Abstract

Visual cryptography technique allows visual information to be encrypted in such a way that the decrypted information appears as a visual image. Visual cryptography allows digital images to be separate into few shares called transparent shares. For security reasons, it ensures that hackers cannot find any clues about the secret image from a single cover image. The proposed technique uses CMY (cyan, magenta, yellow) color space to enhance visual cryptography, and mean visual cryptography can be used on color images. The other techniques used were color decomposition and error diffusion. Error diffusion is a type of half toning in which the quantization residual is distributed to neighboring pixels that have not yet been processed. The image will be encrypted by four shares which is cyan, magenta, yellow, and mask. Mask will be using random function to random generate half black and half white pixel in 2 × 2 block. Stack all the shares for reviewing the secret image. After that, do the image preprocessing of the image and use OCR (optical character recognition) to recognize the message.

Highlights

  • Secret sharing is referring to any secret method of allocation among a group of participants, and each participant is assigned secret share in visual cryptography

  • The proposed technique determines that the secret sharing scheme with CMY color space is visual cryptography

  • The secret image will divide by four halftone images which is cyan, magenta, yellow, and black

Read more

Summary

Introduction

With the development of science and technology, people’s lives have changed greatly. In this age of information, the internet has become an indispensable channel. It is spread all over the world, and it is getting closer to human life. News, weather forecasts, life information, and people can all see through the internet. In a society where information flows at high speed, the secret management has always been a compelling issue in our life. Cryptography is the science of information security. Security key management is the biggest motivation for secret sharing. Visual cryptography can be used on the grey images and RGB/CMY images.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.