Open Access Open Access  Restricted Access Subscription or Fee Access

A New Robust Image Cryptography Technique using Fractal Theory

T. Sudha, B. Gopi

Abstract


In this paper an attempt has been made to design a
cryptography scheme based on fractal theory. The visual cryptography scheme was implemented in such way that the secrete image will be encoded into a form where intruder finds at most difficulty to trace out the secrete image. In this technique the original or the secrete image has been divided into a number of sub images called share images. The
share images are formed by taking a dummy image called host image and inserting the share or part of the secrete image. At the other end of the communication, from these share images, the shares will be separated and will be merged to form the original image. With this
technique to transmit an image twice the memory of the secrete image size is required. By incorporating subjective tests the results are proved to better than the existing spatial domain techniques. The proposed technique can be extended by implementing using robust transforms. The objective test metrics need to be designed so that the evaluation can be done effectively.


Keywords


Cryptography, Image Coding, Fractal, Share Generation.

Full Text:

PDF

References


M. Naor and A.Shamir, 1995. Visual cryptography. Advances in

Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,

(950):1–12.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, “Visual

cryptography for general access structures,” Information and

Computation, Vol. 129, pp. 86-106, 1996

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, “Contructions

and bounds for visual cryptography,” Proceedings of the 23rd

International Colloquium on Automata Languages and Programming, pp.

-428, 1996.

C. Blundo and A. De Santis, “Visual cryptography schemes with perfect

reconstruction of black pixels,” Comput. & Graphics, Vol. 22, No. 4, pp.

-455, 1998.

S. Droste, “New results on visual cryptography,” Advances in

cryptography: CRYPT’96, Lecture Notes in Computer Science, No. 1109,

Springer-Verlag, pp. 401- 415, 1996.

M. Naor and A. Shamir, “Visual cryptography: improving the contrast via

the cover base,” presented at Security in Communication Networks, Sept.

Y. C. Hou, “Visual cryptography for color images,”Pattern Recognition,

Vol. 36, pp.1619-1629, 2003.

V. Rijmen and B. Preneel, “Efficient colour visual encryption for shared

colors of benetton,” Eurocrypto’96, Rump Session, Berlin, 1996.

S. J. Shyu, “Efficient visual secret sharing scheme for color images,”

Pattern Recognition, Vol. 39, pp. 866-880, 2006.

E.R. Verheul and H.C.A. van Tilborg, “Constructions and properties of k

out of n visual secret sharing schemes,” Designs, Codes and

Cryptography, Vol. 11, No. 2, pp. 179-196, 1997.

C. N. Yang and C. S. Laih, “New colored visual secret sharing schemes,”

Designs, Codes and Cryptography, Vol. 20, No. 3, pp. 325-335, 2000.

Kenneth Falconer, “FRACTAL GEOMETRY Mathematical Foundations

and Applications”, John Wiley & Sons Ltd, The Atrium, Southern Gate,

Chichester, West Sussex PO19 8SQ, England, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.