Cheating Mechanism in Visual Cryptography a Novel Method with Efficient Halftoned Image with SBR Technique By Sealing The Algorithm

Authors

  • Ms. R. Nandhini  Research Scholar, Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India
  • Mrs. S. Shanthi  Assistant Professor, Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India
  • Ms. A. Sivasankari  Head of the Department (CS), Dept of Computer Science and Applications, D.K.M. College for Women (Autonomous), Vellore, Tamilnadu, India

Keywords:

Cheating, Shares, Halftoned Image, Pixel Expansion, Sealing Algorithm, Visual Cryptography.

Abstract

The cheating is main issue while transferring the secret image against the owner. To avoid this Visual Cryptography novel method technique of cryptography is used. In this we divide secret images into multiple shares and are distributed to various entities. To get back the secret image we need all the shares. Using different operations we can reconstructed by superimposing these share. The pixel expansion and noise at output is a major drawback in Traditional. The major problem is cheating between shareholders cheating owners and between them. To avoid these limitation sealing algorithm with two application of visual cryptography (VC) are MIVC and EVC is used. The image will be changed into halftoned representation before sealing the algorithm. For this we are using SBR technique. The output overcomes common limitation likes pixel expansion and clarity of image along with this the system also provides a cheating prevention mechanism. Two secret image can be send at the same time by connecting them into halftonedrepresentations which are partitioned as totally three shares.

References

  1. NazaninAskari, Howard M. Heys, Member, IEEE, and Cecilia R. Moloney, Member , IEEE “Novel Visual Cryptography Schemes without Pixel Expansion for halftone images” IEEE trans. 2014.
  2. Xiatian Wu and Wei Sun, “Extended Capabilities for XOR based Visual Cryptography” in IEEE 2013.
  3. Young-Chang Hou, Shih-Chieh Wei and Chia-Yin Lin ”Random-Grid –Based Visual Cryptography” Schemes in the year of2013 in IEEE,2013.
  4. Pallavi V. Chavan and Dr. Mohammad Atique, “Design of Hierarchical Visual Cryptography” in IEEE, 2012.
  5. Z.Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone Visual Cryptography” IEEE Trans. Image Process., vol 15, no 8, pp. 24412453, Aug 2006.
  6. A. Ross and A. A. Othman, “Visual cryptography for biometric privacy” IEEE Trans Inf Forensics Security, vol. 6, no 1, pp.7081, Mar. 2011.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
Ms. R. Nandhini, Mrs. S. Shanthi, Ms. A. Sivasankari, " Cheating Mechanism in Visual Cryptography a Novel Method with Efficient Halftoned Image with SBR Technique By Sealing The Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.92-95, January-February-2018.