Skip to main content

A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems

  • Conference paper
  • First Online:
  • 1409 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Abstract

Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Arumugam, L.R.S.: Construction of a (k, n)-visual cryptography scheme. Int. J. Des. Codes Cryptogr. 82, 629–645 (2017)

    Article  MathSciNet  Google Scholar 

  2. Chauhan, M.G.D.: A visual cryptographic scheme to secure image shares using digital watermarking. Int. J. Comput. Sci. Inf. Technol. 6, 4339–4343 (2015)

    Google Scholar 

  3. Chettri, L.: Visual cryptography scheme based on pixel expansion for black & white image. Int. J. Comput. Sci. Inf. Tech. (IJCSIT) 5(3), 4190–4193 (2014)

    Google Scholar 

  4. Deepa, G.: The comparative study on visual cryptography and random grid cryptography. IOSR J. Comput. Eng. (IOSR-JCE) 12(2), 4–14 (2013)

    Article  MathSciNet  Google Scholar 

  5. Kiran, T., Devi, K.R.: A review on visual cryptography schemes. J. Glob. Res. Comput. Sci. 3(6), 96–100 (2012)

    Google Scholar 

  6. Kumar, M., Singh, R.: A (2, n) and (3, n) visual cryptography scheme for black and white images. Int. J. Sci. Res. (IJSR) 3(3), 574–577 (2014)

    Google Scholar 

  7. Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 129–133. IEEE (2011)

    Google Scholar 

  8. Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)

    Article  Google Scholar 

  9. Mary, D.J.G.J.: Privilege based advance halftone secure secret sharing scheme with error diffusion technique along with adaptive secure confidential key in the visual cryptography. Int. J. Comput. Intell. Res. 13, 1871–1906 (2017)

    Google Scholar 

  10. Guntupalli, N., Raju, P.D.R., Cheekaty, S.: An introduction to different types of visual cryptography schemes. Int. J. Sci. Adv. Technol. 1(7), 198–205 (2011)

    Google Scholar 

  11. Pahuja, S., Kasana, S.S.: Halftone visual cryptography for color images. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), pp. 281–285. IEEE (2017)

    Google Scholar 

  12. Ravella, Y., Chavan, P.: Secret encryption using (2, 2) visual cryptography scheme with DCT compression. In: 2107 International Conference on Intelligent Computing and Control Systems, pp. 344–349. IEEE (2017)

    Google Scholar 

  13. Rawat, K.: An approach for grey scale image in visual cryptography using error diffusion method. Int. J. Comput. Sci. Trends Technol. 5, 134–142 (2017)

    Google Scholar 

  14. Reddy, M.S., Mohan, S.M.: Visual cryptography scheme for secret image retrieval. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 14(6), 41–46 (2014)

    Google Scholar 

  15. Rohith, S., Vinay, G.: A novel two-stage binary image security system using (2, 2) visual cryptography scheme. Editorial Board 2(3), 642–646 (2012)

    Google Scholar 

  16. Dang, W., He, M., Wang, D., Li, X.: K out of K extended visual cryptography scheme based on “XOR”. Int. J. Comput. Commun. Eng. 4(6), 439–453 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasundhara Acharya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B., Khandelwal, M. (2019). A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics