Analysis of Schemes proposed for improving the Segment Based Visual Cryptography

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-30 Number-1
Year of Publication : 2015
Authors : Dr. Amit Chaturvedi, Irfan Jalal Bhat


Dr. Amit Chaturvedi, Irfan Jalal Bhat "Analysis of Schemes proposed for improving the Segment Based Visual Cryptography". International Journal of Computer Trends and Technology (IJCTT) V30(1):26-30, December 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Segmentation based visual cryptography is segment based not pixel based and works on symbols that may be shown as segment display, the two major technique proposed in this category are seven segment and sixteen display. The major benefit of using Segment Based encryption is that “It is easy to adjust the secret images and potentially easy to recognize for the human eye”. In this paper we have summarised the various schemes for schemes for segment based visual cryptography given in figure 4 .We have analyzed majorly three techniques :1> Secret sharing, 2> symmetric key distribution 3> Seeded Region growing based segmentation. Future researchers may focus on automated seeding algorithms.

[1] Blakley, G. R.,“Safeguarding cryptographic keys”, Proceedings of the National Computer Conference, pp: 313–317, 1979.
[2] Naor M., and Shami, A. 1994, Visual cryptography, Eurocrypt’94, Lecture Notes in Computer Science, vol. 950, pp. 1–12.
[3] al, A New visual cryptography scheme for color images international journal of engineering science and technology vol 2 (6), 2010, 1997-2000.
[4] David Boen, “Segmenting 2d ultrasound images using seeded region growing”, 2006.
[5] T. Monoth and A. P. Babu, “Recursive Visual Cryptography Using Random Basis Column Pixel Expansion”, In Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
[6] Bernd Borchert, Klaus Reinhardt: Abh•or- und manipulationssichere Verschl•usselung f•ur Online Accounts. Patent application DE-10-2007-018802.3, 2007 [Gr07]
[7] Geum-Dal Park, Eun-Jun Yoon , Kee-Young Yoo “A New Copyright Protection Scheme with Visual Cryptography”, 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008.
[8] Debasish Jena, Sanjay Kumar Jena, “A Novel Visual Cryptography Scheme”, International Conference on Advanced Computer Control, 2008.
[9] Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya- Fen Chang, Yen-Ping Chu, , 2008 “Visual Secret SharingFor Multiple Secrets”, Pattern Recognition 41 ,pp. 3572 – 3581.
[10] Daoshun Wang, FengYi, XiaoboLi, 2009“On General Construction For Extended Visual Cryptography Schemes”,Pattern Recognition 42 (2009),pp 3071 – 3082,
[11] T. Monoth and B. Anto P. Tamperproof transmission of fngerprints using visual cryptography schemes. In Procedia Computer Science, volume 2, pages 143{148, 2010.
[12] J. Weir and W. Yan. Resolution variant visual cryptography for street view of google maps. In Proceedings of the ISCAS, pages 1695{1698, 2010.
[13] T.R.Gopalakrishnan Nair Harikrishna Rai G.N. Gradient based seeded region grow method for ct angiographic image segmentation. 2011.
[14] R.K.Krishna2 Shilpa Kamdi1. Image segmentation and region growing algorithm. pages 103-107.
[15] Sunday O.Ojo Tranos Zuva, Oludayo O. Olugbara and Seleman M. Ngwira. Image segmentation, available techniques, developments and open issues. pages 20-29, 3, March 2011.
[16] S. Cimato and C.N. Yang. Visual cryptography and secret image sharing. CRC Press,Taylor & Francis, 2011.
[17] Vaibhav Choudhary, Kishore Kumar, Pravin Kumar, D.S. Singh “ An Improved Pixel Sieve Method for Visual Cryptography”, International Journal of Computer Applications Volume 12– No.9, January 2011
[18] Masakazu Higuchi, Aya Emori, Shuji Kawasaki, Jonah Gamba, Atsushi Koike and Hitomi Murakami “Image Encryption Methods Using Intensity Transformations in Visual Cryptography”, INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION Issue 1, Volume 5, 2011
[19] Sesha Pallavi Indrakanti,Venkata Vinay Pragada, P.S.Avadhani,“Multiple Image Secret Sharing Scheme”, 20th International Conference on Software Engineering and Data Engineering (SEDE-2011), Las Vegas, USA, on June 20-22. pp. 155-159, 2011,
[20] Sesha Pallavi Indrakanti, Avadhani P.S.,“A Novel Multiple Visual Secret Data Hiding Scheme”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4) , july-August’2011, pp. 1423-1426.
[21] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011.
[22] Sesha Pallavi Indrakanti, P.S.Avadhani,“Segment Based Visual Cryptography For Key Distribution”, International Journal of Computer Science and Engineering Survey (IJCSES), Vol. 3, No. 1, February 2012, pp.105-111.
[23] Sesha Pallavi Indrakanti, Avadhani P S.,“Privacy preserving through segment based visual cryptography”, Advanced Computing: An International Journal (ACIJ ), Vol. 3, No. 4, July 2012, pp. 95-103.
[24] M.Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12. International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012 218.
[25] V. Vaithiyanathan a 1 nd 2U. Rajappa “A Comparitive Analysis among Basic Image Segmentation Methods” World Applied Sciences Journal 29 (Data Mining and Soft Computing Techniques): 155-158, 2014 ISSN 1818-4952
[26] Prasad D. Baitule and Swapnil P. Deshpande “ A Survey On Efficient Anti Phishing Method Based on Visual Cryptography Using Cloud Technique By Smart Phones” International Conference on Advances in Engineering &Technology – 2014 , pp .11-15
[27] I.D JUDITH Dr.G. J. Joyce Mary “ANTI PHISHING METHOD USING VISUAL SECRET IMAGES” International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163Issue 1, Volume 2 (January 2015).
[28] R.V.Prasad CH1, S.Suresh Nimra Nagar,Ibrahimpatnam,Vijayawad A COMPREHENSIVE IMAGE SEGMENTATION APPROACH FOR IMAGE REGISTRATION, International Journal of Computer Trends and Technology- volume3Issue4- 2012

Segmentation based Visual cryptography, pixel, cryptography, superimposed, security.