Journal Indexing & Metrics

Total Downloads: 2
Total Views: 275
Content List:
Authors Affiliation Abstract Keywords References
Cite
Share

An Innovative Approach in Visual Cryptography

Mr. Satyendra Nath Mandal, Mr. Subhankar Dutta, Mr. Ritam Sarkar

First Published April 26,2012

Authors
  1. Mr. Satyendra Nath Mandal
  2. Mr. Subhankar Dutta
  3. Mr. Ritam Sarkar
Affiliation
  • Dept. of I.T, Kalyani Govt. Engg College, Kalyani, Nadia(W.B)
  • Dept. of CSE, Kalyani Govt. Engg College, Kalyani, Nadia(W.B)
  • Dept. of CSE, Kalyani Govt. Engg College, Kalyani, Nadia(W.B)
Abstract
Visual cryptography is a method for protecting image-based secrets that have a computation-free decoding process. In this technique, number of shares are generated from one image. The shares are sent to the receiver and the receiver generates the original image by stacking all the share images. The method is fair but wasting the bandwidth of the network. The technique of generating shares is different in different types of images like binary, gray and color images. In this paper, an algorithm has been proposed to convert image in encrypted form and decrypt the image into original form. The key of encryption and decryption has been generated automatically using a real number. This number can be predefined or can be sent by any means to the receiver. The proposed algorithm can be applied to any type of image i.e. binary, gray scale and color image. The distribution of pixels in encrypted image is quite similar to a single share. Finally, it has been proved that the proposed approach is much simpler, secure and consumes less bandwidth of network.
Keywords

Visual Cryptography, , Share, , bandwidth, , Encryption, , Decryption, , Binary,, Gray and Color Image.

References
  1. Nakajima, M. and Yamaguchi, Y. (2011), “Extended visual cryptography for natural images”. Journal of WSCG, Vol. 10, issue 2, Pg. 303-310.
  2. Naor, M., and Shamir, A. (1995). Visual cryptography, in
  3. A. Tragha, F.Omary and A. Mouloudi (2005). “Genetic Algorithm Inspired Cryptography”, A.M.S.E. Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics, November 2005.
  4. Chang-Chou Lin, Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, v.24 n.1-3.
  5. Behrouz A.Forouzan (2007). “Cryptography & Network Security”, Tata McGraw Hill, ISBN 13-978-0-07-066046-5.
  6. H. Feistel (1973). ”Cryptography and Computer Privacy”, Scientific American vol. 228, no. 5, pp 15-23, 1973.
  7. Nalini. N and G. Raghavendra Rao, “A New Encryption and Decryption Algorithm Combining the Features of Genetic Algorithms (GA) and Cryptography”
  8. C.E. Shannon (1949), “Communication Theory of Security System”, Bell, System Technical Journal, vol 28, pp.656-715,1949.
  9. Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J.K.Mandal(2008). “A New Approach to Cryptography”, International Conference Systematics, Cybernatics & Informatics (ICSCI 2008) , Page 1-12.
Article Menu
Total Downloads: 2
Total Views: 786
Cite
Share
1