Online Submission!

Open Journal Systems

REVIEW OF DIGITAL IMAGE SHARING BY DIVERSE IMAGE MEDIA

Mayuri Sonkusare, Nitin Janwe

Abstract


A natural-image-based VSS scheme (NVSS scheme) that shares secret images. A natural-imagebased
secret image sharing scheme (NSISS) that can share a color secret image over n - 1 arbitrary natural
images and one noise-like share image. Instead of altering the contents of the natural images, the encryption
process extracts feature images from each natural image. In order to protect the secret image from transmission
phase. (n, n) - NVSS scheme shared secret image over n-1 natural share. The natural shares will be digital image
and printed image. By extracting the features of natural shares we can prepare noise-like share. After that
encryption carried out with noise-like share and secret image. Propose possible ways to hide the noise like share
to reduce the transmission risk problem for the share. In this paper Initially Feature Extraction process has been
performed for Natural Shares. Here Digital image and Printed image have been used as Natural Shares. With
that extracted features secret image will be encrypted by (n, n) - NVSS scheme where process carried by (n-1)
natural shares. This Encrypted result will be hided using Share-Hiding Algorithm where generated the QR code.
In the Recovering of the secret image will be done by Share Extraction Algorithm and also decryption
algorithm. Finally the secret image with all pixels has been obtained. This proposed possible ways to hide the
noise like share to reduce the transmission risk problem for the share.


Full Text:

PDF

References


M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.

R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun., vol. 283, no. 21, pp. 4242–4249, Nov. 2010.

P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011.

K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–2, pp. 143–161, Jan. 2001.

C. N. Yang and T. S. Chen, “Extended visual secret sharing schemes: Improving the shadow image quality,” Int. J. Pattern Recognit. Artif.Intell., vol. 21, no. 5, pp. 879–898, Aug. 2007.

K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 219–229, Feb. 2012.

Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453, Aug. 2006.

Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009. [10] I. Kang, G. R. Arce, and H. K. Lee, “Color extended visual cryptography using error diffusion,” IEEE Trans. Image Process., vol. 20, no. 1, pp. 132–145, Jan. 2011.

F. Liu and C. Wu, “Embedded extended visual cryptography schemes,”IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322, Jun. 2011.

T. H. Chen and K. H. Tsao, “User-friendly random-grid-based visual secret sharing,” IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 1693–1703, Nov. 2011.

T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images,” Digit. Signal Process., vol. 21, no. 6, pp. 734–745, Dec. 2011.




DOI: http://dx.doi.org/10.6084/ijact.v4i7.20

Refbacks

  • There are currently no refbacks.




Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"