Sie sind auf Seite 1von 13

International Journal of Application or Innovation in Engineering & Management (IJAIEM)

Web Site: www.ijaiem.org Email: editor@ijaiem.org


Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

A SURVEY ON VISUAL CRYPTOGRAPHY


TECHNIQUES
M.SIVA KUMAR1, A.SHILPA2, J.R.VIJAYALAKSHMI3
1,2,3

Department of Computer Science and Engineering,


Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India.

ABSTRACT
Visual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual
Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned
participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which
performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security,
quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but
later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used
different techniques for visual cryptography from 2011 to 2015.

Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares.

1.INTRODUCTION
Visual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic technique
which allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way that
the decryption can be performed by thehuman visual system, without the aid of computers.
This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into
consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansion
results in smaller size of the share. Encoding multiple secret images in to the same share images requires less overhead
while sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over the
communication channels.
This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visual
cryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme.
1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME:
Naor and Shamirs proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel is
white one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the
below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into two
whiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secret
image is shown only when both of the images became shares are upper imposed.

Figure 1 Black and White image VCS

Volume 5, Issue 2, February 2016

Page 100

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

Table 1: Construction of Black and White image VC

To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hiding
schemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages,
embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fang
recommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and OR
operation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .The
disadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share large
amounts of confidential messages several shares have to be generated.
1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME:
The (2, 2)VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption
process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In the
decryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold
visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size of
decrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality of
halftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filing
curve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray level
image is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the case
of (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed
by mound binary shares.
254: [1 1 1 1 1 1 1 0]
Table 2-Construction of gray scale image VC

Share1 (1st half): 0 1 0 1 0 1 0 0


Share2 (1st half): 1 0 1 0 1 0 1 0
-------------------1 1 1 1 1 1 1 0 = 254
Share3 (1st half) : 0 0 1 0 0 1 0 0
Share1 (2nd half): 1 1 0 1 1 0 1 0
------------------1 1 1 1 1 1 1 0 = 254
Share2 (2nd half): 1 1 1 0 1 1 1 0
Share3 (2nd half): 1 0 0 1 0 1 0 0
------------------1 1 1 1 1 1 1 0 = 254

Volume 5, Issue 2, February 2016

Page 101

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

Secret image

share1
share2
Figure 2 Gray scale image VCS
Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives
perfect high quality image when reconstructed without any loss of contrast.
1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME:
Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual
cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with the
concept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel is
transformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly one
color region colored, and all the other color regions are black. The color of one pixel depends on the interrelations
between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c 3.
Yang and Laihimproved the pixel expansion to c 2 of Verheul and Van Tilborg . But in both of these schemes share
generated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmit
secret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image two
significant color images areselected as cover images which are the same size as the secret color image. Then according
to a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantage
of this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in the
secret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a
secret color image sharing scheme based on modified visual cryptography.
Table 3: Construction of color image VC

Figure 3 Color image VCS

Volume 5, Issue 2, February 2016

Page 102

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

2. ANALYSIS OF VARIOUS VISUAL CRYPTOGRAPHY SCHEME:


Table 4: Table for Visual Cryptography problems and solving techniques
AUTHOR NAME

TITLE AND YEAR

METHOD TO SOLVE

PROBLEM

Xuehu Yan et al

Halftone Visual Cryptography


With Minimum Auxiliary
Black Pixel & Uniform Image
Quality
2015
A New Visual Cryptography
Technique For Color Images
2015
A Secure Authentication Using
Visual Cryptography
& Steganography
2015
Feed Forward Networks In
Color Extended Visual
Cryptography To
Generate Meaningful Shares
2015
Secure Authentication By
Image Processing And Visual
Cryptography For Banking
Applications.
2015
Security Approach By Using
Visual Cryptographic
Technique
2015
Steganography Using Genetic
Encryption Along With Visual
Cryptography
2015
Visual Cryptography Scheme
For Color Image Using K-N
Secret Sharing Algorithm
2015

HVCS(Halftone Visual Cryptography


Scheme)

Error diffusion

P.G.Haritha et al

Ms.Deepti
Chaudhary et al

J. Ida Christy et al

AlfiyaSaiyyad et al

RiteshD.Yelane et
al

ShrutiSekra et al

SujitAhirrao et al

Sankar Das et al

Fersna et al

AparnaBhosale et
al

Jainthi.K. et al

Visual Cryptography using


Three Independent Shares in
Color Images
2015
Progressive VCS Without Pixel
Expansion For Color Images
2015

Reducing Transmission Risk


Using Diverse Image
Media
2015
A Novel Cryptographic
Technique That Emphasis
Visual

Volume 5, Issue 2, February 2016

VSS
Error Diffusion
Chen technique
Steganography(LSB)
VC (k,n)

EVCS

Large auxiliary
black pixel
distribution
Visual quality
Pixel expansion
Contrast loss
Authenticity

Random pixel
management

ColorHalftoning
Pixel expansion
Image processing

Authenticity

Correlation method

EVCS

Information
security

Halftone
Steganography (using LSB-Genetic
algorithm)
VCS
K n secret sharing algorithm

Contrast
Authenticity

Malicious attacks

Secure Visual Crytography


Water Marking(LSB)
(3,3)VCS
Random insertion of bits

Reconstruction of
secret message

Floyds error diffusion Halftone


Progressive Visual Cryptography

Pixel expansion

Halftone

Security

Digital watermarking algorithms

Contrast

(n,n) NVSS(natural image based VSS


scheme)

Transmission risk
problem

K out of k (EVCS)

Security

Floyds steinberg error diffusion

Visual quality

Page 103

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
Quality And Efficieny By Floyd
Steinberg Error
Diffusion Method
2015

ISSN 2319 - 4847

algorithm
Contrast
Random grids
Size
Halftone

Ketanraukundiya et
al

Vandhana.G.Pujari
et al

Alkhamohan et al

F.R.Shiny Malar

Kai-Hui Lee et al

Che-Wei Lee et al

Kai-Hui Lee et al

HaoLuo et al

Cheng-Chi Lee et
al
Shruti M.
Rakhunde

Jyoti Rao et al

Secure System Framework for


Secure Visual
Cryptography
2015
Novel Approach for Visual
Cryptography Using Adaptive
Local
Filter
2015
Contrast Enhancement in Color
Extended Visual Cryptography
2015
Secured Privacy Preserving
Mechanism for Distributed
Digital Documents
2015
Digital Image Sharing by
Diverse Image Media
2014
A Secret-Sharing-Based
Method for Authentication
of Grayscale Document Images
via the Use of the
PNG Image With a Data Repair
Capability
2014
Sharing Visual Secrets in
Single Image Random Dot
Stereograms
2014
Color Transfer In Visual
Cryptography
2014
A new Visual Cryptography
with Multi-level Encoding
2014
Reversible Data Hiding Using
Visual Cryptography: A
Review
2014
Survey Of Visual Cryptography
Schemes Without
Pixel Expansion
2014

Steganography(LSB)

Quality of
reconstructed
image
Pixel expansion

(CRT)Chinese Remainder Theorem

Security

RNS(Residual Number System)


Adaptive local filters

Image quality
Quality of
decrypted image

ABM(Additional Basis Matrix)

Contrast loss

Visual cryptic filtering scheme

Pixel
reconstruction
Image quality

Error transformission technique

Security

(n,n) NVSS (Natural Visual Secret


Sharing)

Transmission risk
problem

Shamir secret sharing scheme

Image
authentication

BVCS(Binocular Visual
Cryptography Scheme)

Transmission risk
problem

SIRDSS(Single Image Random Dot


Stereograms
(k-n)Secret Sharing Algorithm

Computational
complexity

VSS(Visual Secret Sharing)

Pixel expansion

RDH(Reversible Data Hiding)

Lossless image

SDS(Seiving-Divison Shuffling)
Algorithm

Encryption/decrypti
on cost

Wu chen Scheme

Pixel expansion

Shyu et al scheme

Count of secret
image shares

Xia oyu et al Scheme


Share generation

Volume 5, Issue 2, February 2016

Page 104

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

K.V.Ramana et al

Error Diffusion Based Color


Visual Cryptography For
Secure Communication
2014

Tsungleihlin,horng-lee chen et al
scheme
Error diffusion
VIP Synchroniztion

ISSN 2319 - 4847

Less visual quality


of meaningful and
meaningless shares

Floyds and Steinberg error filters

Shekhachenthara et
al

LekhikaChettri

T.Anuradha et al

A Novel Approach On Color


Extended Visual Cryptography
For General Access Structures
Using Error Diffusion
2014
Visual Cryptography Scheme
Based On Pixel
Expansion for Black & White
Image
2014

A Novel Gaussian Error


Diffusion based Colour
Extended Visual Cryptography
2014

Color diffusion
PVC watermarking

Quality of
Meaningful share

(2,2) Visual cryptography algorithm

Pixel expansion

K out of k Visual Cryptography


Scheme

Security
Contrast

Color EVCS

Quality of shares

Gaussion Error Diffusion

Security

PSNR(Peak Signal to Noise Ratio)

Performace

NCC(Normalized Correlation
Cofficient)

Bharanivendhan .N
et al

Visual Cryptography Schemes


for Secret Image Sharing
using GAS Algorithm
2014

MSE(Mean Square Environment)


GAS algorithm

Visual quality

Stamping algorithm

Security
Resolution of
shares

Dhara Trivedi et al

ShyongJianShyu

ShyongJianShyu et
al

Kai-Hui Lee et al

Roberto De Prisco
et al

Pixel expansion
Authenticity

Visual Cryptography in
Biometrics Passport
2014

Bio metricies

Visual Cryptograms Of
Random Grids For General
Access Structures
2013
General Constructions For
Threshold Multi-Secret Visual
Cryptography Scheme
2013
Image Size Invariant Visual
Cryptography For General
Access Structures Subject To
Display Quality Constraints
2013
Color Visual Cryptography
Scheme for Black and White

VCRG-GAS(Visual Cryptograms Of
Random Grids For General Access
Structures)

Pixel expansion

(k,n,s,R)MVCS(Multi-Secret Visual
Cryptography Scheme)

Pixel expansion

Volume 5, Issue 2, February 2016

Security

ILP(Integer Linear Programming)


SIVCS(Size Invariant Visual
Cryptography Scheme)

CBW-VC(Color-Black And White)


Visual Cryptography

Pixel expansion
Uncontrollable
display quality
problem
Pixel expansion

Page 105

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
Secret Images
2013

Peng Li et al

Th. Rupachandra
Singh et al

Grishma R.
Bhokare et al

Dr.V.R.Anitha et al

Anuprita U. mande

Sharing More Information in


Gray VCS
2013

Video Watermarking Scheme


Based Visual Cryptography
And Scene Change & Detection
2013
Color Extended Visual
Cryptography Using Error
Diffusion With VIP
Synchronization
2013
Extending The Visual
Cryptography Algorithm Using
Image
Watermarking Technique
2013
Parameter Evaluation and
Review of Various
Error-Diffusion Half toning
algorithms used in
Color Visual Cryptography
2013

ISSN 2319 - 4847

BW-VC(Black And White) Visual


Cryptography
SHIGVCS(Sharing More Information
in Gray VCS)

Visual quality
Pixel expansion

PSSS(Polynomial-based Secret
Sharing Scheme)
Video watermarking scheme

Video pre
processing

Error diffusion

Visual quality

VIP Synchronization

Color shares

(k-n) Secret Sharing Algorithm

Pixel expansion

Watermarking

Pixel expansion
Display quality

(E-D) algorithms

Contrast loss

Floyds-stengberg halftone algorithm

Perceived loss

Jarvis halftone algorithm


Stucki halftone algorithm
Modification
Floyds-stengberg halftone algorithm

Anuprita U. mande

A Fast Encryption Algorithm


for Color Extended Visual
Cryptography
2013

Faster and easier color VC encryption


method
Floyds-stengberg halftone algorithm

Contrast
Image (visual)
quality

Jarvis halftone algorithm


Stucki halftone algorithm

Sathiya k et al

Dr.V.R.ANITH et
al

Comparison of Visual
Cryptographic
Algorithms for Quality Images
Using XOR
2013

Extending the Visual


Cryptography Algorithm
Without Removing Cover
Images

Volume 5, Issue 2, February 2016

Modification
Floyds-stengberg halftone algorithm
Floyds-stengberg halftone algorithm

Visual quality

Javris halftone algorithm


Stucki halftone
Algorithm
Pixel reversal technique
EVCS without Remove cover image

Management
problem
Pixel expansion

Page 106

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
SonalWange

MitsuguIwamoto

Ching-Nung Yang
et al

Amir Kolaman et
al

Duan-Yu Chen et
al

Kai - H ui L e e et
al

PankajaPatil et al

Anshul Sharma

Ananthakumar
Kendra et al

2013
A Visual Cryptography to
Secure Biometric Database: A
Review
2013
A Weak Security Notion For
Visual Secret Sharing Scheme
2012
K Out N Region Incrementing
Scheme In Visual Cryptography
2012
Quaternion Structured
Similarity A New Quality Index
For Color Images
2012

Visual Depth Guided Color


Image Rain Streaks Removal
Using Sparse Coding
2012
An Extended Visual
Cryptography For General
Access Structures
2012
Visual Cryptography For
Color Images Using Error
Diffusion And Pixel
Synchronization
2012
Performance Of Error Filters In
Halftone
Visual Cryptography
2012
An Improved (8, 8) Colour
Visual Cryptography Scheme
Using
Floyd Error Diffusion
2012

ISSN 2319 - 4847

Biometric identification technique

Authentication

WS-VSS
US-VSS

Contrast loss

RIVCS(Region Incrementing scheme


In Visual Cryptography Scheme)

Pixel expansion
Wang schemeIncorrect color
problem

VQM(Visual Quality Matrix)

Image quality

QTP(Quaternion Image Processing)


QSSIM(Quaternion Structured
SIMilarity
Rain removal framework

Rain removal

Sparse coding
EVCS(Extended Visual Cryptography
Scheme)
Stamping algorithm

Error diffusion

Pixel expansion,
Display quality,
Random pixel
management
problem
Low frequency
difference

VIP Synchronization
Visual contrast
Javris and Floyds error diffusion
Error diffusion filters

Image quality of
halftone shares

(PSNR&UQI)
Authentication

VIP
Synchroniztion

Security
CRC Algorithm
Color VC
Error diffusion

Manimurugan.S et
al

Visual Cryptography Based On


Modified
RLE Compression without
Pixel Expansion
2012

RLE compression

Pixel expansion
Decrypted image
quality
Security

Anushal Sharma et
al

Performance of Error Filters on


Shares in Halftone
Visual Cryptography via Error
Diffusion
2012

Volume 5, Issue 2, February 2016

All Error Diffusion Algorithm


Sierra,Stevenson-Arce error filters

Visual quality
Contrast

Page 107

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016
InKoo Kang et al

Tzung-Her Chen et
al

ShyongJianShyu et
al

Velmurugan.N et
al
N Krishna Prakash
et al

MorampudiNaresh
kumar et al

Shiny Malar. F R et
al

Color Extended Visual


Cryptography Using Error
Diffusion
2011
User Friendly Random Grid
Based Visual Secret Sharing
2011

ISSN 2319 - 4847

Visual information pixel (VIP)


synchronization

Low visual quality


of shares

Error diffusion
RGVSS(Random Grid Based Visual
Secret Sharing)

Pixel expansion

Optimum Pixel Expansion For


Threshold Visual Secret
Sharing Scheme
2011
Visual Pixel Expansion of
Secret Image
2011
Visual Cryptography Scheme
For Color Images
Using Half Toning Via Direct
Binary Search With Adaptive
Search And Swap
2011

ILP(Integer Linear Programming)

A Novel Approach For


Cheating Prevention
Through Visual Cryptographic
Analysis
2011
Error Filtering Schemes for
Color Images in Visual
Cryptography
2011

Robust Cheating Prevention


Algorithm

Cheating problem

Visual cryptic filtering Scheme

Quality of image

Fourier transform

Blurring effects

VCSOR
VCSXOR
Direct Binary Search(DBS) with
adaptive search and swap method

Pixel expansion

Pixel expansion
Small contrast
Quality of halftone
image
Computational
compexity

Pixel expansion

3.PROPOSED METHODOLOGY
Proposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3D
images.
3.1 Halftone Image Creation
In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp).
Then the original image is halftoned using Floyd Steinberg algorithm. In this algorithm takes less time to perform
halftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and also
highly contrasted.
3.2 Share Generation
In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number of
transparency shares are generated and every share was saved. These shares are same size, pixel and different in
transparency levels and also meaningful images.
3.3 Reconstruction
In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The final
reconstructed images is highly contrasted and free from pixel expansion problem.

4. FUTURE SCOPE:
We had suggested a future development of VC scheme to,
1.Apply VC for videos.
2. Using MSB algorithm in steganography for encoding and decoding in VC.
4.1 CONCLUSION
In todays world security of the image is very important. In this paper we have surveyed different problems and
techniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding

Volume 5, Issue 2, February 2016

Page 108

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC history
the extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniques
are good for data hiding and have their own advantages and disadvantages and give a security so that no one can access
the image in open network.
REFERENCES
[1] P.G.Haritha, Mrs.M.MathinaKani, A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
, international journal for trends in engineering & technology, volume 4 issue 2 April 2015 - ISSN: 2349
9303.
[2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar, A Secure Authentication Using Visual Cryptography&
Steganography , International Journal of Engineering Trends and Technology (IJETT) Volume 21 Number 6
March 2015.
[3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , VISUAL CRYPTOGRAPHY SCHEME
FOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM , International Journal of Advanced
Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN
(online): 2348 7550.
[4] ShrutiSekra, SamtaBalpande, KarishmaMulani, STEGANOGRAPHY USING GENETIC ENCRYPTION
ALONG WITH VISUAL CRYPTOGRAPHY, SSRG
International Journal of Computer Science and
Engineering(SSRG-IJCSE) volume 2 issue 1 January 2015.
[5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, SECURE AUTHENTICATION BY IMAGE
PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS ,International Journal of
Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January
2015.ISSN 23484853.
[6] J. Ida Christy and V. Seenivasagam ,FEED FORWARD NETWORKS IN COLOR EXTENDED VISUAL
CRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES , International Journal of Security and Its
Applications Vol.9, No.1 (2015).
[7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X.
[8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication using
complementary colors, Science Direct computers & security48(2015) 167e181.
[9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary
black pixels and uniform image quality , Digital Signal Processing 38 (2015) 5365.
[10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using Three
Independent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering
(IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015).
[11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation In
Visual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume
2, Issue 2, February 2015, ISSN 2348 4853.
[12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,International
Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
[13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications,
International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079.
[14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal of
Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084.
[15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND
EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research in
Engineering and Technology, Volume: 04 Issue: 02 | Feb-2015.
[16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, International
Journal of Computer Applications (0975 8887), Volume 109 No. 14, January 2015.
[17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,International
Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015,
ISSN: 232 7782.
[18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, International
Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015
ISSN: 2277 128X.
[19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X.
[20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed Digital
Documents, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015.

Volume 5, Issue 2, February 2016

Page 109

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

[21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment Visible
Mosaic Images, International Journal of Application or Innovation in Engineering & Management
(IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 4847.
[22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY,
IJRET: International Journal of Research inEngineering and Technology,2014.
[23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visual
cryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243250.
[24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images ,
Information Sciences 271 (2014) 246263.
[25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual
cryptography,Measurement 51 (2014) 8190, journal homepage: www.elsevier.com/locate/ measurement.
[26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual
Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277
8322.
[27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014.
[28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without Pixel
Expansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9,
September 2014 Page No. 8372-8376.
[29] K.V.Ramana,
Y.AdiLakshmi,Error
Diffusion
Based
Color
Visual
Cryptography for
Secure
Communication,International Journal of Advanced Research in Computer and Communication Engineering Vol.
3, Issue 1, January 2014.
[30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptography
for General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer and
Communication EngineeringVol. 3, Issue 2, February 2014.
[31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, International
Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193.
[32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography,
International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531.
[33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL
CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan2014.
[34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GAS
Algorithm, International Journal of Computer Applications (0975 8887) Volume 92 No.8, April 2014.
[35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent and
Innovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 487, March
2014.
[36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEE
TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014.
[37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
[38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual
cryptography and scene change detection, International Journal of Electronics and Communications (AE) , Int. J.
Electron. Commun.(AE) 67 (2013) 645651.
[39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual
cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 13801393.
[40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images ,
Theoretical Computer Science 510 (2013) 6286.
[41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual
cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318331.
[42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error
Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:23197242 Volume 2, Issue 10, October 2013, Page No. 3066-3069.
[43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHY
ALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers &
Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061.
[44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half
toning algorithms used in Color Visual Cryptography,International Journal of Engineering and Innovative
Technology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754.

Volume 5, Issue 2, February 2016

Page 110

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

[45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended Visual
Cryptography,International Journal of Emerging Technology and Advanced Engineering ,Website:
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).
[46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for Quality
Images Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
,Volume 2, Issue 2, March April 2013 ISSN 2278-6856.
[47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm Without
Removing Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4April 2013.
[48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of Advanced
Research in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277
128X.
[49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONS
ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013.
[50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subject
to Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10,
OCTOBER 2013.
[51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple Secret Visual
Cryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 ,
MAY 2013.
[52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal of
Global Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X.
[53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based on
Visual Cryptography, International Journal of Computer Applications (0975 8887) Volume 41 No.20, March
2012.
[54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION
AND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology
(IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X.
[55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY,
International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012.
[56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION,
KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 6779| NOV 12
TO OCT 13 | VOLUME 02, ISSUE 02.
[57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography Scheme
Using Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096.
[58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without Pixel
Expansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September
2012, ISSN: 2277-3754.
[59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via Error
Diffusion, International Journal of Computer Applications (0975 8887) Volume 45 No.12, May 2012.
[60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document
Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL.21, NO.1, JANUARY 2012.
[61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures,
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY
2012.
[62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Scheme
in Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
VOL. 22, NO. 5, MAY 2012.
[63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images,
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.
[64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science and
Technology,Volume 11, Issue 20 ,Version 1.0 December 2011.
[65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via
Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and Electrical
Engineering, Vol. 3, No. 6, December 2011.

Volume 5, Issue 2, February 2016

Page 111

International Journal of Application or Innovation in Engineering & Management (IJAIEM)


Web Site: www.ijaiem.org Email: editor@ijaiem.org
Volume 5, Issue 2, February 2016

ISSN 2319 - 4847

[66] MorampudiNareshkumar, DatrikaSrinivasRao,Sravanthi, A Novel Approach for Cheating Prevention through


Visual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2,
No.4, November 2011.
[67] Shiny Malar F.R, Jeya Kumar M.K, Error Filtering Schemes for Color Images in Visual Cryptography,
International Journal of Advanced Computer Science and Applications,Vol. 2, No. 11, 2011.
[68] InKoo Kang, Gonzalo R. Arce, and Heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion,
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011.
[69] Tzung-Her Chen and Kai-Hsiang Tsao, User-Friendly Random-Grid-Based Visual Secret Sharing, IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11,
NOVEMBER 2011.
[70] Ran-Zan Wang and Shuo-Fang Hsu, Tagged Visual Cryptography, IEEE SIGNAL PROCESSING LETTERS,
VOL. 18, NO.11, NOVEMBER 2011.
[71] ShyamalenduKandar, ArnabMaiti, Bibhas Chandra Dhara ,Visual Cryptography Scheme for Color Image Using
Random Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer Science
Issues, Vol. 8, Issue 3, No. 1, May 2011.
[72] RiteshD.Yelane, Dr.Nitiket. N. Mhala, Prof. B. J. ,Chilke,Security Approach by Using Visual Cryptographic
Technique , International Journal of Advanced Research in Computer Science and Software Engineering, Volume
5, Issue 1, January 2015.
AUTHORS
M.Sivakumaris currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri
Ramakrishna Engineering College, Coimbatore.His interests include Cryptography&Network Security,Web
Development.

A.Shilpais currently pursuing Bachelor of Engineering in Computer Science&Engineering from Sri


Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security,
DBMS.

J.R.Vijayalakshmiis currently pursuing Bachelor of Engineeringin Computer Science&Engineering from


Sri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network
Security,Artificial Intelligence.

Volume 5, Issue 2, February 2016

Page 112

Das könnte Ihnen auch gefallen