A novel approach for securing images using visual cryptographic scheme

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Most applications require exchanging of information over insecure networks. The important issue concerned with respect to the images is to provide confidentiality and integrity. An efficient technique is proposed in order to provide protection to significant images through the digi-tal encryption scheme. Encryption before transmission is necessary for these images such that it makes sure that unauthorized person fails to access to any information. An efficient visual cryptographic approach is proposed for securing images by providing encryption during transferring an images or storing them. The technique proposed ensures that the images are inaccessible by unauthorized persons and also certifies confidentiality. In this proposed method to enhance security during data transmission across the network first the original image gets divided into multiple shares using logic operations and hence encryption technique is employed to these shares to maintain security. The binding of encryption and shares together called as encrypted shares are delivered and at the receiver side the reverse operation is carried out to retrieve back the original image. In the decryption process the decrypted share are layered to extract the actual image and if any shares are lost it is difficult to retrieve the information. The experimental result of the proposed method validates that the method will efficiently encrypt the image with a reduced amount of time without increasing the pixel size.



  • Keywords

    Encryption; Decryption; Random Key Visual Cryptography; RSA; Images.

  • References

      [1] Quist-AphetsiKester, MIEEE “A Visual Cryptographic Encryption Technique for Securing Medical Images“, in “International Journal of Emerging Technology and Advanced Engineering” Volume 3, Issue 6, June 2013.

      [2] R. Norcen et al “Confidential storage and transmission of medical image data” inComputers in Biology and Medicine 33 (2003) 277 – 292. https://doi.org/10.1016/S0010-4825(02)00094-X.

      [3] M. Sukumar Reddy et al “ Visual Cryptography Scheme for Secret Image Retrieval “ in International Journal of Computer Science and Network Security, VOL.14 No.6, June 2014.

      [4] Shankar K et al “Sharing a Secret Image with Encapsulated Shares inVisual Cryptography” inInternational Conference on Eco-friendly Computing and Communication Systems, (2015) 462 – 468.

      [5] Shital B. Pawar, Prof.N.M.Shahane, “Visual Secret Sharing Using Cryptography” International Journal of Engineering Research (ISSN: 2319-6890) (online), 2347-5013(print) Volume No.3, Issue No.1, pp: 31-33.

      [6] Ankush V et al. “Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space” inInternational Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015,

      [7] G. Elavarasi, Dr. M. Vanitha, “A Novel Method for Securing Medical Image Using Visual Secret Sharing Scheme”, International Journal of Engineering and Technology (IJET).

      [8] A. Nandakumar, Harmya, P., Jagadeesh, N., and Anju, S. S., “A secure data hiding scheme based on combined steganography and visual cryptography methods”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 498-505, 2011.

      [9] A. Shamir, "How to share a secret", Commun. ACM, vol.22 (11) 1979, pp.612 - 613. https://doi.org/10.1145/359168.359176

      [10] Mr.Reetesh.Rai “Secret Sharing based Visual Cryptography Scheme for color preservation using RGB Color Space” in International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 5, No5, and October 2015.

      [11] C. Blundo, A. D. Santis, and M. Naor, “Visual cryptography for grey level images,” Inf. Process. Lett, vol. 75, no. 6, pp. 255–259, 2000. https://doi.org/10.1016/S0020-0190(00)00108-3.

      [12] SavitaPatil and JyotiRao,”Extended Visual Cryptography for Color Shares using Random Number Generator,” International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, pp 399-410 Issue 6, August 2012.




Article ID: 15360
DOI: 10.14419/ijet.v7i3.15360

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.