Abstract
Visual cryptography (VC) is one of the strongest cryptographic method present. The main advantage of this system is that the decryption doesnot need any specific requirements for decoding other than human eyes. Using halftoning techniques binary images are obtained for grayscale and color images, this technique is applied in Halftone VC. In this paper, direct binary search (DBS) is implemented and initial images are modified for better quality of recovered images. The concept is proposed for bank locker systems. Comparison has been made using parameters like PSNR, Correlation, UQI and SSIM.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naor, M., & Shamir, A. (1994). Visual cryptography. In Proceeding EUROCRYPT (pp. 1–12).
Thomas, S. A., & Gharge, S. (2017). Review on various visual cryptography schemes. In 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) (pp. 1164–1167). Mysore.
Blundo, C., DArco, P., De Santis, A., & Stinson, D. R. (2003). Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics, 16, 224–261.
Ateniese, G., Blundo, C., Santis, A. D., & Stinson, D. R. (1996). Visual cryptography for general access structures. Information and Computation, 129, 86–106.
Blundo, C., Santis, A. D., & Naor, M. (2000). Visual cryptography for grey level images. Information Processing Letters, 75, 255–259.
Hou, Y. C. (2003). Visual cryptography for color images. Pattern Recognition, 36, 1619–1629.
Ateniese, G., Blundo, C., Santis, A., & Stinson, D. R. (2001). Extended capabilities for visual cryptography. Theoretical Computer Science, 250, 143–161.
Zhou, Z., Arce, G. R., & Crescenzo, G. D. (2006). Halftone visual cryptography. IEEE Transactions on Image Processing, 18, 2441–2453.
Thomas, S. A., & Gharge, S. (2018). Halftone visual cryptography for grayscale images using error diffusion and direct binary search, in 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1091–1096). Tirunelveli, India.
Kang, I., Arce, G. R., & Lee, H.-K. (2011). Color extended visual cryptography using error diffusion. IEEE Transactions on Image Processing, 20.
Wang, Z. M., Arce, G. R., & Di Crescenzo, G. (2006). Halftone visual cryptography via direct binary search. EUSIPCO.
Otsu, N. (1979). A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 9(1), 62–66.
Thomas, S. A., & Gharge, S. (2018). Enhanced security for military grid reference system using visual cryptography, in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1–7). Bangalore.
Wang, Z., & Bovik, A. C. (2002). A universal image quality index. IEEE Signal Processing Letters, 9.
Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 13.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thomas, S.A., Gharge, S. (2019). Optimal Thresholding in Direct Binary Search Visual Cryptography for Enhanced Bank Locker System. In: Shetty, N., Patnaik, L., Nagaraj, H., Hamsavath, P., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-13-6001-5_49
Download citation
DOI: https://doi.org/10.1007/978-981-13-6001-5_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6000-8
Online ISBN: 978-981-13-6001-5
eBook Packages: EngineeringEngineering (R0)