A secret sharing scheme for secure transmission of color images

Author(s):  
Hirdesh Kumar ◽  
Awadhesh Srivastava
Author(s):  
ASHWATHIMESANGLA AO

Visual cryptography is a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as Visual Cryptography Scheme (VCS). In this paper secret image is divided into shares (printed on transparencies), and each share holds some information. At the receiver this shares are merged to obtain the secret information which is revealed without any complex computation. The proposed algorithm is for color host image, divided into three color planes Red, Green, Blue and merged with secret image which is binarized and divided into shares. The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image.


2021 ◽  
Vol 22 (4) ◽  
pp. 803-810
Author(s):  
John Blesswin A. John Blesswin A. ◽  
Selva Mary G. John Blesswin A. ◽  
Manoj Kumar S. Selva Mary G.


2011 ◽  
Vol 55 (5) ◽  
pp. 1151-1161 ◽  
Author(s):  
Lin Dong ◽  
DaoShun Wang ◽  
ShunDong Li ◽  
YiQi Dai

Author(s):  
Rastislav Lukac ◽  
Konstantinos N. Plataniotis ◽  
Anastasios N. Venetsanopoulos

2019 ◽  
Vol 6 (1) ◽  
pp. 18-42
Author(s):  
Ram Chandra Barik ◽  
Suvamoy Changder ◽  
Sitanshu Sekhar Sahu

Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing scheme among N number of participants with pixel expansion. Later on, many researchers extended the visual secret sharing scheme with no expansion of pixel regions in binary and color images. By stacking k shares the secret can be decoded using normal vision. In this paper the authors have proposed a modification towards visual cryptography by converting the message in the form of printable ASCII character-based numerical encoding patterns in a binary host image. The encoding of the message is represented as ASCII numeric and a texture of those numeric are arranged to form a binary host image. Then, N numbers of shares are built up but after stacking all the shares the decoding of the message is achieved by converting ASCII numeric to the secret.


Sign in / Sign up

Export Citation Format

Share Document