Open Access Open Access  Restricted Access Subscription or Fee Access

A Simple Algorithm for Grayscale Images using Visual Cryptography

N. S. Raghava, Jatin Kataria, Ashish Gupta, Ashish Maheshwari

Abstract


Visual Cryptography is a secret-sharing scheme that uses human visual system to perform complex computations. In this paper, first the background with the Visual Cryptography Scheme (VCS) has been established and the fundamental concepts have been explained. Then, a VCS algorithm has been presented to encode a grayscale image which uses a different approach from the traditional ones.


Keywords


Image Sharing, Secret Sharing Schemes, Visual Cryptography, Visual Cryptography Scheme (VCS)

Full Text:

PDF

References


M. Naor and A. Shamir, Visual Cryptography ii: Improving the contrast via the cover base. Theory of Cryptography Library, (96-07), 1996.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson(1996)Constructions and bounds for visual cryptography. In Proc. ICALP 1996,Paderbon, Germany, July 8-12, LNCS 1099, pp. 416-428, Springer Verlag.

Blundo, C., DíArco, P., DeSantis, A.and Stinson, D.R.(2003) Contrast optimal threshold visual cryptography schemes. SIAM J.Discrete Math.,16, 224-261.

Blundo, C., De Bonis, A. and De Santis, A.(2001) Improved Schemes for visual cryptography. Design Code Cryptograph, 24, 255-278.

Kuhlmann, C. and Simon, H.U.(2000)Construction of visual Secret sharing schemes with almost optimal contrast. In Proc. 11th ACM-SIAM Symp. Discrete Algorithms, San Francisco, USA, January 9-11, pp. 262-272, SIAM.

Krause, M. and Simon, H. U. (2003) “Determining the optimal Contrast for secret sharing schemes in visual cryptography,” Comb, Probab.Comput., 12, 285-299.

Bruice Schneier “Applied Cryptography” Second Edition, pp.44-46,2007.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, “Visual cryptography for general access structures,” Information and Computation, Vol. 129, pp. 86-106, 1996.

G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, “Constructions and bounds for visual cryptography,” Proceedings of the 23 International Colloquium on Automata Languages and Programming, pp. 416-428,

C. Blundo and A. De Santis, “Visual cryptography schemes with perfect reconstruction of black pixels,” Comput. & Graphics, Vol. 22, No. 4, pp.449-455, 1998.

S. Droste, “New results on visual cryptography,” Advances in cryptography: CRYPT’96, Lecture Notes in Computer Science, No. 1109,Springer-Verlag, pp. 401- 415, 1996.

C.-C. Lin, and W.-H. Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognition Letters, Vol.24, issue 1-3,pp.349-358, 2003.

M.Nakajima, and Y. Yamaguchi, “Extended visual cryptography for natural images,”Proceedings of the 10th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, University of West Bohemia, Czech Republic, pp.303-340, 2002.

W.G.tzeng, and C.M.Hu, “A new approach for visual cryptography,”Designs, Codes and Cryptography, Vol 27, pp. 207-227, 2002.

On the contrast in visual cryptography Journal of Cryptology 12 (1999),261-289.

Y.C.Hou, “Visual cryptography for colour images”, Vol 36, pp.1619-1629,2003

C.N.Yang and C.S.Laih, “New colored visual secret sharing schemes,”Designs, Codes and Cryptography, Vol. 20, No.3, pp.325-335, 2000.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.