Académique Documents
Professionnel Documents
Culture Documents
reduced to zero due to high contrast nature of shares [6]. In [7] and original secret image is revealed. Fig. 3 indicates the
researchers were proposed an extension of the capabilities of decryption phase in which final key mask is XORed with
XORed based visual cryptography for general access shares to reveal the secret.
structure. The advantages of using this technique are that no
codebook is needed; decryption is done by XOR operation, no
pixel expansion and perfect reconstruction of secret. In [8] a
new (t, n) visual cryptography scheme was proposed. In this
paper researches have used basis matrices and probabilistic
model for secret image retrieval. In [9] a new algorithm was
proposed for extended embedded visual cryptography for
color image using artificial bee colony algorithm. In this first
halftoning process was applied over color image then
embedding process was applied. The visual quality was
increased then other methods. In [11] authors have proposed a
new condition for hierarchical secret image sharing. In this
decryption will be performed if the access condition was
satisfied. Biswapati Jana et al. [12] have proposed a new
protocol for hierarchical visual secret sharing using
steganography, which maintain hierarchy and detect fake
share. The PSNR value of this method was higher than other
method [12]. In [14] a new algorithm proposed for extended
embedded visual cryptography for color image using artificial
bee colony algorithm. First halftoning process was applied
over color image then embedding process was applied. The
visual quality was increased then other methods [14]. In [15]
minimization of pixel expansion using integer linear program
visual cryptography for general access structure was
introduced by researchers.
V. CONCLUSION
This paper proposed a new hierarchical visual
cryptography scheme for grayscale image. In this scheme
secret image is encrypted in to levels. Shares generated by this
scheme are gray and highly secured because original secret
image is encrypted in to levels so more secrecy maintain in to
shares. In this paper the visual quality is improved and size of
original secret image and decrypted image is same. In future
we can generate color share by applying this algorithm on any
of R, G and B component of color image.
Fig.7 (e) Share 211 Fig.7 (f) Share 212
REFERENCES
[1] Moni Naor and Adi Shamir, "Visual Cryptography," Eurocrypt, 1994.
[2] Pallavi V. Chavan, Dr.Mohammad Atique, ”Design of Hierarchical
Visual Cryptography”, IEEE, 2013.
[3] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu, Guo-Wei Chen,
Chwei-Shyong Tsai, ”A new visual cryptography with multi-level
encoding”, Elsevier/Journal of visual language and computing,2013.
[4] Shubhra Dixit, Deepak Kumar Jain and Ankita Saxena, ” An Approach
for Secret Sharing Using Randomised Visual Secret Sharing”,
IEEE,2014.
[5] Pallavi V. Chavan, Dr. Mohammad Atique,Dr. Latesh Malik,”Design
and Implemantation of Hierarchical Visual Cryptography with
Expansionless Shares”, International Journal of Network Security &It’s
Applications,vol-6,2014.
Fig.7 (g) Share 221 Fig.7 (h) Share 222
[6] Pallavi V. Chavan, Dr. Mohammad Atique, Dr. Latesh Malik,
”Signature Based Authentication using Contrast Enhanced Hierarchical
Fig. 7 Third Phase of Encryption share111, share112, share121, share122, Visual Cryptography”, IEEE Conference on Elecrical, Electronics and
share211, share212, share221, share222 Computer Science,2014.
[7] Xiaotian Wu and Wei Sun,.”Extended Capabilities for XOR-Based
Visual Cryptography”, IEEE, VOL. 9, NO. 10, 2014.
[8] M. Sukumar Reddy, S. Murali Mohan, ”Visual Cryptography Scheme
for Secret Image Retrieval” , IJCSNS International Journal of Computer
Science and Network Security, Vol.14 No.6, June 2014.
[9] Deepa A K and Bento Benziger, ”Embedded Extended Visual
Cryptography Scheme for Color Image using ABC Algorithm”, IEEE,
2014.
[10] J. Ramya,B. Parvathavarthini, ”An Extensive Review on Visual
Cryptography Schemes”, IEEE,2014.
[11] Shyong Jian Shyu, Ming Ching Chen, ”Mininizing Pixel Expansion in
Visual Cryptographic Scheme for General Access Structure”, IEEE
Transaction On Circuit and System for Video Technology, 2015.
[12] Biswapati Jana, Amita Samanta and Debasis Giri, ” Hierarchical Visual
Secret Sharing Scheme Using Steganography”, Springer, 2015.
[13] Pradnya S.Nagdive, A.B. Raut, ”Visual Cryptography and
Steganography:A Review”, International Journal of Advanced Research
in Computer Science and Management Studies,vol-3,2.
[14] Deepa A K and Bento Benziger,” Embedded Extended Visual
Fig. 8 Decrypted Secret Image Cryptography.
[15] Shyong Jian Shyu, Ming Ching Chen, ”Mininizing Pixel Expansion in
Visual Cryptographic Scheme for General Access Structure”, IEEE
ACKNOWLEDGMENT Transaction On Circuit and System for Video Technology, 2015.