Cheating Mechanism in Visual Cryptography a Novel Method with Efficient Halftoned Image with SBR Technique By Sealing The Algorithm
Keywords:
Cheating, Shares, Halftoned Image, Pixel Expansion, Sealing Algorithm, Visual Cryptography.Abstract
The cheating is main issue while transferring the secret image against the owner. To avoid this Visual Cryptography novel method technique of cryptography is used. In this we divide secret images into multiple shares and are distributed to various entities. To get back the secret image we need all the shares. Using different operations we can reconstructed by superimposing these share. The pixel expansion and noise at output is a major drawback in Traditional. The major problem is cheating between shareholders cheating owners and between them. To avoid these limitation sealing algorithm with two application of visual cryptography (VC) are MIVC and EVC is used. The image will be changed into halftoned representation before sealing the algorithm. For this we are using SBR technique. The output overcomes common limitation likes pixel expansion and clarity of image along with this the system also provides a cheating prevention mechanism. Two secret image can be send at the same time by connecting them into halftonedrepresentations which are partitioned as totally three shares.
References
- NazaninAskari, Howard M. Heys, Member, IEEE, and Cecilia R. Moloney, Member , IEEE “Novel Visual Cryptography Schemes without Pixel Expansion for halftone images” IEEE trans. 2014.
- Xiatian Wu and Wei Sun, “Extended Capabilities for XOR based Visual Cryptography” in IEEE 2013.
- Young-Chang Hou, Shih-Chieh Wei and Chia-Yin Lin ”Random-Grid –Based Visual Cryptography” Schemes in the year of2013 in IEEE,2013.
- Pallavi V. Chavan and Dr. Mohammad Atique, “Design of Hierarchical Visual Cryptography” in IEEE, 2012.
- Z.Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography” IEEE Trans. Image Process., vol 15, no 8, pp. 24412453, Aug 2006.
- A. Ross and A. A. Othman, “Visual cryptography for biometric privacy” IEEE Trans Inf Forensics Security, vol. 6, no 1, pp.7081, Mar. 2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.