A SURVEY ON ENHANCING VISUAL CRYPTOGRAPHY USING NATURAL SHARES
Keywords:
Natural shares, visual cryptography, transmission risk, visual secret sharingAbstract
In visual cryptography reducing the pixel expansion and improving the display quality of recovered images are still major issues. Secret images are covered in shares by using conventional visual secret sharing schemes (VSS). Shares can appear as meaningful images or noise like pixels; but transmission of such a shares increase difficulties. In this paper we have propose survey on natural image based visual secret sharing scheme (NVSS). In this carrier image is using to recover the secret image and protect the participant during transmission phase. So we can hide the noisy shares and also propose possible ways to reduce the transmission risk problem for the shares.
References
R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun.,vol. 283, no. 21, pp. 4242–4249, Nov. 2010.
M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.
P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011
K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013
C. N. Yang and T. S. Chen, “Extended visual secret sharing schemes: Improving the shadow image quality,” Int. J. Pattern Recognit. Artif. Intell., vol. 21, no. 5, pp. 879–898, Aug. 2007.
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–2, pp. 143–161, Jan. 2001.
Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006.
Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009
F. Liu and C. Wu, “Embedded extended visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322, Jun.2011
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 International Education and Research Journal (IERJ)

This work is licensed under a Creative Commons Attribution 4.0 International License.