scholarly journals RC4 Technique in Visual Cryptography RGB Image Encryption

Author(s):  
Andysah Putera Utama Siahaan
2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

In this study, we are doing a cryptography scheme which can modify the visualization of pictures. The image protection is very critical. It does not alter the value of the header and the metadata. We are just trying to modify the color intensities. Every image consists of three color layers. There are red, green and blue (RGB). Each layer has numbers which represent the intensity. RC4 is used to change the color intensity in every layer. The encryption process it to manipulate the integer number and produce the encrypted value. We determine how many layers are going to be encrypted. The fuzziness of the encrypted image depends on how many layers are included. The visualization will be unrecognized after the encryption. It changes to a noisy picture. This method makes the image content secure and undetected.


2021 ◽  
Vol 26 (1) ◽  
pp. 135-142
Author(s):  
Kanusu Srinivasa Rao ◽  
Mandapati Sridhar

The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information and decrypts secret using mechanical operations without any computation, but each share need pixel expansion. In the current work, we propose an Image encryption technique using (n, n) Visual cryptography based on simple operations without pixel expansion. The proposed novel technique gives an image encryption using visual cryptography based on Least significant bit (LSB) technique in spatial domain and parity mechanism using Exclusive-OR(XOR) operation. developed for encrypting grey scale image. Image encryption and decryption uses simple Boolean operations. The technique provides better quality of shares and recovers without any loss.


2020 ◽  
Vol 113 (2) ◽  
pp. 1201-1224 ◽  
Author(s):  
Tariq Shah ◽  
Asif Ali ◽  
Majid Khan ◽  
Ghazanfar Farooq ◽  
Antonio Aparecido de Andrade

2019 ◽  
Vol 8 (4) ◽  
pp. 2797-2800

visual cryptography system proposed a image encryption and decryption method. In the proposed method Red, Green, Blue color images using visual cryptography. In existing system is working for share created, it is encrypted separately by using visual secret share creation (VSS) algorithms. The proposed work is original images share1 and ahare2 created XOR-Based visual cryptography. This proposed schemes share1 encryption and share2 encryption included in RSA algorithm. The share1 and ahare2 decryption process is enable secret image sharing and then stacking. The proposed system is value calculate the PSNR and MSE formula and then image security using NPCR and UACI formula. The visual cryptography existing work to compare the proposed work and better results quality of RGB color images. The color image encryption and decryption using RSA algorithm and matlab coding.


2018 ◽  
Vol 78 (8) ◽  
pp. 10227-10263 ◽  
Author(s):  
Manish Kumar ◽  
R. N. Mohapatra ◽  
Sajal Agarwal ◽  
G. Sathish ◽  
S. N. Raw

2022 ◽  
Author(s):  
Han Yu ◽  
Yong Li ◽  
Junhao Zhang ◽  
Dongyu Yang ◽  
Tianhao Ruan ◽  
...  

Abstract Non-mechanical ptychographic encoding (NPE) transforms the secret information into a series of diffractive patterns through a spatial light modulator, saving the need to fabricate the secret objects. Conventionally, the shares in extended visual cryptography (EVC) are printed on transparent sheets or fabricated with diffractive optical elements and metasurface, but these methods are expensive and disposable. To solve these problems, we proposed an optical image encryption scheme that combines EVC and NPE. In the encryption process, the secret image is decomposed into multiple shares that are digitally loaded on the spatial light modulator, and the ciphertexts are generated according to the ptychographic encoding scheme. The decryption is performed by superimposing the shares reconstructed from the ciphertexts. We present optical experiments to demonstrate the feasibility and effectiveness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document