A Survey on enhancing visual cryptography using natural shares

Rekha Sarawade, Ashish Manwatkar

Abstract


In visual cryptography reducing the pixel expansion and improving the display quality of recovered images are still major issues. Secret images are covered in shares by using conventional visual secret sharing schemes (VSS). Shares can appear as meaningful images or noise like pixels; but transmission of such a shares increase difficulties. In this paper we have propose survey on natural image based visual secret sharing scheme (NVSS). In this carrier image is using to recover the secret image and protect the participant during transmission phase. So we can hide the noisy shares and also propose possible ways to reduce the transmission risk problem for the shares.

Keywords


Natural shares, visual cryptography, transmission risk, visual secret sharing

Full Text:

PDF

References


R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun.,vol. 283, no. 21, pp. 4242–4249, Nov. 2010.

M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.

P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011

K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013

C. N. Yang and T. S. Chen, “Extended visual secret sharing schemes: Improving the shadow image quality,” Int. J. Pattern Recognit. Artif. Intell., vol. 21, no. 5, pp. 879–898, Aug. 2007.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–2, pp. 143–161, Jan. 2001.

Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006.

Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009

F. Liu and C. Wu, “Embedded extended visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322, Jun.2011


Refbacks





Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2017 INTERNATIONAL EDUCATION AND RESEARCH JOURNAL