a survey on visual cryptography techniques
TRANSCRIPT
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
1/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 100
ABSTRACTVisual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual
Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned
participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security,
quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but
later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used
different techniques for visual cryptography from 2011 to 2015.
Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares.
1.INTRODUCTIONVisual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic techniquewhich allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way thatthe decryption can be performed by thehuman visual system, without the aid of computers.This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into
consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansionresults in smaller size of the share. Encoding multiple secret images in to the same share images requires less overheadwhile sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over thecommunication channels.This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visualcryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme.
1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME:
Naor and Shamir’s proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel iswhite one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into twowhiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secretimage is shown only when both of the images became shares are upper imposed.
Figure 1 Black and White image VCS
A SURVEY ON VISUAL CRYPTOGRAPHY
TECHNIQUESM.SIVA KUMAR
1, A.SHILPA
2, J.R.VIJAYALAKSHMI
3
1,2,3 Department of Computer Science and Engineering,Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India.
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
2/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 101
Table 1: Construction of Black and White image VC
To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hidingschemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages,embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fangrecommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and ORoperation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .Thedisadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share largeamounts of confidential messages several shares have to be generated.1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME:
The (2, 2)–VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In thedecryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold
visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size ofdecrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality ofhalftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filingcurve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray levelimage is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the caseof (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed by mound binary shares.
254: [1 1 1 1 1 1 1 0]Table 2-Construction of gray scale image VC
Share1 (1st half): 0 1 0 1 0 1 0 0Share2 (1st half): 1 0 1 0 1 0 1 0
--------------------1 1 1 1 1 1 1 0 = 254
Share3 (1st half) : 0 0 1 0 0 1 0 0Share1 (2nd half): 1 1 0 1 1 0 1 0
-------------------1 1 1 1 1 1 1 0 = 254
Share2 (2nd half): 1 1 1 0 1 1 1 0
Share3 (2nd half): 1 0 0 1 0 1 0 0-------------------
1 1 1 1 1 1 1 0 = 254
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
3/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 102
Secret image share1 share2Figure 2 Gray scale image VCS
Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives perfect high quality image when reconstructed without any loss of contrast.
1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME:Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual
cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with theconcept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel istransformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly onecolor region colored, and all the other color regions are black. The color of one pixel depends on the interrelations between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c× 3.Yang and Laihimproved the pixel expansion to c × 2 of Verheul and Van Tilborg . But in both of these schemes sharegenerated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmitsecret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image twosignificant color images areselected as cover images which are the same size as the secret color image. Then accordingto a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantageof this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in thesecret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a
secret color image sharing scheme based on modified visual cryptography.Table 3: Construction of color image VC
Figure 3 Color image VCS
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
4/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 103
2. ANALYSIS OF VARIOUS VISUAL CRYPTOGRAPHY SCHEME:Table 4: Table for Visual Cryptography problems and solving techniques
AUTHOR NAME TITLE AND YEAR METHOD TO SOLVE PROBLEM
Xuehu Yan et al Halftone Visual CryptographyWith Minimum Auxiliary
Black Pixel & Uniform ImageQuality2015
HVCS(Halftone Visual CryptographyScheme)
Error diffusion
Large auxiliary black pixeldistribution
P.G.Haritha et al A New Visual CryptographyTechnique For Color Images
2015
VSSError DiffusionChen technique
Visual qualityPixel expansion
Contrast lossMs.Deepti
Chaudhary et alA Secure Authentication Using
Visual Cryptography& Steganography
2015
Steganography(LSB)VC (k,n)
Authenticity
J. Ida Christy et al Feed Forward Networks InColor Extended VisualCryptography To
Generate Meaningful Shares2015
EVCS
ColorHalftoning
Random pixelmanagement
Pixel expansion
AlfiyaSaiyyad et al Secure Authentication ByImage Processing And Visual
Cryptography For BankingApplications.
2015
Image processing
Correlation method
Authenticity
RiteshD.Yelane etal
Security Approach By UsingVisual Cryptographic
Technique2015
EVCS
Halftone
Informationsecurity
ContrastShrutiSekra et al Steganography Using Genetic
Encryption Along With VisualCryptography
2015
Steganography (using LSB-Geneticalgorithm)
VCS
Authenticity
SujitAhirrao et al Visual Cryptography SchemeFor Color Image Using K-N
Secret Sharing Algorithm2015
K n secret sharing algorithm
Secure Visual Crytography
Water Marking(LSB)
Malicious attacks
Sankar Das et al Visual Cryptography usingThree Independent Shares in
Color Images2015
(3,3)VCSRandom insertion of bits
Floyds error diffusion Halftone
Reconstruction ofsecret message
Fersna et al Progressive VCS Without PixelExpansion For Color Images
2015
Progressive Visual Cryptography
Halftone
Digital watermarking algorithms
Pixel expansion
Security
Contrast
AparnaBhosale etal
Reducing Transmission RiskUsing Diverse Image
Media
2015
(n,n) NVSS(natural image based VSSscheme)
Transmission risk problem
Jainthi.K. et al A Novel CryptographicTechnique That Emphasis
Visual
K out of k (EVCS)
Floyds steinberg error diffusion
Security
Visual quality
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
5/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 104
Quality And Efficieny By FloydSteinberg Error
Diffusion Method2015
algorithm
Random grids
Halftone
Contrast
Size
Quality ofreconstructedimage
Ketanraukundiya etal
Secure System Framework forSecure VisualCryptography
2015
Steganography(LSB)
(CRT)Chinese Remainder Theorem
RNS(Residual Number System)
Pixel expansion
Security
Image qualityVandhana.G.Pujari
et al Novel Approach for Visual
Cryptography Using AdaptiveLocalFilter2015
Adaptive local filters Quality ofdecrypted image
Alkhamohan et al Contrast Enhancement in ColorExtended Visual Cryptography
2015
ABM(Additional Basis Matrix) Contrast loss
Pixelreconstruction
F.R.Shiny Malar Secured Privacy PreservingMechanism for Distributed
Digital Documents2015
Visual cryptic filtering scheme
Error transformission technique
Image quality
Security
Kai-Hui Lee et al Digital Image Sharing byDiverse Image Media
2014
(n,n) NVSS (Natural Visual SecretSharing)
Transmission risk problem
Che-Wei Lee et al A Secret-Sharing-Based
Method for Authenticationof Grayscale Document Images
via the Use of thePNG Image With a Data Repair
Capability2014
Shamir secret sharing scheme Image
authentication
Kai-Hui Lee et al Sharing Visual Secrets inSingle Image Random Dot
Stereograms2014
BVCS(Binocular VisualCryptography Scheme)
SIRDSS(Single Image Random DotStereograms
Transmission risk problem
HaoLuo et al Color Transfer In Visual
Cryptography2014
(k-n)Secret Sharing Algorithm Computational
complexity
Cheng-Chi Lee etal
A new Visual Cryptographywith Multi-level Encoding
2014
VSS(Visual Secret Sharing) Pixel expansion
Shruti M.Rakhunde
Reversible Data Hiding UsingVisual Cryptography: A
Review2014
RDH(Reversible Data Hiding)
SDS(Seiving-Divison Shuffling)Algorithm
Lossless image
Encryption/decryption cost
Jyoti Rao et al Survey Of Visual CryptographySchemes Without
Pixel Expansion2014
Wu –chen Scheme
Shyu et al scheme
Xia oyu et al Scheme
Pixel expansion
Count of secretimage shares
Share generation
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
6/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 105
Tsungleihlin,horng-lee chen et alscheme
K.V.Ramana et al Error Diffusion Based ColorVisual Cryptography ForSecure Communication
2014
Error diffusion
VIP Synchroniztion
Floyds and Steinberg error filters
Color diffusion
Less visual qualityof meaningful andmeaningless shares
Shekhachenthara etal
A Novel Approach On ColorExtended Visual CryptographyFor General Access Structures
Using Error Diffusion2014
PVC watermarking Quality ofMeaningful share
LekhikaChettri Visual Cryptography SchemeBased On Pixel
Expansion for Black & White
Image2014
(2,2) Visual cryptography algorithm
K out of k Visual Cryptography
Scheme
Pixel expansion
Security
Contrast
T.Anuradha et al A Novel Gaussian ErrorDiffusion based Colour
Extended Visual Cryptography2014
Color EVCS
Gaussion Error Diffusion
PSNR(Peak Signal to Noise Ratio)
NCC(Normalized CorrelationCofficient)
MSE(Mean Square Environment)
Quality of shares
Security
Performace
Bharanivendhan .Net al
Visual Cryptography Schemesfor Secret Image Sharing
using GAS Algorithm2014
GAS algorithm
Stamping algorithm
Visual quality
Security
Resolution ofshares
Pixel expansionDhara Trivedi et al Visual Cryptography in
Biometrics Passport2014
Bio metricies Authenticity
Security
ShyongJianShyu Visual Cryptograms OfRandom Grids For General
Access Structures2013
VCRG-GAS(Visual Cryptograms OfRandom Grids For General Access
Structures)
Pixel expansion
ShyongJianShyu etal
General Constructions ForThreshold Multi-Secret Visual
Cryptography Scheme2013
(k,n,s,R)MVCS(Multi-Secret VisualCryptography Scheme)
ILP(Integer Linear Programming)
Pixel expansion
Kai-Hui Lee et al Image Size Invariant VisualCryptography For General
Access Structures Subject To
Display Quality Constraints2013
SIVCS(Size Invariant VisualCryptography Scheme)
Pixel expansion
Uncontrollable
display quality problemRoberto De Prisco
et alColor Visual Cryptography
Scheme for Black and WhiteCBW-VC(Color-Black And White)
Visual CryptographyPixel expansion
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
7/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 106
Secret Images2013 BW-VC(Black And White) Visual
Cryptography
Peng Li et al Sharing More Information in
Gray VCS2013
SHIGVCS(Sharing More Information
in Gray VCS)
PSSS(Polynomial-based SecretSharing Scheme)
Visual quality
Pixel expansion
Th. RupachandraSingh et al
Video Watermarking SchemeBased Visual Cryptography
And Scene Change & Detection2013
Video watermarking scheme Video pre processing
Grishma R.Bhokare et al
Color Extended VisualCryptography Using Error
Diffusion With VIPSynchronization
2013
Error diffusion
VIP Synchronization
(k-n) Secret Sharing Algorithm
Visual quality
Color shares
Pixel expansion
Dr.V.R.Anitha et al Extending The VisualCryptography Algorithm Using
ImageWatermarking Technique
2013
Watermarking Pixel expansion
Display quality
Anuprita U. mande Parameter Evaluation andReview of Various
Error-Diffusion Half toningalgorithms used in
Color Visual Cryptography2013
(E-D) algorithms
Floyds-stengberg halftone algorithm
Jarvis halftone algorithm
Stucki halftone algorithm
ModificationFloyds-stengberg halftone algorithm
Contrast loss
Perceived loss
Anuprita U. mande A Fast Encryption Algorithmfor Color Extended Visual
Cryptography2013
Faster and easier color VC encryptionmethod
Floyds-stengberg halftone algorithm
Jarvis halftone algorithm
Stucki halftone algorithm
ModificationFloyds-stengberg halftone algorithm
Contrast
Image (visual)quality
Sathiya k et al Comparison of VisualCryptographic
Algorithms for Quality ImagesUsing XOR
2013
Floyds-stengberg halftone algorithm
Javris halftone algorithm
Stucki halftoneAlgorithm
Pixel reversal technique
Visual quality
Dr.V.R.ANITH etal Extending the VisualCryptography AlgorithmWithout Removing Cover
Images
EVCS without Remove cover image Management problem
Pixel expansion
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
8/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 107
2013SonalWange A Visual Cryptography to
Secure Biometric Database: AReview2013
Biometric identification technique Authentication
MitsuguIwamoto A Weak Security Notion ForVisual Secret Sharing Scheme2012
WS-VSSUS-VSS Contrast loss
Pixel expansionChing-Nung Yang
et alK Out N Region Incrementing
Scheme In Visual Cryptography2012
RIVCS(Region Incrementing schemeIn Visual Cryptography Scheme)
Wang scheme-Incorrect color
problem
Amir Kolaman etal
Quaternion StructuredSimilarity A New Quality Index
For Color Images2012
VQM(Visual Quality Matrix)
QTP(Quaternion Image Processing)
QSSIM(Quaternion Structured
SIMilarity
Image quality
Duan-Yu Chen etal
Visual Depth Guided ColorImage Rain Streaks Removal
Using Sparse Coding2012
Rain removal framework
Sparse coding
Rain removal
Kai - H ui L e e etal
An Extended VisualCryptography For General
Access Structures2012
EVCS(Extended Visual CryptographyScheme)
Stamping algorithm
Pixel expansion,Display quality,Random pixelmanagement
problemPankajaPatil et al Visual Cryptography For
Color Images Using ErrorDiffusion And Pixel
Synchronization2012
Error diffusion
VIP Synchronization
Javris and Floyds error diffusion
Low frequencydifference
Visual contrast
Anshul Sharma Performance Of Error Filters InHalftone
Visual Cryptography2012
Error diffusion filters
(PSNR&UQI)
Image quality ofhalftone shares
AnanthakumarKendra et al
An Improved (8, 8) ColourVisual Cryptography Scheme
UsingFloyd Error Diffusion
2012
Authentication
Security
VIPSynchroniztion
CRC AlgorithmColor VC
Error diffusion
Manimurugan.S etal
Visual Cryptography Based OnModified
RLE Compression withoutPixel Expansion
2012
RLE compression Pixel expansion
Decrypted imagequality
Security
Anushal Sharma et
al
Performance of Error Filters on
Shares in HalftoneVisual Cryptography via ErrorDiffusion
2012
All Error Diffusion Algorithm
Sierra,Stevenson-Arce error filters
Visual quality
Contrast
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
9/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 108
InKoo Kang et al Color Extended VisualCryptography Using Error
Diffusion2011
Visual information pixel (VIP)synchronization
Error diffusion
Low visual qualityof shares
Tzung-Her Chen et
al
User Friendly Random Grid
Based Visual Secret Sharing2011
RGVSS(Random Grid Based Visual
Secret Sharing)
Pixel expansion
ShyongJianShyu etal
Optimum Pixel Expansion ForThreshold Visual Secret
Sharing Scheme2011
ILP(Integer Linear Programming) Pixel expansion
Velmurugan.N etal
Visual Pixel Expansion ofSecret Image
2011
VCSORVCSXOR
Pixel expansion
Small contrast N Krishna Prakash
et alVisual Cryptography Scheme
For Color Images
Using Half Toning Via DirectBinary Search With AdaptiveSearch And Swap
2011
Direct Binary Search(DBS) withadaptive search and swap method
Quality of halftoneimage
Computationalcompexity
MorampudiNareshkumar et al
A Novel Approach ForCheating Prevention
Through Visual CryptographicAnalysis
2011
Robust Cheating PreventionAlgorithm
Cheating problem
Shiny Malar. F R etal
Error Filtering Schemes forColor Images in Visual
Cryptography2011
Visual cryptic filtering Scheme
Fourier transform
Quality of image
Blurring effects
Pixel expansion
3.PROPOSED METHODOLOGYProposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3Dimages.3.1 Halftone Image Creation
In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp).Then the original image is halftoned using Floyd – Steinberg algorithm. In this algorithm takes less time to performhalftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and alsohighly contrasted.3.2 Share Generation
In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number oftransparency shares are generated and every share was saved. These shares are same size, pixel and different intransparency levels and also meaningful images.3.3 Reconstruction
In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The finalreconstructed images is highly contrasted and free from pixel expansion problem.
4. FUTURE SCOPE:We had suggested a future development of VC scheme to,1.Apply VC for videos.
2. Using MSB algorithm in steganography for encoding and decoding in VC.4.1 CONCLUSION
In today’s world security of the image is very important. In this paper we have surveyed different problems andtechniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
10/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 109
problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC historythe extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniquesare good for data hiding and have their own advantages and disadvantages and give a security so that no one can accessthe image in open network.
REFERENCES[1] P.G.Haritha, Mrs.M.MathinaKani, “A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES“, international journal for trends in engineering & technology, volume 4 issue 2 – April 2015 - ISSN: 2349 –9303.
[2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar,” A Secure Authentication Using Visual Cryptography&Steganography “, International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 –March 2015.
[3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , “VISUAL CRYPTOGRAPHY SCHEMEFOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM “, International Journal of AdvancedTechnology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN(online): 2348 – 7550.
[4] ShrutiSekra, SamtaBalpande, KarishmaMulani, “STEGANOGRAPHY USING GENETIC ENCRYPTIONALONG WITH VISUAL CRYPTOGRAPHY”, SSRG International Journal of Computer Science andEngineering(SSRG-IJCSE) – volume 2 issue 1 January 2015.
[5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, ”SECURE AUTHENTICATION BY IMAGEPROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS “,International Journal ofAdvance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January2015.ISSN 2348–4853.
[6] J. Ida Christy and V. Seenivasagam ,“FEED FORWARD NETWORKS IN COLOR EXTENDED VISUALCRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES” , International Journal of Security and ItsApplications Vol.9, No.1 (2015).
[7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in ComputerScience and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X.
[8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication usingcomplementary colors, Science Direct computers & security48(2015) 167e181.
[9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , Digital Signal Processing 38 (2015) 53–65.
[10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using ThreeIndependent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering(IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015).
[11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation InVisual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume2, Issue 2, February 2015, ISSN 2348 – 4853.
[12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,InternationalJournal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
[13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications,International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079.
[14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal ofComputer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084.[15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND
EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research inEngineering and Technology, Volume: 04 Issue: 02 | Feb-2015.
[16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, InternationalJournal of Computer Applications (0975 – 8887), Volume 109 – No. 14, January 2015.
[17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,InternationalJournal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015,ISSN: 232 7782.
[18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, InternationalJournal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015ISSN: 2277 128X.
[19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Scienceand Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X.
[20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed DigitalDocuments, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015.
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
11/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 110
[21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment VisibleMosaic Images, International Journal of Application or Innovation in Engineering & Management(IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 – 4847.
[22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY,IJRET: International Journal of Research inEngineering and Technology,2014.
[23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visualcryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243–250.[24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images ,
Information Sciences 271 (2014) 246–263.[25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual
cryptography,Measurement 51 (2014) 81–90, journal homepage: www.elsevier.com/locate/ measurement.[26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual
Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277 –8322.
[27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal ofInnovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014.
[28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without PixelExpansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9,September 2014 Page No. 8372-8376.
[29] K.V.Ramana, Y.AdiLakshmi,Error Diffusion Based Color Visual Cryptography for SecureCommunication,International Journal of Advanced Research in Computer and Communication Engineering Vol.3, Issue 1, January 2014.
[30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptographyfor General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer andCommunication EngineeringVol. 3, Issue 2, February 2014.
[31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, InternationalJournal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193.
[32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography,International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531.
[33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL
CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan-2014.
[34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GASAlgorithm, International Journal of Computer Applications (0975 – 8887) Volume 92 – No.8, April 2014.
[35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent andInnovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 – 487, March2014.
[36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEETRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014.
[37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
[38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual
cryptography and scene change detection, International Journal of Electronics and Communications (AEÜ) , Int. J.Electron. Commun.(AEÜ) 67 (2013) 645–651.[39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual
cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 1380–1393.[40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images ,
Theoretical Computer Science 510 (2013) 62–86.[41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual
cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318–331.[42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error
Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2, Issue 10, October 2013, Page No. 3066-3069.
[43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHYALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers &
Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061.[44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half
toning algorithms used in Color Visual Cryptography,International Journal of Engineering and InnovativeTechnology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754.
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
12/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
Volume 5, Issue 2, February 2016 Page 111
[45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended VisualCryptography,International Journal of Emerging Technology and Advanced Engineering ,Website:www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).
[46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for QualityImages Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
,Volume 2, Issue 2, March – April 2013 ISSN 2278-6856.[47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm WithoutRemoving Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4-April 2013.
[48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of AdvancedResearch in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277128X.
[49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONSON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013.
[50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subjectto Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10,OCTOBER 2013.
[51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple – Secret VisualCryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 ,MAY 2013.
[52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal ofGlobal Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X.
[53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based onVisual Cryptography, International Journal of Computer Applications (0975 – 8887) Volume 41– No.20, March2012.
[54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSIONAND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology(IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X.
[55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY,International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012.
[56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION,KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 – 6779| NOV 12TO OCT 13 | VOLUME – 02, ISSUE – 02.
[57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography SchemeUsing Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN:2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096.
[58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without PixelExpansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September2012, ISSN: 2277-3754.
[59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via ErrorDiffusion, International Journal of Computer Applications (0975 – 8887) Volume 45– No.12, May 2012.
[60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document
Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGEPROCESSING, VOL.21, NO.1, JANUARY 2012.[61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures,
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY2012.
[62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Schemein Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,VOL. 22, NO. 5, MAY 2012.
[63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.
[64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science andTechnology,Volume 11, Issue 20 ,Version 1.0 December 2011.
[65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via
Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and ElectricalEngineering, Vol. 3, No. 6, December 2011.
-
8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES
13/13
International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]
Volume 5, Issue 2, February 2016 ISSN 2319 - 4847
V l 5 I 2 F b 2016 112
[66] MorampudiNareshkumar, DatrikaSrinivasRao,Sravanthi, A Novel Approach for Cheating Prevention throughVisual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011.
[67] Shiny Malar F.R, Jeya Kumar M.K, Error Filtering Schemes for Color Images in Visual Cryptography,International Journal of Advanced Computer Science and Applications,Vol. 2, No. 11, 2011.
[68] InKoo Kang, Gonzalo R. Arce, and Heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011.[69] Tzung-Her Chen and Kai-Hsiang Tsao, User-Friendly Random-Grid-Based Visual Secret Sharing, IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11, NOVEMBER 2011.
[70] Ran-Zan Wang and Shuo-Fang Hsu, Tagged Visual Cryptography, IEEE SIGNAL PROCESSING LETTERS,VOL. 18, NO.11, NOVEMBER 2011.
[71] ShyamalenduKandar, ArnabMaiti, Bibhas Chandra Dhara ,Visual Cryptography Scheme for Color Image UsingRandom Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer ScienceIssues, Vol. 8, Issue 3, No. 1, May 2011.
[72] RiteshD.Yelane, Dr.Nitiket. N. Mhala, Prof. B. J. ,”Chilke,Security Approach by Using Visual CryptographicTechnique “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume5, Issue 1, January 2015.
AUTHORS
M.Sivakumaris currently pursuing Bachelor of Engineering in Computer Science&Engineering from SriRamakrishna Engineering College, Coimbatore.His interests include Cryptography&Network Security,WebDevelopment.
A.Shilpais currently pursuing Bachelor of Engineering in Computer Science&Engineering from SriRamakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security,DBMS.
J.R.Vijayalakshmiis currently pursuing Bachelor of Engineeringin Computer Science&Engineering fromSri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&NetworkSecurity,Artificial Intelligence.