Open Access Open Access  Restricted Access Subscription or Fee Access

Improving Quality of Multiple Secret Shares using GSNL Filter in Visual Cryptography

Linda Mol Ouseph, Iwin Thanakumar Joseph

Abstract


In this paper, (Embedded Extended Visual
Cryptography Scheme (EEVCS) is utilized to hide multiple secret images into two or more meaningful cover images which are called share images with no pixel expansion. The manifold secret images are concatenated and embed in the respective number of cover images.
People who congregate the multiple share images can acquire either the separated secret images or the concatenated secret images by stacking them without any complex computation. The visual quality of the stacked share is improved using general sliding neighborhood filter
(GSNL FILTER) that exploits the functionalities of sliding window protocol, pixel padding, sorting and filtering. Visual quality factors
like PSNR (Peak Signal-to-Noise Ratio), UQI (Universal Quality
Index), EME (Enhancement Measure of Entropy), SSIM (Structural Similarity of Image Measure), and Mean SSIM are determined and compared with the existing values to appraise the enhanced factors.


Keywords


Enhancement Measure of Entropy (EME), Peak Signal-to-Noise Ratio (PSNR), Structural Similarity of Image Measure (SSIM), Universal Quality Index (UQI).

Full Text:

PDF

References


A. Shamir. How to share a secret. In Communications of the ACM,

volume 22 (11), pages 612-613, 1979.

G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the

National Computer Conference, volume 48, pages 313-317, 1979.

M. Naor and A. Shamir. Visual cryptography. In EUROCRYPT '94,

Springer-Verlag Berlin, volume LNCS 950, pages 1-12, 1995.

M. Naor and B. Pinkas. Visual authentication and identification. In

CRYPTO '97, Springer-Verlag LNCS, volume 1294, pages 322-336,

C. Blundo, A. De Bonis, and A. De Santis. Improved schemes for visual

cryptography. In Designs, Codes and Cryptography, volume 24, pages

-278, 2001.

G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Visual

cryptography for general access structures. In Information and

Computation, volume 129, pages 86-106, 1996.

Y.C. Hou. Visual cryptography for color images. In Pattern Recognition,

volume 1773, pages 1-11, 2003.

S.J. Shyu, S.Y. Huang, Y.K. Lee, R.Z. Wang, and K. Chen. Sharing

multiple secrets in visual cryptography. In Pattern Recognition, volume

, Issue 12, pages 3633-3651, 2007.

P.A. Eisen and D.R. Stinson. Threshold visual cryptography schemes

with specified whiteness levels of reconstructed pixels. In Designs, Codes

and Cryptography, volume 25, pages 15-61,2002.

S. Droste. New results on visual cryptography. In CRYPTO '96,

Springer-Verlag Berlin LNCS, volume 1109, pages 401-415, 1996.

G.Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Extended

capabilities for visual cryptography. In ACM Theoretical Computer

Science, volume 250 Issue 1-2, pages 143-161, 2001.

D.S. Wang, F. Yi, and X.B. Li. On general construction for extended

visual cryptography schemes. In Pattern Recognition, volume 42, pages

-3082, 2009.

M. Nakajima and Y. Yamaguchi. Extended visual cryptography for

natural images. In WSCG Conference 2002, pages 303-412, 2002.

Z. Zhou, G.R. Arce, and G. Di Crescenzo. Halftone visual cryptography.

In IEEE Transactions on Image Processing, volume 15, NO.8, pages

-2453, 2006.

C.C. Lin and W.H. Tsai. Visual cryptography for gray-level images by

dithering techniques. In Pattern Recognition Letters, volume 24, Issue

-3, pages 349 - 358, 2003.

Zhou W. and A.C. Bovik. A universal image quality index. In IEEE

Signal Processing Letters, volume 9(3), pages 81-84, 2002.

Z.M. Wang, G.R. Arce, and G. Di Crescenzo. Halftone visual

cryptography via direct binary search. In EUSIPCO '06, 2006.

N. Krishna Prakash and S. Govindaraju. Visual secret sharing schemes for

color images using halftoning. In Proceedings of the International

Conference on Computational Intelligence and Multimedia Applications

(ICCIMA 2007), volume 3, pages 174-178, 2007.

H. Luo, F.X. Yu, J.S. Pan, and Z.M. Lu. Robust and progressive color

image visual secret sharing cooperated with data hiding. In Proceedings

of the 2008 Eighth International Conference on Intelligent Systems

Design and Applications, volume 3, pages 431-436, 2008.

H.C. Hsu, T.S. Chen, Y.H. Lin, The ring shadow image technology of

visual cryptography by applying diverse rotating angles to hide the secret

sharing, In: Proceedings of the 2004 IEEE International Conference on

Networking, Sensing & Control, Taipei, Taiwan, March 2004, pp.

–1001.

R.M. Davis, The data encryption standard in perspective, IEEE

Communications Magazine 16 (6) (1978) 5–9. [7] W. Diffie, The first ten

years of public-key cryptography, Innovations in Internetworking 76 (5)

(1988) 560–577.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.