Abstract
Visual cryptography is a method offering a plan which uses pictures circulated as shares in such a way that when the shares are stacked, a sensitive or secrete image is uncovered. According to extended visual cryptography, the offer pictures are built to hold the scattered images together, simultaneously opening a way to assist biometric security and visual cryptography methods. In this paper, we entail a proposal for halftone pictures that beautify the nature of the shares to come about from secrete image and to regain the secret picture in an extended visual cryptography plan for which the figure size of the secret pictures and the reconstructed picture by stacking shares is similar with respect to the first halftone secret picture. The ensuing plan upholds the ideal security of the first developed visual cryptography approach. This process includes 2 × 2 block replacement for generating shares from secrete image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: EUROCRYPT’94 Proceedings, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995)
Ross, A., Othman, A.A.: Visual Cryptography for Biometric Privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)
Askari, N., Moloney, C., Heys, H.M.: A Novel Visual Secret Sharing Scheme Without Image Size Expansion. In: IEEE Canadian Conference on Electrical and ComputerEngineering (CCECE), Montreal, pp. 1–4 (2012)
Hwang, K.F., Chang, C.C.: Recent Development of Visual Cryptography, Intelligent Watermarking Techniques, pp. 459–480. World Scientific Publishing Company (2004)
Stinson, D.: Visual cryptography and threshold schemes. Dr. Dobb’s J. 36–43 (1998)
BorkoFurht, EdinMuharemagic, Socek, Daniel: Visual and Audio Secret Sharing, pp. 163–192. Multimedia Encryption and Watermarking, Springer (2005)
Zhou, Z., Arce, G.R., Crescenzo, G.Di.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 8 (2006)
Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Joint Screening Halftoning and VisualCryptography for Image Protection. LNCS 4283, pp. 212–225. Springer, Berlin (2006)
Walden, D.E.: A Benchmarking Assessment of Known Visual Cryptography algorithms. B.S.M.E. Thesis, Chester F. Carlson Center for Imaging Science Rochester Institute of Technology, Valparaiso University, New York, 16 May 2012
Horng, G., Chen, T., Tasi, D.S.: Cheating in Visual Cryptography, Designs, Codes and Cryptography, pp. 219–236 (2006)
Shih, F.Y.: Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, Taylor & Francis Group (2008)
Yang, C.-N., Yang, Y.-Y., Chen, T.-S., Ye, G.-C.: New steganography scheme in halftone images. In: Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1520–1523 (2008)
S., Cimato, De Santis, A., Ferrara, A.L., Masucci, B.: Ideal contrast visual cryptography schemes with reversing. Information Processing Letters 93(4), 199–206 (2005)
Noar, N., Shamir, A.: Visual cryptography. In: Advances in Cryptology: Eurocrypt’94, pp. 1–12. Spring, Berlin, Germany (1995)
Lin, C.-C., Tsai, W.-H.: Viaual Cryptography for Gray-Level Images the 13th IPPR Conference on Computer Vision, Graphic and Image processing, pp. 221–226 (2000)
Ateniese, Giuseppe, Blundo, Carlo, De Santis, Alfredo, Stinson, Douglas R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)
Naor, M., Shamir, A.:Visual cryptography. In: Proceedings of Advances in Cryptology, EUROCRYPT 94, Lecture Notes in ComputerScience, vol. 950, p. 112 (1995)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250, 143–161 (2001)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2451 (2006)
Nakajima, M., Yamaguchi, Y.: Extended visual cryptography for natural images. In: Proceedings of WSCG, pp. 303–310 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Ashish Sharma, Srivastava, D.K. (2016). K-N Secrete Sharing Scheme of Visual Cryptography for Hiding Image Using 2 × 2 Blocks Replacement. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_58
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_58
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)