An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Full Text (PDF, 713KB), PP.54-60

Views: 0 Downloads: 0

Author(s)

Aarti 1,* Pushpendra K Rajput 2

1. Computer Science & Engineering Department, Dr. B. R. Ambedkar National Institute of Technology, Jalandhar, India

2. Computer Science & Engineering Department, Sharda University, Greater Noida, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.02.08

Received: 20 Jun. 2013 / Revised: 15 Sep. 2013 / Accepted: 12 Nov. 2013 / Published: 8 Jan. 2014

Index Terms

Extended visual cryptography scheme, bit plane encoding, pixel expansion, contrast, and histogram

Abstract

Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the Extended Visual Cryptography scheme (EVCS). However, the previous approaches involving the EVCS for general access structures suffer from a low contrast problem. This paper proposes a new (k,n)-threshold image sharing scheme using extended visual cryptography scheme for color images based on bit plane encoding that encrypts a  color image in such a way that results of encryption is in the form of shares. Shares do not reflect any information directly, information is scrambled instead. The traditional binary EVCS is used to get the sharing images at every bit level of each principle component of a color image. This scheme provides a more efficient way to hide natural images in different shares. Furthermore, the size of the hidden secret can be recovered by inspecting the blocks in the shares. This new scheme for color images gives the ideal contrast in the recovered image.

Cite This Paper

Aarti, Pushpendra K Rajput, "An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.2, pp.54-60, 2014. DOI:10.5815/ijcnis.2014.02.08

Reference

[1]M.Naor, A.Shamir, “Visual crypto graphy”, in: A. De Santos (Ed.), Advances in Cryptology: Eurpocrypt’94, Lecture Notes inComputer Science, vol. 950, pp.1–12, 1995.
[2]M.NaorandA. Shamir "Visual cryptography 2: Improving the contrast via the cover base," 1996, a preliminary version appears in “Security Protocols", M. Lomased.Vol.1189ofLecture Notes in Computer Sciences, Springer-Verlag, Berlin, pp.197-202, 1997.
[3]C.Blundo, A.DeSantis, D.R.Stinson, “On the contrast in visual Crypto graphy schemes”. J. Cryptology12-261–289, 1999.
[4]G. Ateniese, C.Blundo and D. R. Stinson, "Constructions and bounds for visual cryptography"in23rdInternationalColloquium on Automata, Languages and Programming, ser. Lecture Notes in Computer Science, F.M. aufder Heide and B.Monien, Eds.,vol.1099. Berlin: Springer-Verlag, pp. 416-428, 1996.
[5]Z. Zhou, G. R.Arce, and G. D. Crescendo, “Halftone visual cryptography”, IEEE Transaction on Image Processing ,vol.15,no. 8, pp. 2441–2453, 2006.
[6]In Koo Kang, Gonzalo R.Arce, Heung-KyuLee, “Color extended visual cryptography using error diffusion”, icassp, pp.1473-1476, 2009.
[7]H.C. Wu, H.C. Wang, and R.W.Yu, “Color Visual Cryptography Scheme Using Meaningful Images”, IEEE Computer Society, vol. 03, pp.173-178, 2008.
[8]S.Droste, “New result son visual cryptography,” inProc.CRYPTO’96, vol.1109, pp.401–415, Springer-Overflag Berlin LNCS, 1996.
[9]D. Jena and S.K. Jena, “A Novel Visual Cryptography Scheme”, In Proceeding of International Conference on Advance Computer Control, pp 207-211(2009).
[10]R.Z.Wang, Y.K.Lee, S.Y.Huang, andT.L. Chia, “Multilevel visual secret sharin,”, Proceedings of the Second International Conference on Innovative Computing, Information and Control, Kumamoto, Japan, pp. 283-283, 2007.
[11]C.C. Wu, L.H. Chen, “A study on visual cryptography, Master Thesis, Institute of Computer and Information Science”, National Chiao Tung University, Taiwan, R.O.C., 1998.
[12]H.-C.Wu, C.-C.Chang, “Sharing visual multi-secrets using circle shares”, Computer Standards & Interfaces 134 (28):123–135, 2005.
[13]D.Wang, F.Yi, and X.Li, “On general construction for extended visual cryptography schemes,” Pattern Recognition, vol.42, pp. 3071-3082, Nov. 2009.
[14]W.P.Fang, “Friendly progressive visual secret sharing,” Pattern Recognition, vol.41, pp. 1410 -1414, Apr2008.
[15]T.H.Chen and Y.S.Lee, “Yet another friendly progressive visual secret sharing scheme”, in Proc.5thInt. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 353-356, 2009.
[16]E.R. Verheul, H.C.A.Van Tilborg, “Constructions and properties of k out of n visual secret sharing schemes”, Des. Codes Crypto gr. 11-179–196, 1997.
[17]Y.C. Hou, “Visual cryptography for color images", Pattern Recognition, vol. 36, pp. 1619–1629, 2003.
[18]D.R. Stinson, “An introduction to visual cryptography”, presented at Public Key Solutions’97, Toronto, Canada, and April 28–30, 1997.
[19]R.Lukac and K.Plataniotis," Bit-level based secret sharing for image encryption," Pattern Recognition, vol. 38, no. 5, pp. 767-772, 2005.
[20]C. Hegdeet. Al., “Secure Authentication using Image processing and Visual Cryptography for Banking Application”, In Proceeding of 16th International Conference on Advanced Computing and Communication(ADCOM 2008), MIT Campus, Anna University Chennai, India, pp.433-439, 2008.
[21]D.Wang, P.Luo, L.Yang, D.Qi, and Y.Dai, “Shift visual cryptography scheme of two secret images,” Progress in Natural Science, Vol.13, No. 6, pp. 457-463, 2003.
[22]D.S. Tsai, G. Horng, T.H. Chen and Y.T. Huang, “A Novel Secret Image Sharing Scheme for True-Color Images with Size Constraint”, Information Sciences vol.179, issue 19, pp. 3247–3254 Elsevier, 2009.
[23]I. Kang, G. R. Arce and H. K. Lee, “Color Extended Visual Cryptography using Error Diffusion”, IEEE Transaction on Image Processing. vol. 20.No. 1, 1057-7149, pp. 132-145, 2010.
[24]J.K. Mandal and S. Ghatak, “Secret Image/ Message Transmission through Meaningful Shares using (2,2) Visual Cryptography(SITMSVC)”, In Proceeding of International Conference on Recent Trends in Information Technology, ICRTIT, MIT, Anna University, Chennai, IEEE 978-1-4577-0590-8/11, 2011.