Abstract
Visual cryptography is a secret information sharing technique which shares the information in the form of images. It generates noise-like random pixels on share images to hide secret information which on overlay decrypt the information. This technique is known as conventional visual secret sharing schemes. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is solved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. While removing the extra cover image it produces extra noise or degrades the hidden image quality. So we propose a new image watermarking technique in this Visual Cryptography Algorithm that places a small image on the noisy image pair at the bottom right corner. So that the cover images need not be removed and it doesn't degrade  resolution of the secret image.
Highlights
Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer
Conventional VSS schemes generate noise-like random pixels on shares to hide secret images
We assess the performance of the proposed Watermarking technique for extended visual cryptography scheme (EVCS) in terms of the pixel expansion and some management problems
Summary
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994 They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n-1 shares reveals no information about the original image. The pixel expansion problem affects the practicability of storage/transmission requirements for shares and decreases the contrast of the recovered secret images. Conventional VSS schemes generate noise-like random pixels on shares to hide secret images. In this manner, the secret can be perfectly concealed on the share images. Pixel expansion is solved and display quality of cover image is adjustable
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.