its constituent red, blue , green planes.  Step 2 : Shares generation of each plane accordingto the predefined threshold value.  Step 3 : Overlapping the two shares of each plane to reconstruct the planes.  Step 4 : Finally the three planes are stacked to form the original secret image. In step 1 the secret image is divided into its constituent RGB plane. In additive model or RGB model the image in made up of different RED, GREEN, and BLUE plane stack over each other to define a particular intensity value.The value of each plane range between 0-255. In step 2 the threshold value is determined, and each separate RGB plane of the colored image is a limit based on this threshold value. Hence one share contains image information having pixel values greater than the threshold value and the other includes image data having pixel values less than the threshold value. In total, the three RGB planes have two shares each resulting in 6 shares. In step 3 the shares obtained in step 2 are overlapped by Oring the value of pixel information depending on the pixel value from the two shares to a third image reconstructing the desired RGB plane. This step is repeated for each RGB plane restoring the three planes. In step 4 the RGB planes obtained in step 3 are joined to form the required color image. Algorithm ( ) { Red plane = Image(Redvalue(0-255)) Green plane = Image(Greenvalue(0-255)) Blue plane = Image(Bluevalue(0-255)) Th=threshold value For each Red,Green,Blue Plane { For every pixel i=0 to n { If(pixel value<th) { Share 1=pixel value } Else { Share2 =pixel value } } For every pixel i=0 to n { If(pixel value<th) { Reconstructed Image value=share1 OR share2 } } 3.2 Implementation details The algorithm was implemented using Matlab on Windows XP where two functions encrypt and decrypt were used. encrypt encrypts the image by creating the two shares by comparing it with the threshold value. decrypt decrypts the image by Oring the shares pixel value with the defined threshold value into the third image reconstructing the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1605 original image. This functions works for color images and can be extended to gray scale images as well. In our proposed technique the cost incurred for encryption and decryption are less since the majority operations are comparison and OR operations. In the proposed scheme there are no keys involved, and hence there is no key management. 4. EXPERIMENTAL RESULTS 4.1 Color Image The method was implemented on a color image with the threshold value (th=231) in Matlab showed in Table 2. The two shares of the picture formed are share1 and share2 shown in column 3 and column 4 respectively. The original image and resultant image which is reconstructed after overlapping the three planes are shown in column 1 and column 6 respectively. Column 5 represents the reconstructed planes after overlapping both share1 and share2. Table 2 Algorithm implementation for Colored Image Original image plane Share 1>th Share 2<th overlapped Plane Recovered Image Red Green Blue 5. RESULTS AND DISCUSSIONS The method gives a replica of the original image without any loss of information. The results were validated using Normalized Correlation (NC)[3]. NC is used to calculate the correlation between both the encoded and decoded image NC=∑w i=1 ∑h j=1(Sij ⊕Rij)/w × h S represents the secret image and R the recovered image. w, h represents the width/height of the photographs and represents the exclusive OR operator. The algorithm was repeated for a test over multiple images, the NC for all the recovered images was 1.000. Table 3 gives a detailed feature set of our algorithm Table 3: Feature set of the algorithm Features Thresholdin g Noise Correlation Always 1.00 Image transparenc y Delivery Depends on threshold value Additional Data Structure no Key Managemen t no Pixel expansion no 3. CONCLUSIONS In this paper, a novel hybrid Visual Cryptography technique with image thresholding is presented.Itisahybrid approach of the conventional Visual Cryptographic Scheme and the traditional image encryption schemes together with image thresholding method. A secret colored image is split into its constituent RGB planes, and two shares from each plane are generated, one share image has pixel value greater than a predefined threshold, and another shared image has pixel value lesser than the specified threshold, and with minimum calculation, the original secret image can be reconstructed. The proposed algorithm has the following advantages (a) There is noinformationlosswhentheoriginal image is restored back. (b) The storage requirement is same as the original image as the exact original image is replicated (c) It is a keyless encryption method (d) It can counter attacks such as guessing, bruteforceattacksandshouldering. (e) The sametechnique can be extended to grayscaleimages. (f) The individual shares reveal no information about the secret image thus can be sent via an unsecured network. The proposed scheme is suited for entity authentication based application where authenticationcanbedonebyoverlapping the shares over one another to reveal the secret information. If the hidden image matches the originalimage,thenaccessis granted else denied REFERENCES [1]Moni Naor and Adi Shamir, "Visual Cryptography," Advances in cryptology– Eurocrypt, pp 1-12,1995. [2] Y. C. Hou, “Visual cryptography for color images,” Pattern Recognition, vol. 36, pp. 1619-1629, 2003. [3] Ms. Moushmee Kuri, Dr. Tanuja Sarode,"RKOTechnique for Color Visual Cryptography," in : IOSR Journal of ComputerEngineering(IOSR-JCE)e-ISSN:2278-0661,p- ISSN: 2278-8727Volume 16, Issue 2, Ver. X (Mar-Apr. 2014), PP 89-93
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1606 [4] C.C. Wu, L.H. Chen, "A Study On Visual Cryptography," Master Thesis, Institute of Computer and [5] Chin-Chen Chang, Jun-ChouChuang,Pei-YuLin,"Sharing A Secret Two-Tone Image In Two Gray-Level [6] Liguo Fang, BinYu, “Research On Pixel Expansion Of (2,n) Visual Threshold Scheme”, 1st International [7] S. J. Shyu, S. Y. Huanga, Y. K. Lee, R. Z. Wang, and K. Chen, "Sharing multiple secrets in visual [8] Wen-Pinn Fang, “Visual Cryptography In Reversible Style," IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007),Kaohsiung, Taiwan, R.O.C, 2007. [9] Mehmet Sezgin and Bulent Sankur, Survey over image thresholding techniques and quantitative performance evaluation, Journal of Electronic Imaging 13(1), 146–165 (January 2004).