Author : Chaitanya Khoje 1
Date of Publication :7th April 2016
Abstract: Visual Secret Sharing Scheme deals with hiding a confidential/secret image in arbitrarily selected natural images called as shares. Sharing and delivering secret images is also known as a visual secret sharing scheme (VSSS). The standard VSSS suffers from a risk for the secret image being tampered during the transmission process. To address this problem, we are proposing a natural image-based Visual Secret Sharing Scheme that shares secret images via various carrier media to protect the secret and the participants during the transmission process. This scheme deals with the transmission of one digital secret image over n-1 arbitrary images that produce a noise image which is further concealed by embedding it into a Quick Response (QR) code image. The embedding process involves usage of an encoding/decoding technique. This allows us to transfer the secret image over insecure exchange media. During the decryption process the attacker has to read the QR code first and then he needs all the arbitrary shares used in the encryption process to reveal the concealed image as the output will be a noise image.
Reference :
-
- F. Liu and C. Wu, “Embedded extended visual cryptography schemes”, IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307322, Jun. 2011.
- Kang, G. R. Arce, and H. K. Lee,”Color extended visual cryptography using error diffusion”, IEEE Trans. Image Process., vol. 20, no. 1, pp. 132145, Jan. 2011.
- T. H. Chen and K. H. Tsao, User-friendly random-gridbased visual secret sharing, IEEE Trans. Circuits Syst. Video Technol., vol. 21, no. 11, pp. 16931703, Nov. 2011
- T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images, Digit. Signal Process, vol. 21, no. 6, pp. 734745, Dec. 2011.
- Archana B. Dhole*, Prof. Nitin J. Janwe, An Implementation of Algorithms in Visual Cryptography in Images, Volume 3, Issue 3, 2250-3153, March 2013.
- G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Extended capabilities for visual cryptography, Theoretical Comput. Sci., vol. 250, nos. 12, pp. 143161, Jan. 2001.
- Kai-Hui Lee; Pei-Ling Chiu, "Digital Image Sharing by Diverse Image Media," in Information Forensics and Security, IEEE Transactions on , vol.9, no.1, pp.88-98, Jan. 2014.