Multiple Images Defending Process by Leaning Techniques

  • Yerininti Venkata NarayanaEmail author
  • Atmakuri Prashant
  • Dalli Varun Prasad
  • Chitturi Satya Pavan Kumar
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)


Providing security to data in the form of text is cryptography, but visual cryptography provides defense for visual images. In this, we intended a mechanism to encipher an image into different levels, i.e., intensity variation, pixel swapping, steganography, and randomization, which seizes network as a means to attain the actual receiver who does the retrieval procedure in reverse order. Different methods are developed, namely intensity variation on each and every pixel of an image and color pixel value swapping within an image, calculating the pixel intensity values and embedding them using steganography, and randomization process. Instead of using external images for manipulation, it provides a better encryption process. Multiple images can be used, which is a good parameter of the proposed procedure. Hence, multiple images can be transformed at a time and more security can be achieved by this proposed method.


Enormous Retain Treatment Imbricated Decree Arbitrarily Gloom 


  1. 1.
    Gnanaguruparan, M., Kak, S.: Recursive hiding of secrets in visual cryptography. Cryptologia 26, 68–76 (2002)CrossRefGoogle Scholar
  2. 2.
    Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr. 11(2), 179–196 (1997)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Anitha, R., Sasirekha, N.: Image securing mechanism by gradient techniques. Int. J. Comput. Eng. Appl. VIII(I), 55–64 (2014)Google Scholar
  5. 5.
    Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT ”94. Lecture Notes in Computer ScienceGoogle Scholar
  6. 6.
    Koppu, S., Madhu Viswanatham, V.: A survey on security issues: digital images. Int. J. Pharm. Technol. 8(2),13420–13427 (2016) Google Scholar
  7. 7.
    Addin Ahmed Salem Al-Maweri, N.: State-of-the-art in techniques of text digital watermarking: challenges and limitations. Int. J. Comput. Sci. 12(2) (2016)Google Scholar
  8. 8.
    Liu, F.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)CrossRefGoogle Scholar
  9. 9.
    Yu, J., Li, F., Cheng, H., Zhang, X.: Spatial steganalysis using contrast of residuals. IEEE Signal Process. Lett. 23(7), 989–992 (2016)CrossRefGoogle Scholar
  10. 10.
    Sah, H.R., Gunasekaran, G.: Privacy preserving data mining using image slicing and visual cryptography. In: IEEE Transactions, pp. 1–7 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Yerininti Venkata Narayana
    • 1
    Email author
  • Atmakuri Prashant
    • 1
  • Dalli Varun Prasad
    • 1
  • Chitturi Satya Pavan Kumar
    • 2
  1. 1.Department of Computer Science & EngineeringDVR & Dr. HS MIC College of TechnologyKrishna DistrictIndia
  2. 2.SCOPEVIT UniversityVelloreIndia

Personalised recommendations