Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications

  • P. GeethaEmail author
  • V. S. Jayanthi
  • A. N. Jayanthi


In the modern years, multimedia security has become a prime agenda for secure transmission over unsecured channels due to the increase in digitalization of media. Cryptography is one of the techniques, which can be used for security of exchanged data. The visual cryptographic scheme generates numerous unreasonable shares of the image with specific information. The secret information hidden in the image can be retrieved by accumulating all the shares. The basic idea behind this cryptographic scheme is the encryption of image which hides the secret into m several image shares. By this process, it turns to be complex for the hackers to retrieve the original data of the image. Furthermore, to increase the confidentiality and privacy of the original image, there is in demand to make use of the efficient encryption algorithm. According to this, a new image encryption and decryption is developed using diffusion method with a combination of chaotic maps. Overall, the proposed visual cryptographic method is divided into three phases namely, i) Separation of color bands, ii) Generation of several shares and iii) Encryption & Decryption. Firstly, the color image is divided into three bands (R, G and B) and then various shares of the image are generated based on the pixel measures. After that, the encryption and decryption are done by using diffusion process associated with chaotic map. Experimental results of various analysis and computer simulation confirm that the new algorithm offers high security and is suitable for practical image encryption.


Multimedia Visual cryptography Peak signal noise ratio Mean square error Correlation coefficient Logistic map Diffusion encryption and decryption 



  1. 1.
    Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106MathSciNetCrossRefGoogle Scholar
  2. 2.
    Ateniese G, Blundo C, Santis AD, Stinson DR Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161Google Scholar
  3. 3.
    Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud University-Computer and Information SciencesGoogle Scholar
  4. 4.
    Barik RC, Changder S, Sahu SS (2017) Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. Computational Intelligence in Data Mining, Springer, Singapore, pp 449–458Google Scholar
  5. 5.
    Chang C, Tsai C, Chen T (2000) A new scheme for sharing secret color images in computer network. International Conference on Parallel and Distributed Systems, pp. 21–27Google Scholar
  6. 6.
    Chang C-C, Yu T-X (2002) Sharing a secret gray image in multiple images. Proceedings of the First International Symposium on Cyber Worlds (CW.02)Google Scholar
  7. 7.
    Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. International Conference on EngineeringGoogle Scholar
  8. 8.
    Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. J Opt Commun 14(8):552–560Google Scholar
  9. 9.
    Chen L, Zhao D (2009) Color image encoding in dual fractional Fourier-wavelet domain with random phases. J Opt Commun 282:3433–3438CrossRefGoogle Scholar
  10. 10.
    Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647–658CrossRefGoogle Scholar
  11. 11.
    Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, MHS 1995, pp. 39–43. IEEE, New YorkGoogle Scholar
  12. 12.
    Fang W, Lin J (2006) Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis 16(4):632–636CrossRefGoogle Scholar
  13. 13.
    Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Secur 78:pp.301–320Google Scholar
  14. 14.
    Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. Journal of Information Security and Applications 35:119–127CrossRefGoogle Scholar
  15. 15.
    Hou YC, Wei SC, Lin CY (2014) Random-grid-based visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 24(5):733–744CrossRefGoogle Scholar
  16. 16.
    Kalai Selvi R, Kavitha V (2012) Crypto System based Authentication using CSTA in Grid. Int J Comput Appl 48(22)Google Scholar
  17. 17.
    Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended Visual Cryptography for Color Images Using Coding Tables. International Conference on Communication, Information & Computing Technology (ICCICT), pp. 19–20Google Scholar
  18. 18.
    Khoirom MS, Laiphrakpam DS, Themrichon T (2018) Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik 168:370–375CrossRefGoogle Scholar
  19. 19.
    Kumar S, Kumar M, Budhiraja R, Das MK, Singh S (2018) A cryptographic model for better information security. Journal of Information Security and Applications 43:123–138CrossRefGoogle Scholar
  20. 20.
    Liu Z, Dai J, Sun X, Liu S (2010) Color image encryption by using the rotation of color vector in Hartley transform domains. Journal on Optical Lasers 48(5)Google Scholar
  21. 21.
    Liu S, Fujiyoshi M, Kiya H (2011) A Leakage Suppressed Two-level Security Visual Secret Sharing Scheme, Journal on Intelligent Signal Processing and Communication Systems (ISPACS), pp. 7–9Google Scholar
  22. 22.
    Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik’s cube principle. J Electr Comput Eng:1–14Google Scholar
  23. 23.
    Lukac R, Plataniotis KN (2004) Colour image secret sharing. IEEE Electronics Letters 40(9)Google Scholar
  24. 24.
    Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf Optimizer. Adv Eng Softw 69:46–61CrossRefGoogle Scholar
  25. 25.
    Mohanty M, Gehrmann C, Atrey PK (2014) Avoiding Weak Parameters in Secret Image Sharing. IEEEGoogle Scholar
  26. 26.
    Naor M, Shamir A (1995) Visual cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1–12Google Scholar
  27. 27.
    Nautiyal I, Sharma M (2014) Encryption using elliptic curve cryptography using java as implementation tool. J Adv Res Comput Sci Softw Eng 4(1):620–625Google Scholar
  28. 28.
    Padma B, Chandravathi D, Prapoorna Roja P (2010) Encoding and decoding of a message in the Implementation of elliptic curve cryptography using Koblitz’s method. Int J Comput Sci Eng 2(5):1904–1907Google Scholar
  29. 29.
    Pandey LN, Shukla N (2013) Visual Cryptography Schemes using Compressed Random Shares. Journal of Advance Research in Computer Science and Management Studies 1(4):62–66Google Scholar
  30. 30.
    Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudo-random permutation substitution scheme for image encryption. Opt Commun 284:4331–4339CrossRefGoogle Scholar
  31. 31.
    Popescu C (2011) A secure e-cash transfer system based on the elliptic curve discrete logarithm problem. Journal on Informatica 3(22):395–409MathSciNetzbMATHGoogle Scholar
  32. 32.
    Rijmen V, Preneel B (1996) Efficient color visual encryption for shared colors of Benetton, Eurocrypto’96. Rump Session, BerlinGoogle Scholar
  33. 33.
    Roy PK, Mandal D (2013) Oppositional biogeography-based optimization for optimal power flow. Int J Electr Power Energy Syst 53:123–134CrossRefGoogle Scholar
  34. 34.
    Roy PK, Paul C, Sultana S (2014) Oppositional teaching learning based optimization approach for combined heat and power dispatch. Int J Electr Power Energy Syst 57:392–403CrossRefGoogle Scholar
  35. 35.
    Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21CrossRefGoogle Scholar
  36. 36.
    Singh P, Raman B, Misra M (2017) A (n, n) Threshold Non-expansible XOR based Visual Cryptography with Unique Meaningful Shares. Signal ProcessingGoogle Scholar
  37. 37.
    Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image Encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137–140Google Scholar
  38. 38.
    Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137–140Google Scholar
  39. 39.
    Srinivas M, Patnaik LM (1994) Genetic algorithms: a survey. Computer (Long Beach Calif) 27(17–26)Google Scholar
  40. 40.
    Sujatha K, Shalini Punithavathani D (2018). Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks. Multimed Tools Appl 77(2):1735–1759Google Scholar
  41. 41.
    Sundararaj V, (2016) An Efficient Threshold Prediction Scheme for Wavelet Based ECG Signal Noise Reduction Using Variable Step Size Firefly Algorithm. International Journal of Intelligent Engineering and Systems 9(3):117–126Google Scholar
  42. 42.
    Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288Google Scholar
  43. 43.
    Vinu Sundararaj, (2019) Optimal task assignment in mobile cloud computing by queue based Ant-Bee algorithm. Wireless Personal Communications 104(1):173–197Google Scholar
  44. 44.
    Tao R, Xiang-Yi M, Wang Y (2010) Image encryption with multi orders of fractional Fourier transforms. IEEE Trans Inf Forensics Security 5:734–738Google Scholar
  45. 45.
    Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34MathSciNetCrossRefGoogle Scholar
  46. 46.
  47. 47.
    Vinod Kumar Y, Malviya AK, Gupta DL, Satyendra S, Ganesh C (2012) Public key cryptosystem Technique for elliptic curve cryptography with generator g for image encryption. Int J Comput Appl 3(3):298–302Google Scholar
  48. 48.
    Wang S, Gu K, Ma S, Lin W, Liu X, Gao W Guided image contrast enhancement based on retrieved images in cloud. IEEE Transactions on Multimedia 18(2):219–232Google Scholar
  49. 49.
    Wu X, Ou D, Dai L, Sun W (2013) XOR-based meaningful visual secret sharing by generalized random grids. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia SecurityGoogle Scholar
  50. 50.
    Yang X-S (2010b) A new metaheuristic bat-inspired algorithm. In: González JR, Pelta DA, Cruz C, Terrazas G, Krasnogor N (eds) Nature inspired cooperative strategies for optimization (NICSO 2010). Springer Berlin Heidelberg, Berlin, pp 65–74CrossRefGoogle Scholar
  51. 51.
    Yi K, Leihong Z, Dawei Z (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64CrossRefGoogle Scholar
  52. 52.
    You X, Li Q, Tao D et al (2014) Local metric learning for exemplar-based object detection. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1265–1276CrossRefGoogle Scholar
  53. 53.
    Youmaran R, Adler A, Miri A (2006) An Improved Visual Cryptography Scheme For Secret Hiding. J Commun:340–343Google Scholar
  54. 54.
    Zhu Z et al (2015) An adaptive hybrid pattern for noise-robust texture analysis. Pattern Recogn 48(8):2592–2608CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Electronics and Communication Engineering DepartmentHindusthan College of Engineering and TechnologyCoimbatoreIndia
  2. 2.Electronics and Communication Engineering DepartmentRajagiri School of Engineering and TechnologyCochinIndia
  3. 3.Electronics and Communication Engineering DepartmentSri Ramakrishna Institute of TechnologyCoimbatoreIndia

Personalised recommendations