International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P52 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P52

Hybridization of Symmetric Key Encryption and Visual Cryptography


Monika, Rakhi Soni

Citation :

Monika, Rakhi Soni, "Hybridization of Symmetric Key Encryption and Visual Cryptography," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1226-1229, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P52

Abstract

Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex decoding process . As visual cryptography, is a secure tactics for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a more impregnable visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key and then divides the secret into shares. After stacking of shares, secret does not appear, until the symmetric key is not known. This technique is proposed for binary images. Here the symmetric key used for encryption and decryption is a small binary image.

Keywords

Visual Cryptography, Hybridization of encryption with visual cryptography, (key,2,2)Visual cryptographic scheme.

References

[1] Abhisek Parakh and Subhas Kak, ” A Recursive Threshold Visual Cryptography Scheme”, Dept. of Computer Science, Oklahoma State University.
[2] B. Lakshmi Sirisha, G. Sree Lakshmi, “ A novel cryptographic technique under visual secret sharing scheme for binary images” , International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484. 
[3] Bin Yu, Xiaohui Xu, Liguo Fang. Multi-secret Sharing Threshold Visual Cryptography Scheme. International Conference on Computational Intelligence and Security, 2007 
[4] C. Wu and L. Chen, “A study on visual cryptography,” Master’s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[5] Debasish Jena and Sanjay Kumar Jena, “A Novel Visual Cryptographic Scheme,” IEEE,2008, pp. 207–211.
[6] Gary C. Kessler, “ An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28 April 2013.
[7] Jayanta Kumar Pal, J. K. Mandal and Kousik Dasgupta,” A (2, N) Visual Cryptographic Technique For Banking Applications” International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.
[8] Jonathan Weir and WeiQi Yan,” Sharing Multiple Secrets Using Visual Cryptography”  IEEE, 2009
[9] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science,1995,(950):pp. 1-12.
[10] Mandal, J.K.; Ghatak, S. "A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC)",  Electronic System Design (ISED), 2011 International Symposium on, On page(s): 329 – 334
[11] Mandal, J.K.; Ghatak, S. "Secret image / message transmission through meaningful shares using (2, 2) visual cryptography (SITMSVC)",  Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 – 268
[12] Sandeep Katta,” Recursive Information Hiding in Visual Cryptography,”2010
[13] Tai- Wen Yue and Suchen Chiang, “A Neural Network Approach for Visual Cryptography”. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN’00) .pp. 1-2.
[14] Ujjwal Chakraborty, Jayanta Kumar Paul and Priya Ranjan Sinha Mahapatra, “Desigan and Implementaion of a (2,2) and a (2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .