Open Access   Article Go Back

Secret sharing scheme Circular Visual Cryptography for Color Images - Survey

Sudhir Parmar1 , Sheshang D Degadwala2 , Nimit Modi3

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 903-906, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.903906

Online published on Nov 30, 2018

Copyright © Sudhir Parmar, Sheshang D Degadwala, Nimit Modi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sudhir Parmar, Sheshang D Degadwala, Nimit Modi, “Secret sharing scheme Circular Visual Cryptography for Color Images - Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.903-906, 2018.

MLA Style Citation: Sudhir Parmar, Sheshang D Degadwala, Nimit Modi "Secret sharing scheme Circular Visual Cryptography for Color Images - Survey." International Journal of Computer Sciences and Engineering 6.11 (2018): 903-906.

APA Style Citation: Sudhir Parmar, Sheshang D Degadwala, Nimit Modi, (2018). Secret sharing scheme Circular Visual Cryptography for Color Images - Survey. International Journal of Computer Sciences and Engineering, 6(11), 903-906.

BibTex Style Citation:
@article{Parmar_2018,
author = {Sudhir Parmar, Sheshang D Degadwala, Nimit Modi},
title = {Secret sharing scheme Circular Visual Cryptography for Color Images - Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {903-906},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3265},
doi = {https://doi.org/10.26438/ijcse/v6i11.903906}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.903906}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3265
TI - Secret sharing scheme Circular Visual Cryptography for Color Images - Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Sudhir Parmar, Sheshang D Degadwala, Nimit Modi
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 903-906
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
602 330 downloads 238 downloads
  
  
           

Abstract

Information Security ensures mathematical techniques and related aspects to provide for confidentiality, data security, entity authentication and data origin authentication. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. Circular Random Grids extends the functionality by hiding more data in circular grids to provide confidentiality and secrecy without risking suspicion of an intruder. The proposed scheme complies with the methodology of secret sharing scheme where secret information is divided into various shares in meaningless form and is further recovered on overlapping printed transparencies with the shared information on it. Each of them is then validated for authenticity. An attempt has been made to use circular rings to embed the secret information with certain angular rotation and validation of the individual cipher shared in order to avoid cheating. In this paper we are describe every methods of VCS and presented its comparative study using advantages and disadvantages.

Key-Words / Index Term

Visual cryptography, Random grid, Circular girds, Q’tron neural networks traditional visual cryptography, circular visual cryptography, hierarchical visual cryptography

References

[1] Sandeep Gurung and Mrinaldeep “ChakravortMultiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network”. Springer-2018[1]
[2] Abhishek Mishra & Ashutosh Gupta “ Multi secret sharing scheme using iterative Method”. 12 Apr 2018 Elsevier[2]
[3] Bibhas Chandra Das, Md Kutubuddin Saradr, Avishek Adhikari “Efficient Constructions for t-(k; n)-Randon Grid Visual Cryptographic Schemes”. 2017 IEEE[3]
[4] Tzung-Her Chen , Kuang-Che Li “Multi-image encryption by circular random grids”. 2009 Elsevier[4]
[5] Sandeep Gurung, Mrinaldeep Chakravorty, Abhi Agarwal, M K “Multiple Information Hiding using Circular Random Grids”.2015Elsevier[5]
[6] Sandeep Gurung, Bijoy Chhetri, Mrinal Kanti Ghose “A Novel approach for Circular Random Grid with Share Authentication”. 2015 IEEE[6]
[7] S. D. Degadwala and S. Gaur “Metadata of the chapter that will be visualized in SpringerLink”. Springer-2018[7]
[8] Shyong Jian Shyu “ Visual Cryptograms of Random Grids for General Access Structures”. 2012 IEEE[8]
[9] Sandeep Gurung,Gaurav Ojha,M K Ghose “ Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding”. May 2013 IJETAE[9]
[10] Sandeep Gurung, Mrinaldeep Chakravorty, Abhi Agarwal, M K Ghose “Multiple Information Hiding using CircularRandomGrids”.2015Elsevier[10]