CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data

Author:

Sherine Anli1ORCID,Peter Geno2ORCID,Stonier Albert Alexander3ORCID,Praghash K.4ORCID,Ganji Vivekananda5ORCID

Affiliation:

1. School of Computing and Creative Media, University of Technology Sarawak, Malaysia

2. CRISD, School of Engineering and Technology, University of Technology Sarawak, Malaysia

3. Department of Electrical and Electronics Engineering, Kongu Engineering College, India

4. Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, India

5. Department of Electrical and Computer Engineering, Debre Tabor University, Ethiopia

Abstract

Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares. For security reasons, it ensures that hackers cannot find any clues about the secret image from a single cover image. The proposed technique uses CMY (cyan, magenta, yellow) color space to enhance visual cryptography, and mean visual cryptography can be used on color images. The other techniques used were color decomposition and error diffusion. Error diffusion is a type of half toning in which the quantization residual is distributed to neighboring pixels that have not yet been processed. The image will be encrypted by four shares which is cyan, magenta, yellow, and mask. Mask will be using random function to random generate half black and half white pixel in 2 × 2 block. Stack all the shares for reviewing the secret image. After that, do the image preprocessing of the image and use OCR (optical character recognition) to recognize the message.

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Reference17 articles.

1. Secret sharing using visual cryptography;C.-C. Chang;Journal of Electronic Science and Technology,2010

2. Visual cryptography. Improving the Contrast via the Cover Base;M. Naor;Presented at Security in Communication Networks,1997

3. Visual cryptography;D. Rijmenants,2004

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3