Hybridization of Symmetric Key Encryption and Visual Cryptography

International Journal of Computer Trends and Technology (IJCTT)          
© - May Issue 2013 by IJCTT Journal
Volume-4 Issue-5                           
Year of Publication : 2013
Authors :Monika, Rakhi Soni


Monika, Rakhi Soni"Hybridization of Symmetric Key Encryption and Visual Cryptography "International Journal of Computer Trends and Technology (IJCTT),V4(5):1226-1229 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex decoding process . As visual cryptography, is a secure tactics for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a more impregnable visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key and then divides the secret into shares. After stacking of shares, secret does not appear, until the symmetric key is not known. This technique is proposed for binary images. Here the symmetric key used for encryption and decryption is a small binary image.


[1] Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
[2] B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484.
[3] Bin Yu, Xiaohui Xu, Liguo Fang. Multi-secret Sharing Threshold Visual Cryptography Scheme. International Conference on Computational Intelligence and Security, 2007
[4] C. Wu and L. Chen, “A study on visual cryptography,” Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[5] Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme,” IEEE,2008, pp. 207–211.
[6] Gary C. Kessler, “ An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
[7] Jayanta Kumar Pal, J. K. Mandal and Kousik Dasgupta,” A (2, N) Visual Cryptographic Technique For Banking Applications” International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.
[8] Jonathan Weir and WeiQi Yan,” Sharing Multiple Secrets Using Visual Cryptography” IEEE, 2009

Keywords — Visual Cryptography, Hybridization of encryption with visual cryptography, (key,2,2)Visual cryptographic scheme.