IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR DATA SECURITY

KESHAMONI K.1*, HARIKRISHNA M.2
1Department of ECE, RVR Institute of Engineering & Technology, JNTU, Hyderabad- 500 085, AP, India.
2Department of ECE, RVR Institute of Engineering & Technology, JNTU, Hyderabad- 500 085, AP, India.
* Corresponding Author : kumar.keshamoni@gmail.com

Received : 08-11-2013     Accepted : 10-07-2014     Published : 31-07-2014
Volume : 3     Issue : 2       Pages : 60 - 65
Inform Sci Tech 3.2 (2014):60-65

Keywords : Cryptography, Pixel, MATLAB, encrypted, VSSS, watermarking, threshold, Decryption, Steganography
Conflict of Interest : None declared

Cite - MLA : KESHAMONI K. and HARIKRISHNA M. "IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR DATA SECURITY." Information Science and Technology 3.2 (2014):60-65.

Cite - APA : KESHAMONI K., HARIKRISHNA M. (2014). IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR DATA SECURITY. Information Science and Technology, 3 (2), 60-65.

Cite - Chicago : KESHAMONI K. and HARIKRISHNA M. "IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR DATA SECURITY." Information Science and Technology 3, no. 2 (2014):60-65.

Copyright : © 2014, KESHAMONI K. and HARIKRISHNA M., Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Cryptography is that the observe and study of concealment info. Cryptography, then, not solely protects knowledge from larceny or alteration, however can even be used for user authentication. There are, in general, 3 styles of scientific discipline schemes usually won’t to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions. Altogether cases, the initial unencrypted knowledge are said as plaintext. It’s encrypted into cipher text, which can successively (usually) be decrypted into usable plaintext. Visual Cryptography could be a kind of cryptography that encodes variety of pictures within the approach that once the pictures on transparencies square measure stacked along, the hidden message seems while not a trace of original pictures. The decipherment is completed directly by the human sensory system with no special scientific discipline calculations. This project presents a system that takes 3 photos as Associate in nursing input and generates 2 pictures that correspond to 2 of the 3 input photos. The third image is reconstructed by printing the 2 output pictures onto transparencies and stacking them along. Whereas the previous researches essentially handle solely binary pictures, this project establishes the extended visual cryptography theme appropriate for natural pictures. Generally, visual cryptography suffers from the deterioration of the image quality. This project additionally describes the strategy to boost the standard of the output pictures. The trade-off between the image quality and therefore the security square measure mentioned and assessed by perceptive the particular results of this methodology. Moreover, the improvement of the image quality is mentioned.

References

[1] Ateniese G., Blundo C., de Santis A. and Stinson D. (1996) Information and Computation, 129(2), 86-106.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Ateniese G., Blundo C., De-Santis A. and Stinson D.R. (2001) Theoretical Computer Science, 250, 143-161.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Verheul E.R. and van Tilborg H.C.A. (1997) Design Codes and Cryptography, 11(2), 179-196  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Floyd R.W. and Steinberg L. (1997) Proc. SID, 17(2), 75-77  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Gomes J. and Velho L. (1997) Image Processing for Computer Graphics, Springer  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Hofmeister T., Krause M. and Simon H.U. (1997) COCCON ’97, Lecture Notes in Computer Science, 1276, 176-185  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Koga H. and Yamamoto H. (1995) IEICE Transaction on Funda-mentals, E81-A(6), 1262-1269  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Naor M. and Shamir A. (1995) Eurocrypt ’94 Proceeding LNCS, 950, 1-12  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Naor M. and Shamir A. (1996) Security Protocols, 197-202.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus