Comparative Analysis on Visual Cryptographic Schemes
نویسندگان
چکیده
Visual cryptography is the techniques that deal with providing security to the multimedia data. The main concept behind this is, to encrypt a secret image into some shares. The secret can be revealed only when all the shares are combined. The central theme of visual cryptography is that it doesn’t require any manipulation or tough cryptographic knowledge and the decryption is done by human vision without the help of computers. Thus, visual cryptography is known for its least computational complexity yet much secure. In this work, we compared traditional visual cryptography, extended visual cryptography and colour extended cryptography with respect to PSNR, NCC and MSE. On analysis, it is found that the performance of colour extended visual cryptography is much better than the traditional visual cryptography and extended visual cryptography, in terms of Peak Signal to Noise Ratio (PSNR), Normalized Correlation Coefficient (NCC) and Mean Square Error (MSE). Keywords— Visual Cryptography, Extended Visual Cryptography, colour extended visual cryptography, PSNR, NCC, MSE
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملThe Comparative Study on Visual Cryptography and Random Grid Cryptography
Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted into several shares in such a way that the decryption can be performed by the human visual system, without the aid of computers. Random grid is a methodology to construct visual secret sharing (vss) scheme without pixel expansion in which an RG scheme takes an input image and transforms it in...
متن کاملComparative Analysis of Quantum Key Distribution Protocols with Two, Three and Four-state Systems
Cryptographic protocols can be classified by the type of security against eavesdropping which they provide. There exist mathematically secure schemes whose security relies on mathematical proofs or conjectures about the complexity of deciphering the message without possessing the correct key. The majority of current secure public Internet connections rely on such schemes. Alternatively, a crypt...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملRevisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic Schemes
Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. In this paper, we propose a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC). First, we formalize the notion ...
متن کامل