Lossless Visual Cryptography in Digital Image Sharing
Nikhila A1, Janisha A2
1Nikhila A, M.Tech Scholar, Department of Computer Science and Engineering, LBS Institute of Technology for Women, Thiruvananthapuram (Kerala), India.
2Janisha A, Assistant Professor, Department of Computer Science and Engineering, LBS institute of Technology for Women, Thiruvananthapuram (Kerala), India.
Manuscript received on 13 August 2016 | Revised Manuscript received on 20 August 2016 | Manuscript Published on 30 August 2016 | PP: 159-162 | Volume-5 Issue-6, August 2016 | Retrieval Number: F4710085616/16©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of Information security. Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. Visual cryptography schemes (VCSs) generate random and meaningless shares to share and protect secret images. The main issue in visual cryptography is quality of reconstructed image. The secret image is converted into shares; that mean black and white pixel images. There occurs an issue of transmission loss and also the possibility of the invader attack when the shares are passed within the same network. In this paper, a lossless TVC (LTVC) scheme that hides multiple secret images without affecting the quality of the original secret image is considered. An optimization model that is based on the visual quality requirement is proposed. The loss of image quality is less compared to other visual cryptographic schemes. The experimental results indicate that the display quality of the recovered image is superior to that of previous papers. In addition, it has many specific advantages against the well-known VCSs. Experimental results show that the proposed approach is an excellent solution for solving the transmission risk problem for the Visual Secret Sharing (VSS) schemes.
Keywords: Visual Cryptography, Visual Secret Sharing.
Scope of the Article: Cryptography and Applied Mathematics