Skip to main content

An Approach for Visual Cryptography Scheme on Color Images

  • Conference paper
  • First Online:
Advances in Electronics, Communication and Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 443))

  • The original version of this chapter was revised: Two co authors are included them as potential first and second author respectively along with the affiliation. The correction to this chapter is available at https://doi.org/10.1007/978-981-10-4765-7_84

Abstract

Visual cryptography, a popular and simple technique uses the characteristics of human vision to decrypt encrypted images. It requires no computation for decryption from the user end. This paper emphasizes on basic cryptographic scheme proposed by Naor and Shamir with changed shares. Here, we focus on different shares with different combination of CMY color scheme to check whether proper encryption has taken place. Different combinations of shares were employed and the contrast reduction for decrypted images was 50% for some of the combinations which were also achieved earlier. Most of these studies, however, concentrated on binary images but very few on grayscale and color images. In this paper, a technique is presented to apply the visual cryptography scheme on colored images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Change history

  • 26 August 2020

    The original version of the chapter was inadvertently published without two authors and their affiliation in the chapter opening page, which have now been included. The correction chapter has been updated with the change.

    Pooja Kashyap, Binita Rai,

    Sikkim Manipal Institute of Technology, Sikkim Manipal University, Majitar, Sikkim, India

References

  1. Adhikari, A., Sikdar, S.: A new (2, n)—visual threshold scheme for color images. In: Proceedings of the Indocrypt 2003. LNCS, vol. 2904, pp. 148–161. Springer (2005)

    Google Scholar 

  2. Mursi, M.F.M., Salama, M., Mansour, M.: Visual cryptography schemes: a comprehensive survey. Int. J. Emerg. Res. Manage. Technol. 3(11) (2014). ISSN: 2278-9359

    Google Scholar 

  3. Naor, M., Shamir, A.: A visual cryptography. In proceedings of Advances in cryptology, EUROCRYPT 94. Lecture Notes in Computer Science (1994)

    Google Scholar 

  4. Bhagate, S.B., Kulkarni, P.J.: An overview of various visual cryptography schemes. Int. J. Adv. Res. Comput. Commun. Eng. 2(9) (2012)

    Google Scholar 

  5. Hou, Y.C.: Visual cryptography for color images, Department of information Management. National Central University, Jung Li, Taiwan 320, ROC (Received 6 June 2002, accepted 26 Aug 2002)

    Google Scholar 

  6. Jena, P.C., Das, N.K.: A survey on visual cryptography using image encryption and decryption. Int. J. Emerg. Technol. Adv. Eng. 2008 Certified J, 3(8) (2013)

    Google Scholar 

  7. Hou, Y.C., Quan, Z.Y., Liao, H.Y.: New design for friendly visual cryptography. Int. J. Inform. Electron. Eng. 5(1) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Kalyan Kar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kashyap, P., Rai, B., Kar, C., Kar, S.K., Banerjee, S. (2018). An Approach for Visual Cryptography Scheme on Color Images. In: Kalam, A., Das, S., Sharma, K. (eds) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, vol 443. Springer, Singapore. https://doi.org/10.1007/978-981-10-4765-7_53

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4765-7_53

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4764-0

  • Online ISBN: 978-981-10-4765-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics