Abstract
Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arumugam, L.R.S.: Construction of a (k, n)-visual cryptography scheme. Int. J. Des. Codes Cryptogr. 82, 629–645 (2017)
Chauhan, M.G.D.: A visual cryptographic scheme to secure image shares using digital watermarking. Int. J. Comput. Sci. Inf. Technol. 6, 4339–4343 (2015)
Chettri, L.: Visual cryptography scheme based on pixel expansion for black & white image. Int. J. Comput. Sci. Inf. Tech. (IJCSIT) 5(3), 4190–4193 (2014)
Deepa, G.: The comparative study on visual cryptography and random grid cryptography. IOSR J. Comput. Eng. (IOSR-JCE) 12(2), 4–14 (2013)
Kiran, T., Devi, K.R.: A review on visual cryptography schemes. J. Glob. Res. Comput. Sci. 3(6), 96–100 (2012)
Kumar, M., Singh, R.: A (2, n) and (3, n) visual cryptography scheme for black and white images. Int. J. Sci. Res. (IJSR) 3(3), 574–577 (2014)
Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 129–133. IEEE (2011)
Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)
Mary, D.J.G.J.: Privilege based advance halftone secure secret sharing scheme with error diffusion technique along with adaptive secure confidential key in the visual cryptography. Int. J. Comput. Intell. Res. 13, 1871–1906 (2017)
Guntupalli, N., Raju, P.D.R., Cheekaty, S.: An introduction to different types of visual cryptography schemes. Int. J. Sci. Adv. Technol. 1(7), 198–205 (2011)
Pahuja, S., Kasana, S.S.: Halftone visual cryptography for color images. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), pp. 281–285. IEEE (2017)
Ravella, Y., Chavan, P.: Secret encryption using (2, 2) visual cryptography scheme with DCT compression. In: 2107 International Conference on Intelligent Computing and Control Systems, pp. 344–349. IEEE (2017)
Rawat, K.: An approach for grey scale image in visual cryptography using error diffusion method. Int. J. Comput. Sci. Trends Technol. 5, 134–142 (2017)
Reddy, M.S., Mohan, S.M.: Visual cryptography scheme for secret image retrieval. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 14(6), 41–46 (2014)
Rohith, S., Vinay, G.: A novel two-stage binary image security system using (2, 2) visual cryptography scheme. Editorial Board 2(3), 642–646 (2012)
Dang, W., He, M., Wang, D., Li, X.: K out of K extended visual cryptography scheme based on “XOR”. Int. J. Comput. Commun. Eng. 4(6), 439–453 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B., Khandelwal, M. (2019). A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_45
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)