Open Access   Article Go Back

Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares

Jasvant Kumar1 , Suresh Prasad Kannojia2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-5 , Page no. 1-6, May-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i5.16

Online published on May 31, 2021

Copyright © Jasvant Kumar, Suresh Prasad Kannojia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jasvant Kumar, Suresh Prasad Kannojia, “Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.1-6, 2021.

MLA Style Citation: Jasvant Kumar, Suresh Prasad Kannojia "Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares." International Journal of Computer Sciences and Engineering 9.5 (2021): 1-6.

APA Style Citation: Jasvant Kumar, Suresh Prasad Kannojia, (2021). Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares. International Journal of Computer Sciences and Engineering, 9(5), 1-6.

BibTex Style Citation:
@article{Kumar_2021,
author = {Jasvant Kumar, Suresh Prasad Kannojia},
title = {Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2021},
volume = {9},
Issue = {5},
month = {5},
year = {2021},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5329},
doi = {https://doi.org/10.26438/ijcse/v9i5.16}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i5.16}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5329
TI - Mutated Random grid Approach to Share Secret Image into Visually Pleasing Shares
T2 - International Journal of Computer Sciences and Engineering
AU - Jasvant Kumar, Suresh Prasad Kannojia
PY - 2021
DA - 2021/05/31
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 5
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
481 379 downloads 124 downloads
  
  
           

Abstract

Visual cryptography is a technique to diffuse and disguise a secret image into a 2D pattern of black and white pixels, called shares. Individual or any k-1 shares have no clue about the secret image, but any k shares out of n, can decode the secret image. These meaningless shares are subject to suspect for the intruders. Stacking of shares reconstructs the secret image populated with noisy pixels. In addition to these traditional visual cryptography suffer with pixel alignment problem. To resolve these problems this paper proposes a (2, 2) mutated random grid approach to share a secret image into visually pleasing shares. The solution to the problem is based on assignment of instances of random two dimensional matrix of binary numbers and its XOR operation with respective pixels with auxiliary gray image. It requires lightweight computing device to decode the secret image. Comparative analysis of the experimental results with that of existing fundamental approaches shows that proposed approach performs better.

Key-Words / Index Term

Visually Pleasing Shares, Mutated Random grids, XOR, Visual Secret Sharing, Light weight Computation, Pixel Expansion, Contrast-loss

References

[1] M., Naor, and A. Shamir, “Visual cryptography”, In Workshop on the Theory and Applicationof of Cryptographic Techniques Springer, Berlin, Heidelberg, pp. 1-12, 1994
[2] Ateniese G, Blundo C, De Santis A, Stinson DR,”Visual cryptography for general access structures”, Information and Computation. Vol.129, Issue.2, pp.86-106, 1996 Sep 15
[3] Liu F, Wu C, Lin X., “Step construction of visual cryptography schemes”, IEEE Transactionson Information Forensics and Security, Vol.5, Issue.1, pp.27-38, 2010
[4] Ateniese G, Blundo C, De Santis A, Stinson DR, “Extended capabilities for visual cryptography”, Theoretical Computer Science, Vol.250.Issue.1, pp.143-161, 2001 Jan 6
[5] Lee KH, Chiu PL., “An extended visual cryptography algorithm for general access structures”, ieee transactions on information forensics and security, Vol.7, Issue.1, pp.219-229, 2012
[6] Zhou Z, Arce GR, Di Crescenzo G., “Halftone visual cryptography. IEEE transactions onimage processing”, Vol.15, Issue.8, pp.2441-2453, 2006 Aug
[7] Wang Z, Arce GR, Di Crescenzo G., “Halftone visual cryptography via error diffusion”, IEEEtransactions on information forensics and security, Vol.4, Issue.3, pp.383-396, 2009 Sep
[8] Hofmeister T, Krause M, Simon HU., “Contrast-optimal k out of n secret sharing schemes invisual cryptography”,. Theoretical Computer Science, Vol.240, Issue.2, pp.471-485, 2000 Jun 17
[9] Krause M, Simon HU., “Determining the optimal contrast for secret sharing schemes invisual cryptography”, Combinatorics, Probability and Computing, Vol.12, Issue.3, pp.285-299, 2003 May
[10] Ito R, Kuwakado H, Tanaka H., “Image size invariant visual cryptography”, IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol.82, Issue.10, pp.2172-2177, 1999 Oct 25
[11] Cimato S, De Prisco R, De Santis A., “Probabilistic visual cryptography schemes”, TheComputer Journal, Vol.49, Issue..1, pp.97-107, 2005 Dec 1
[12] Yang, Ching-Nung., “New visual secret sharing schemes using probabilistic method.” Pattern Recognition Letters, Vol.25, Issue.4, pp.481-494, 2004
[13] Kafri, O., and Keren, E. “Encryption of pictures and shapes by random grids”, Optics letters, Vol.12, Issue.6, pp.377-379, 1987
[14] Shyu, S. J., “Image encryption by random grids”, Pattern Recognition, Vol.40, Issue.3, pp.1014-1031, 2007
[15] Shyu, S. J., “Image encryption by multiple random grids”, Pattern Recognition, Vol.42, Issue.7, pp.1582-1596, 2009
[16] Wu X, Sun W., “Generalized random grid and its applications in visual cryptography”, IEEE Transactions on Information Forensics and Security, Vol.8, Issue.9, pp.1541-1553, 2013 Sep
[17] Wu, X., and Sun, W., “Random grid-based visual secret sharing for general access structures with cheat-preventing ability”, Journal of Systems and Software, Vol.85, Issue.5, pp.1119-1134, 2012
[18] Chen, T. H., and Tsao, K. H., “Visual secret sharing by random grids revisited. Pattern Recognition, Vol.42, Issue.9, pp.2203-2217, 2009
[19] Wu, X., and Sun, W., “Random grid-based visual secret sharing with abilities of OR and XOR decryptions”, Journal of Visual Communication and Image Representation, Vol.24, Issue.1, pp.48-62, 2013
[20] Tuyls, P., Hollmann, H. D., Van Lint, J. H., and Tolhuizen, L. M. G. M., “XOR-based visual cryptography schemes. Designs, Codes and Cryptography”, Vol.37, Issue.1, pp.169-186, 2005
[21] Wu X, Sun W., “Improving the visual quality of random grid-based visual secret sharing”, Signal Processing., Vol.93, Issue.5, pp.977-995, 2013 May 31
[22] Wu, X., Ou, D., Dai, L., and Sun, W., “Xor-based meaningful visual secret sharing by generalized random grids”, In Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 181-190, 2013
[23] Pang L, Miao D, Lian C., “Userfriendly randomgridbased visual secret sharing for generalaccess structures” Security and Communication Networks, Vol.9, Issue.10, pp.966-976, 2016 Jul 10
[24] S.B. Bhagate, P.J. Kulkarni, "Construction of Basis Matrices for (k, n) and Progressive Visual Cryptography Schemes", International Journal of Computer Sciences and Engineering, Vol.06, Special Issue.01, pp.43-47, 2018
[25] Komal S. Patil, Suhas B. Bhagate, "Progressive Visual Secret Sharing Scheme for QR Code Message", International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.882-887, 2019.