Skip to main content

Optimal Thresholding in Direct Binary Search Visual Cryptography for Enhanced Bank Locker System

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 906))

  • 859 Accesses

Abstract

Visual cryptography (VC) is one of the strongest cryptographic method present. The main advantage of this system is that the decryption doesnot need any specific requirements for decoding other than human eyes. Using halftoning techniques binary images are obtained for grayscale and color images, this technique is applied in Halftone VC. In this paper, direct binary search (DBS) is implemented and initial images are modified for better quality of recovered images. The concept is proposed for bank locker systems. Comparison has been made using parameters like PSNR, Correlation, UQI and SSIM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naor, M., & Shamir, A. (1994). Visual cryptography. In Proceeding EUROCRYPT (pp. 1–12).

    Google Scholar 

  2. Thomas, S. A., & Gharge, S. (2017). Review on various visual cryptography schemes. In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) (pp. 1164–1167). Mysore.

    Google Scholar 

  3. Blundo, C., DArco, P., De Santis, A., & Stinson, D. R. (2003). Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics, 16, 224–261.

    Google Scholar 

  4. Ateniese, G., Blundo, C., Santis, A. D., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.

    Google Scholar 

  5. Blundo, C., Santis, A. D., & Naor, M. (2000). Visual cryptography for grey level images. Information Processing Letters, 75, 255–259.

    Article  MathSciNet  Google Scholar 

  6. Hou, Y. C. (2003). Visual cryptography for color images. Pattern Recognition, 36, 1619–1629.

    Article  Google Scholar 

  7. Ateniese, G., Blundo, C., Santis, A., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250, 143–161.

    Article  MathSciNet  Google Scholar 

  8. Zhou, Z., Arce, G. R., & Crescenzo, G. D. (2006). Halftone visual cryptography. IEEE Transactions on Image Processing, 18, 2441–2453.

    Article  Google Scholar 

  9. Thomas, S. A., & Gharge, S. (2018). Halftone visual cryptography for grayscale images using error diffusion and direct binary search, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1091–1096). Tirunelveli, India.

    Google Scholar 

  10. Kang, I., Arce, G. R., & Lee, H.-K. (2011). Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing, 20.

    Google Scholar 

  11. Wang, Z. M., Arce, G. R., & Di Crescenzo, G. (2006). Halftone visual cryptography via direct binary search. EUSIPCO.

    Google Scholar 

  12. Otsu, N. (1979). A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 9(1), 62–66.

    Article  Google Scholar 

  13. Thomas, S. A., & Gharge, S. (2018). Enhanced security for military grid reference system using visual cryptography, in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1–7). Bangalore.

    Google Scholar 

  14. Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE Signal Processing Letters, 9.

    Google Scholar 

  15. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandhya Anne Thomas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thomas, S.A., Gharge, S. (2019). Optimal Thresholding in Direct Binary Search Visual Cryptography for Enhanced Bank Locker System. In: Shetty, N., Patnaik, L., Nagaraj, H., Hamsavath, P., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-13-6001-5_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6001-5_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6000-8

  • Online ISBN: 978-981-13-6001-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics