Improved Algorithm for Visual Cryptography Using Region Incrementation

نویسندگان

  • Priyanka Agrawal
  • Vijay Kumar Sharma
چکیده

1 Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode (n+1) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by superimposing any three shares, information upto second level could be seen. In similar way, for revealing whole information all the (n+1) shares are superimposed. These n levels are created according to user specification. In proposed scheme, user does not need to address the area of different levels manually and levels are created automatically. User needs only to use a particular level information with a particular size of text. The traditional region incrementing visual cryptography scheme has been modified to address the problem of pixel expansion and poor contrast. In proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of Genetic Algorithm and Visual Cryptography for Data Hiding in image for Wireless Network

Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm along with Visual Cryptography. Plain text is converted into cipher text by using any cipher then it is hidden in LSB of image. Genetic Algorithm is used to shuffle pix...

متن کامل

مطالعه‌ای بر رمز‌نگاری بصری و ارائه‌ی روش پیشنهادی برای رمزنگاری تصاویر رنگی

Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...

متن کامل

Extended Visual Cryptography Scheme for Secret Hiding

Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. This paper presents an improved algorithm based on Chang’s and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images. This scheme achiev...

متن کامل

An Extended Visual Cryptography Algorithm for Quality-Improved Gray Scale Image with Sigmoid Function

Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers amanagement problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds ameaningful cover image in each share. However, the previous approaches involving the EVCS for general acces...

متن کامل

LSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission

A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015