Abstract

Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques which used to transmit the secrete image under the cover picture. Human vision systems are connected to visual cryptography. The black and white image was originally used as a hidden image. In order to achieve the owner’s copy right security based on visual cryptography, a watermarking algorithm is presented. We suggest an approach in this paper to hide multiple images in video by meaningful shares using one binary share. With a common share, which we refer to as a smart key, we can decrypt several images simultaneously. Depending on a given share, the smart key decrypts several hidden images. The smart key is printed on transparency and the shares are involved in video and decryption is performed by physically superimposing the transparency on the video. Using binary, grayscale, and color images, we test the proposed method.

Highlights

  • Visual cryptography (VC) is a secret sharing scheme in which distributed and transmitted images mask secrets [1]

  • Related to the growth of data sharing on the Internet and the wide spread use of digital media, multimedia security and copyright protection have become of broad interest

  • We propose a VC scheme for multiple secret images in video, Visual cryptography is a scheme to hide a secret image using any number of shadow image called shares

Read more

Summary

Introduction

Visual cryptography (VC) is a secret sharing scheme in which distributed and transmitted images mask secrets [1]. If shared images (here after called shares) printed on transparencies are stacked (superimposed), the secrets can be successfully decrypted. The human visual system can perform decryption: computer resources are not required for decryption. The image consists of pixels that are black and white [2,3]. Each pixel is split into m subpixels for encryption, and each participant has m subpixels for each pixel in the hidden image, some of which are black and some of which are white [4] There are such small subpixels that they are averaged by the eye to some shade of grey.

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call