Visual Cryptography for Color Images to Provide Confidentiality Using Embedded System

نویسنده

  • S. Gowri
چکیده

RGB Color Visual Cryptography is a type that allows the image to be divided into 2*2 (n*n) multiple numbers of shares knows transparent shares. In existing methods works for color images with 8 colors and even few of them without halftone techniques. Today as per the growth of digital media in world, it is becoming more prevalent to find a method to protect the security of that digital media. We present a visual cryptographic technique for color images in which the generated shares (n*n) are again encrypted. For this XOR operation is used and this will provide double security for the secret document. There is no pixel expansion and hence storage requirement per encrypted image is same as original image without pixel expansion. Encryption is carried out based on RGB (HSV) value of the pixels. Encryption is carried out based on RGB value of the pixels. The quality of the image recovered is same as the original image. The same technique can be used on binary or gray scale images also without any change in the algorithm. RBG Color Visual Cryptography is an exciting era of research where exists a lot of scope.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure and Verifiable Visual Cryptography for Color Images

Confidentiality is the most important aspect of information security. Visual Cryptography (VC) is a decryption-less cryptographic technique where human eye is proficient in decrypting the secret information. VC is implemented for binary, gray scale and color images, Color image VC schemes are commonly implemented using Cyan-Magenta-Yellow-Black (CMYK) model that requires a computational device ...

متن کامل

A Survey on Embedded Halftoned Shares in Extended Visual Cryptography Schemes

With the rapid advancement of network technology, multimedia information is transmitted over the Internet conveniently. Various confidential data such as military maps and commercial identifications are transmitted over the Internet. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over communication network to steal information...

متن کامل

Double Layer Security Using Visual Cryptography and Transform Based Steganography

With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieve...

متن کامل

A Review Paper on an Embedded Extended Visual Cryptography Scheme for Color Image Using Lpg with Pca

A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography using LPG with PCA. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels.In today’s scenario protection of digital data is utmost necessary in every part of life. More...

متن کامل

A Visual Cryptographic Encryption Technique for Securing Medical Images

The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017