Beruflich Dokumente
Kultur Dokumente
ABSTRACT
Visual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual
Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned
participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which
performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security,
quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but
later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used
different techniques for visual cryptography from 2011 to 2015.
Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares.
1.INTRODUCTION
Visual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic technique
which allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way that
the decryption can be performed by thehuman visual system, without the aid of computers.
This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into
consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansion
results in smaller size of the share. Encoding multiple secret images in to the same share images requires less overhead
while sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over the
communication channels.
This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visual
cryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme.
1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME:
Naor and Shamirs proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel is
white one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the
below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into two
whiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secret
image is shown only when both of the images became shares are upper imposed.
Page 100
To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hiding
schemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages,
embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fang
recommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and OR
operation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .The
disadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share large
amounts of confidential messages several shares have to be generated.
1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME:
The (2, 2)VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption
process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In the
decryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold
visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size of
decrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality of
halftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filing
curve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray level
image is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the case
of (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed
by mound binary shares.
254: [1 1 1 1 1 1 1 0]
Table 2-Construction of gray scale image VC
Page 101
Secret image
share1
share2
Figure 2 Gray scale image VCS
Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives
perfect high quality image when reconstructed without any loss of contrast.
1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME:
Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual
cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with the
concept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel is
transformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly one
color region colored, and all the other color regions are black. The color of one pixel depends on the interrelations
between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c 3.
Yang and Laihimproved the pixel expansion to c 2 of Verheul and Van Tilborg . But in both of these schemes share
generated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmit
secret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image two
significant color images areselected as cover images which are the same size as the secret color image. Then according
to a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantage
of this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in the
secret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a
secret color image sharing scheme based on modified visual cryptography.
Table 3: Construction of color image VC
Page 102
METHOD TO SOLVE
PROBLEM
Xuehu Yan et al
Error diffusion
P.G.Haritha et al
Ms.Deepti
Chaudhary et al
J. Ida Christy et al
AlfiyaSaiyyad et al
RiteshD.Yelane et
al
ShrutiSekra et al
SujitAhirrao et al
Sankar Das et al
Fersna et al
AparnaBhosale et
al
Jainthi.K. et al
VSS
Error Diffusion
Chen technique
Steganography(LSB)
VC (k,n)
EVCS
Large auxiliary
black pixel
distribution
Visual quality
Pixel expansion
Contrast loss
Authenticity
Random pixel
management
ColorHalftoning
Pixel expansion
Image processing
Authenticity
Correlation method
EVCS
Information
security
Halftone
Steganography (using LSB-Genetic
algorithm)
VCS
K n secret sharing algorithm
Contrast
Authenticity
Malicious attacks
Reconstruction of
secret message
Pixel expansion
Halftone
Security
Contrast
Transmission risk
problem
K out of k (EVCS)
Security
Visual quality
Page 103
algorithm
Contrast
Random grids
Size
Halftone
Ketanraukundiya et
al
Vandhana.G.Pujari
et al
Alkhamohan et al
F.R.Shiny Malar
Kai-Hui Lee et al
Che-Wei Lee et al
Kai-Hui Lee et al
HaoLuo et al
Cheng-Chi Lee et
al
Shruti M.
Rakhunde
Jyoti Rao et al
Steganography(LSB)
Quality of
reconstructed
image
Pixel expansion
Security
Image quality
Quality of
decrypted image
Contrast loss
Pixel
reconstruction
Image quality
Security
Transmission risk
problem
Image
authentication
BVCS(Binocular Visual
Cryptography Scheme)
Transmission risk
problem
Computational
complexity
Pixel expansion
Lossless image
SDS(Seiving-Divison Shuffling)
Algorithm
Encryption/decrypti
on cost
Wu chen Scheme
Pixel expansion
Shyu et al scheme
Count of secret
image shares
Page 104
K.V.Ramana et al
Tsungleihlin,horng-lee chen et al
scheme
Error diffusion
VIP Synchroniztion
Shekhachenthara et
al
LekhikaChettri
T.Anuradha et al
Color diffusion
PVC watermarking
Quality of
Meaningful share
Pixel expansion
Security
Contrast
Color EVCS
Quality of shares
Security
Performace
NCC(Normalized Correlation
Cofficient)
Bharanivendhan .N
et al
Visual quality
Stamping algorithm
Security
Resolution of
shares
Dhara Trivedi et al
ShyongJianShyu
ShyongJianShyu et
al
Kai-Hui Lee et al
Roberto De Prisco
et al
Pixel expansion
Authenticity
Visual Cryptography in
Biometrics Passport
2014
Bio metricies
Visual Cryptograms Of
Random Grids For General
Access Structures
2013
General Constructions For
Threshold Multi-Secret Visual
Cryptography Scheme
2013
Image Size Invariant Visual
Cryptography For General
Access Structures Subject To
Display Quality Constraints
2013
Color Visual Cryptography
Scheme for Black and White
VCRG-GAS(Visual Cryptograms Of
Random Grids For General Access
Structures)
Pixel expansion
(k,n,s,R)MVCS(Multi-Secret Visual
Cryptography Scheme)
Pixel expansion
Security
Pixel expansion
Uncontrollable
display quality
problem
Pixel expansion
Page 105
Peng Li et al
Th. Rupachandra
Singh et al
Grishma R.
Bhokare et al
Dr.V.R.Anitha et al
Anuprita U. mande
Visual quality
Pixel expansion
PSSS(Polynomial-based Secret
Sharing Scheme)
Video watermarking scheme
Video pre
processing
Error diffusion
Visual quality
VIP Synchronization
Color shares
Pixel expansion
Watermarking
Pixel expansion
Display quality
(E-D) algorithms
Contrast loss
Perceived loss
Anuprita U. mande
Contrast
Image (visual)
quality
Sathiya k et al
Dr.V.R.ANITH et
al
Comparison of Visual
Cryptographic
Algorithms for Quality Images
Using XOR
2013
Modification
Floyds-stengberg halftone algorithm
Floyds-stengberg halftone algorithm
Visual quality
Management
problem
Pixel expansion
Page 106
MitsuguIwamoto
Ching-Nung Yang
et al
Amir Kolaman et
al
Duan-Yu Chen et
al
Kai - H ui L e e et
al
PankajaPatil et al
Anshul Sharma
Ananthakumar
Kendra et al
2013
A Visual Cryptography to
Secure Biometric Database: A
Review
2013
A Weak Security Notion For
Visual Secret Sharing Scheme
2012
K Out N Region Incrementing
Scheme In Visual Cryptography
2012
Quaternion Structured
Similarity A New Quality Index
For Color Images
2012
Authentication
WS-VSS
US-VSS
Contrast loss
Pixel expansion
Wang schemeIncorrect color
problem
Image quality
Rain removal
Sparse coding
EVCS(Extended Visual Cryptography
Scheme)
Stamping algorithm
Error diffusion
Pixel expansion,
Display quality,
Random pixel
management
problem
Low frequency
difference
VIP Synchronization
Visual contrast
Javris and Floyds error diffusion
Error diffusion filters
Image quality of
halftone shares
(PSNR&UQI)
Authentication
VIP
Synchroniztion
Security
CRC Algorithm
Color VC
Error diffusion
Manimurugan.S et
al
RLE compression
Pixel expansion
Decrypted image
quality
Security
Anushal Sharma et
al
Visual quality
Contrast
Page 107
Tzung-Her Chen et
al
ShyongJianShyu et
al
Velmurugan.N et
al
N Krishna Prakash
et al
MorampudiNaresh
kumar et al
Shiny Malar. F R et
al
Error diffusion
RGVSS(Random Grid Based Visual
Secret Sharing)
Pixel expansion
Cheating problem
Quality of image
Fourier transform
Blurring effects
VCSOR
VCSXOR
Direct Binary Search(DBS) with
adaptive search and swap method
Pixel expansion
Pixel expansion
Small contrast
Quality of halftone
image
Computational
compexity
Pixel expansion
3.PROPOSED METHODOLOGY
Proposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3D
images.
3.1 Halftone Image Creation
In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp).
Then the original image is halftoned using Floyd Steinberg algorithm. In this algorithm takes less time to perform
halftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and also
highly contrasted.
3.2 Share Generation
In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number of
transparency shares are generated and every share was saved. These shares are same size, pixel and different in
transparency levels and also meaningful images.
3.3 Reconstruction
In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The final
reconstructed images is highly contrasted and free from pixel expansion problem.
4. FUTURE SCOPE:
We had suggested a future development of VC scheme to,
1.Apply VC for videos.
2. Using MSB algorithm in steganography for encoding and decoding in VC.
4.1 CONCLUSION
In todays world security of the image is very important. In this paper we have surveyed different problems and
techniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding
Page 108
problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC history
the extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniques
are good for data hiding and have their own advantages and disadvantages and give a security so that no one can access
the image in open network.
REFERENCES
[1] P.G.Haritha, Mrs.M.MathinaKani, A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
, international journal for trends in engineering & technology, volume 4 issue 2 April 2015 - ISSN: 2349
9303.
[2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar, A Secure Authentication Using Visual Cryptography&
Steganography , International Journal of Engineering Trends and Technology (IJETT) Volume 21 Number 6
March 2015.
[3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , VISUAL CRYPTOGRAPHY SCHEME
FOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM , International Journal of Advanced
Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN
(online): 2348 7550.
[4] ShrutiSekra, SamtaBalpande, KarishmaMulani, STEGANOGRAPHY USING GENETIC ENCRYPTION
ALONG WITH VISUAL CRYPTOGRAPHY, SSRG
International Journal of Computer Science and
Engineering(SSRG-IJCSE) volume 2 issue 1 January 2015.
[5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, SECURE AUTHENTICATION BY IMAGE
PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS ,International Journal of
Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January
2015.ISSN 23484853.
[6] J. Ida Christy and V. Seenivasagam ,FEED FORWARD NETWORKS IN COLOR EXTENDED VISUAL
CRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES , International Journal of Security and Its
Applications Vol.9, No.1 (2015).
[7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X.
[8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication using
complementary colors, Science Direct computers & security48(2015) 167e181.
[9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary
black pixels and uniform image quality , Digital Signal Processing 38 (2015) 5365.
[10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using Three
Independent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering
(IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015).
[11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation In
Visual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume
2, Issue 2, February 2015, ISSN 2348 4853.
[12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,International
Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.
[13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications,
International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079.
[14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal of
Computer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084.
[15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND
EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research in
Engineering and Technology, Volume: 04 Issue: 02 | Feb-2015.
[16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, International
Journal of Computer Applications (0975 8887), Volume 109 No. 14, January 2015.
[17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,International
Journal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015,
ISSN: 232 7782.
[18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, International
Journal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015
ISSN: 2277 128X.
[19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Science
and Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X.
[20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed Digital
Documents, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015.
Page 109
[21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment Visible
Mosaic Images, International Journal of Application or Innovation in Engineering & Management
(IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 4847.
[22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY,
IJRET: International Journal of Research inEngineering and Technology,2014.
[23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visual
cryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243250.
[24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images ,
Information Sciences 271 (2014) 246263.
[25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual
cryptography,Measurement 51 (2014) 8190, journal homepage: www.elsevier.com/locate/ measurement.
[26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual
Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277
8322.
[27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014.
[28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without Pixel
Expansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9,
September 2014 Page No. 8372-8376.
[29] K.V.Ramana,
Y.AdiLakshmi,Error
Diffusion
Based
Color
Visual
Cryptography for
Secure
Communication,International Journal of Advanced Research in Computer and Communication Engineering Vol.
3, Issue 1, January 2014.
[30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptography
for General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer and
Communication EngineeringVol. 3, Issue 2, February 2014.
[31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, International
Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193.
[32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography,
International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531.
[33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL
CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan2014.
[34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GAS
Algorithm, International Journal of Computer Applications (0975 8887) Volume 92 No.8, April 2014.
[35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent and
Innovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 487, March
2014.
[36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEE
TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014.
[37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.
[38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual
cryptography and scene change detection, International Journal of Electronics and Communications (AE) , Int. J.
Electron. Commun.(AE) 67 (2013) 645651.
[39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual
cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 13801393.
[40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images ,
Theoretical Computer Science 510 (2013) 6286.
[41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual
cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318331.
[42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error
Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:23197242 Volume 2, Issue 10, October 2013, Page No. 3066-3069.
[43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHY
ALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers &
Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061.
[44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half
toning algorithms used in Color Visual Cryptography,International Journal of Engineering and Innovative
Technology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754.
Page 110
[45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended Visual
Cryptography,International Journal of Emerging Technology and Advanced Engineering ,Website:
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).
[46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for Quality
Images Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
,Volume 2, Issue 2, March April 2013 ISSN 2278-6856.
[47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm Without
Removing Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4April 2013.
[48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of Advanced
Research in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277
128X.
[49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONS
ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013.
[50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subject
to Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10,
OCTOBER 2013.
[51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple Secret Visual
Cryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 ,
MAY 2013.
[52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal of
Global Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X.
[53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based on
Visual Cryptography, International Journal of Computer Applications (0975 8887) Volume 41 No.20, March
2012.
[54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION
AND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology
(IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X.
[55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY,
International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012.
[56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION,
KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 6779| NOV 12
TO OCT 13 | VOLUME 02, ISSUE 02.
[57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography Scheme
Using Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096.
[58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without Pixel
Expansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September
2012, ISSN: 2277-3754.
[59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via Error
Diffusion, International Journal of Computer Applications (0975 8887) Volume 45 No.12, May 2012.
[60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document
Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL.21, NO.1, JANUARY 2012.
[61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures,
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY
2012.
[62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Scheme
in Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
VOL. 22, NO. 5, MAY 2012.
[63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images,
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.
[64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science and
Technology,Volume 11, Issue 20 ,Version 1.0 December 2011.
[65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via
Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and Electrical
Engineering, Vol. 3, No. 6, December 2011.
Page 111
Page 112