Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P5 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P5
Entrenched Visual Cryptography using Secret Sharing Scheme with public Key
Kode Phani Kumar, B.VeeraMallu A
Citation :
Kode Phani Kumar, B.VeeraMallu A, "Entrenched Visual Cryptography using Secret Sharing Scheme with public Key," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 984-986, 2013. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V4I5P5
Abstract
Visual cryptography scheme (VCS) is a cryptography technique which allow visual data i.e.: printed text, handwritten notes, and picture is encrypted in such a way that the decryption can be done by the human visual system, without the support of computers. In order to share undisclosed images, VCS used as a secret sharing schema. The idea is to convert the written stuff into a cipher text by using ElGamal Algorithm and then place that cipher text in to an image and encode this image into n shadow images. The decoding requires only selecting some splits of these n images, creation transparencies of them, and stacking them on top of other transparencies.
Keywords
Visual cryptography scheme, secret sharing
References
[1]. A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613,1979.
[2]. M.Naor and A.Shamir, “Visual cryptography,” in Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol. 950, pp. 1–12, Springer-Verlag, LNCS.
[3]. Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography,” in Proc. 2003 Int. Conf. Image Processing, 2003, vol. 1, pp.I-521–I524.
[4]. M. Naor and B. Pinkas, “Visual authentication and identification,” in Proc. CRYPTO’97, 1997, vol. 1294, pp. 322–336, Springer-Verlag LNCS.
[5]. C. Blundo, A. De Bonis, and A. De Santis, “Improved schemes for visual cryptography,” Designs, Codes and Cryptography, vol. 24, pp. 255–278, 2001.