Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

  • 1141 Accesses

Abstract

Image encryption is one of the most promising fields of research in the conventional scientific society. Visual cryptography is a secured encryption technique which is used to encrypt a secret image based on share generation and superimposition rather than computing. This overcomes the burden of computation but the mammoth risk of attackers is superfluous to the passing of shares in sequence through the communication channel. However, this superimposing problem can be resolved by cracking some additional encryption algorithms alongside the visual cryptography. In this paper, we propose a highly secured visual cryptography scheme which uses encryption and error diffusion halftoning algorithms as intermediate steps in cryptography work. We have also done the comparative analysis in order to select the most optimum technique, among the available algorithms according to the requirement of the system. The proposed work has been tested on various formats of standard color images of varied resolutions and proven more secured than contemporary techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M. and Shamir, A., 1995. Visual cryptography. In Advances in Cryptology—EUROCRYPT’94 (pp. 1–12). Springer Berlin/Heidelberg.

    Google Scholar 

  2. Naor, M. and Shamir, A., 1996, April. Visual cryptography II: Improving the contrast via the cover base. In Security protocols (pp. 197–202). Springer Berlin Heidelberg.

    Google Scholar 

  3. Lin, S.J. and Lin, J.C., 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition, 40(12), pp. 3652–3666.

    Google Scholar 

  4. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R., 1996. Visual cryptography for general access structures. Information and Computation, 129(2), pp. 86–106.

    Google Scholar 

  5. Blundo, C., De Santis, A. and Naor, M., 2000. Visual cryptography for grey level images. Information Processing Letters, 75(6), pp. 255–259.

    Google Scholar 

  6. Leung, B.W., Ng, F.Y. and Wong, D.S., 2009. On the security of a visual cryptography scheme for color images. Pattern Recognition, 42(5), pp. 929–940.

    Google Scholar 

  7. Hsu, C.S. and Tu, S.F., 2008. Digital watermarking scheme with visual cryptography. IMECS, Hong Kong (March 2008).

    Google Scholar 

  8. Jena, D. and Jena, S.K., 2009, January. A Novel Visual Cryptography Scheme. In Advanced Computer Control, 2009. ICACC’09. International Conference on (pp. 207–211). IEEE.

    Google Scholar 

  9. Kandar, S. and Dhara, B.C., 2011. kn Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence. IJCA (0975–8887) Volume.

    Google Scholar 

  10. Hou, Y.C., 2003. Visual cryptography for color images. Pattern Recognition, 36(7), pp. 1619–1629.

    Google Scholar 

  11. Bani, Y., Majhi, D.B. and Mangrulkar, R.S., 2008. A Novel Approach for Visual Cryptography Using a Watermarking Technique. In Proceedings of 2nd National Conference, IndiaCom (pp. 08–09).

    Google Scholar 

  12. Fang, L. and Yu, B., 2006, August. Research on pixel expansion of (2, n) visual threshold scheme. In Pervasive Computing and Applications, 2006 1st International Symposium on (pp. 856–860). IEEE.

    Google Scholar 

  13. Chang, C.C., Hwang, M.S. and Chen, T.S., 2001. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), pp. 83–91.

    Google Scholar 

  14. Han, Y., Dong, H., He, W. and Liu, J., 2012, November. A verifiable visual cryptography scheme based on XOR algorithm. In Communication Technology (ICCT), 2012 IEEE 14th International Conference on (pp. 673–677). IEEE.

    Google Scholar 

  15. Tan, X.Q., 2009, May. Two kinds of ideal contrast visual cryptography schemes. In 2009 International Conference on Signal Processing Systems (pp. 450–453). IEEE.

    Google Scholar 

  16. Chandramathi, S., Ramesh Kumar, R., Suresh, R. and Harish, S., 2010. An overview of visual cryptography. International Journal of Computational Intelligence Techniques, ISSN, pp. 0976–0466.

    Google Scholar 

  17. Yan, W.Q., Jin, D. and Kankanhalli, M.S., 2004, May. Visual cryptography for print and scan applications. In Circuits and Systems, 2004. ISCAS’04. Proceedings of the 2004 International Symposium on (Vol. 5, pp. V-572). IEEE.

    Google Scholar 

  18. Kaur, K. and Khemchandani, V., 2013, February. Securing Visual Cryptographic shares using Public Key Encryption. In Advance Computing Conference (IACC), 2013 IEEE 3rd International (pp. 1108–1113). IEEE.

    Google Scholar 

  19. Desiha, M. and Kaliappan, V.K., 2015, January. Enhanced efficient halftoning technique used in embedded extended visual cryptography strategy for effective processing. In Computer Communication and Informatics (ICCCI), 2015 International Conference on (pp. 1–5). IEEE.

    Google Scholar 

  20. Pub NF. 197: Advanced Encryption Standard (AES), Federal Information ProcessingStandards Publication 197, US Department of Commerce/NIST, November 26, 2001. Available from the NIST website.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prachi Khokhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Khokhar, P., Jena, D. (2017). Color Image Visual Cryptography Scheme with Enhanced Security. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics