Cheating Mechanism in Visual Cryptography a Novel Method with Efficient Halftoned Image with SBR Technique By Sealing The Algorithm

Authors(3) :-Ms. R. Nandhini, Mrs. S. Shanthi, Ms. A. Sivasankari

The cheating is main issue while transferring the secret image against the owner. To avoid this Visual Cryptography novel method technique of cryptography is used. In this we divide secret images into multiple shares and are distributed to various entities. To get back the secret image we need all the shares. Using different operations we can reconstructed by superimposing these share. The pixel expansion and noise at output is a major drawback in Traditional. The major problem is cheating between shareholders cheating owners and between them. To avoid these limitation sealing algorithm with two application of visual cryptography (VC) are MIVC and EVC is used. The image will be changed into halftoned representation before sealing the algorithm. For this we are using SBR technique. The output overcomes common limitation likes pixel expansion and clarity of image along with this the system also provides a cheating prevention mechanism. Two secret image can be send at the same time by connecting them into halftonedrepresentations which are partitioned as totally three shares.

Authors and Affiliations

Ms. R. Nandhini
Research Scholar, Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India
Mrs. S. Shanthi
Assistant Professor, Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India
Ms. A. Sivasankari
Head of the Department (CS), Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India

Cheating, Shares, Halftoned Image, Pixel Expansion, Sealing Algorithm, Visual Cryptography.

  1. NazaninAskari, Howard M. Heys, Member, IEEE, and Cecilia R. Moloney, Member , IEEE “Novel Visual Cryptography Schemes without Pixel Expansion for halftone images” IEEE trans. 2014.
  2. Xiatian Wu and Wei Sun, “Extended Capabilities for XOR based Visual Cryptography” in IEEE 2013.
  3. Young-Chang Hou, Shih-Chieh Wei and Chia-Yin Lin ”Random-Grid –Based Visual Cryptography” Schemes in the year of2013 in IEEE,2013.
  4. Pallavi V. Chavan and Dr. Mohammad Atique, “Design of Hierarchical Visual Cryptography” in IEEE, 2012.
  5. Z.Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography” IEEE Trans. Image Process., vol 15, no 8, pp. 24412453, Aug 2006.
  6. A. Ross and A. A. Othman, “Visual cryptography for biometric privacy” IEEE Trans Inf Forensics Security, vol. 6, no 1, pp.7081, Mar. 2011.

Publication Details

Published in : Volume 4 | Issue 3 | January-February 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 92-95
Manuscript Number : CSEIT184316
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Ms. R. Nandhini, Mrs. S. Shanthi, Ms. A. Sivasankari, "Cheating Mechanism in Visual Cryptography a Novel Method with Efficient Halftoned Image with SBR Technique By Sealing The Algorithm", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.92-95, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT184316

Article Preview

Follow Us

Contact Us