Multimedia Tools and Applications

, Volume 77, Issue 20, pp 27041–27060 | Cite as

Secure visual cryptography for medical image using modified cuckoo search

  • A. Alif Siddiqua BegumEmail author
  • S. Nirmala


Optimal secure visual cryptography for brain MRI medical image is proposed in this paper. Initially, the brain MRI images are selected and then discrete wavelet transform is applied to the brain MRI image for partitioning the image into blocks. Then Gaussian based cuckoo search algorithm is utilized to select the optimal position for every block. Next the proposed technique creates the dual shares from the secret image. Then the secret shares are embedded in the corresponding positions of the blocks. After embedding, the extraction operation is carried out. Here visual cryptographic design is used for the purpose of image authentication and verification. The extracted secret image has dual shares, based on that the receiver views the input image. The authentication and verification of medical image are assisted with the help of target database. All the secret images are registered previously in the target database. The performance of the proposed method is estimated by Peak Signal to Noise Ratio (PSNR), Mean square error (MSE) and normalized correlation. The implementation is done by MATLAB platform.


Gaussian function Discrete wavelet transform Cuckoo search Mean square error and peak signal to noise ratio 


  1. 1.
    Aditya, K., Choudhary, A., Raj, A., Sing, M., & Adhikari, A. (2017) ‘Image watermarking based on cuckoo search with dwt using lévy flight algorithms’, In Proceedings of International Conference on Networks & Advances in Computational Technologies (NetACT) IEEE, pp. 29–33Google Scholar
  2. 2.
    Ansari N, Shaikh R (2015) Reversible data hiding in encrypted image using visual cryptography. Int j recent inn trends comput Commun 3(2):89–92Google Scholar
  3. 3.
    Chiu PL, Lee KH (2015) User-friendly threshold visual cryptography with complementary cover images. Int J Signal Process 108:476–488CrossRefGoogle Scholar
  4. 4.
    Durairaj M, Sutharson V (2015) A survey on visual cryptography for secret data sharing. Int j comput sci inf technol 6(4):4047–4053Google Scholar
  5. 5.
    Kester QA (2013) A visual cryptographic encryption technical for securing medical images. Int j emerg technol adv eng 3(6):496–500Google Scholar
  6. 6.
    Lee CC, Chen HH, Liu HT, Chen GW, Tsai CS (2014) A new visual cryptography with multilevel encoding. Int J Vis Lang Comput 25(3):243–250CrossRefGoogle Scholar
  7. 7.
    Lee JS, Chang CC, Huynh NT, Tsai HY (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Int j digital signal process 40:131–139MathSciNetCrossRefGoogle Scholar
  8. 8.
    Madhuri KL, Thakur V, Jaiswal R, Sonawane S, Nalavade R (2012) Biometric data security using recursive visual cryptography. Int j inf knowl manag 2(2):32–36Google Scholar
  9. 9.
    Mande A, Tibdewal M (2013) A fast encryption algorithm for color extended visual cryptography. Int j emerg technol adv eng 3(4):364–371Google Scholar
  10. 10.
    Manimurugan S, Ramajayam N (2012) Visual cryptography based on modified RLE compression without pixel expansion. Int j eng innov technol 2(3):135–138Google Scholar
  11. 11.
    Mohod AA, Bijwe KB (2014) An image database security using multilayer multi share visual cryptography: a review. Int j appl innov eng manag 3(10):210–215Google Scholar
  12. 12.
    Nagdive PS, Raut AB (2015) Visual cryptography and steganography: a review. int j adv res comput sci manag stud 3(1):58–65Google Scholar
  13. 13.
    Pachiappan K, Annaji S, Jayakumar N (2014) Security in medical images using enhanced visual secret sharing scheme. Int j sci eng technol res 3(9):1642–1645Google Scholar
  14. 14.
    Pandey V, Shrivastava M (2012) Medical image protection using steganography by crypto-image as cover image. Int j adv comput res 2(5):45–48Google Scholar
  15. 15.
    Rakhunde SM (2014) Reversible data hiding using visual cryptography: a review. Int j innov res comput commun Eng 2(1):2815–2822Google Scholar
  16. 16.
    Rakhunde SM, Nikose AA (2014) A novel and improved technique for reversible data hiding using visual cryptography. Int j adv res comput commun eng 3(6):6951–6956Google Scholar
  17. 17.
    Surekha B, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(2):312–317Google Scholar
  18. 18.
    Tedmori S, Najdawi NA (2012) Lossless image cryptography algorithm based on discrete cosine transform. Int j inf technol 9(5):471–478Google Scholar
  19. 19.
    Umaamaheshvari A, Thanushkodi K (2012) A novel watermarking technique based on visual cryptography. Int j adv res comput Eng Technol 1(7):70–74Google Scholar
  20. 20.
    Wang DS, Song T, Dong L, Yang CN (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE trans forensics secur 8(12):2059–2072CrossRefGoogle Scholar
  21. 21.
    Wang X, Pei Q, Li H (2014) A lossless tagged visual cryptography scheme. IEEE signal process lett 21(7):853–856CrossRefGoogle Scholar
  22. 22.
    Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE trans inf forensics secur 10(7):1336–1349CrossRefGoogle Scholar
  23. 23.
    Yan X, Wang S, Niu X, Yang CN (2014) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Int j digital signal process 38:53–65CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Anna UniversityChennaiIndia
  2. 2.Muthayammal Engineering College, RasipuramRasipuramIndia

Personalised recommendations