Advertisement

Abstract

Cryptography is used for sharing the text securely. Equally visual cryptography is used to share the images securely. The secret image is distributed to the participants using visual cryptography. The participants without much cryptography knowledge can recover the secret image. The extended visual cryptography scheme that contains meaningful shares when compared to the traditional visual cryptography that has random shares. The embedded extended visual cryptography which has the best visual quality when compared to the traditional one.

Keywords

Gray scale Visual cryptography Computational modeling EVCS 

References

  1. 1.
    Patel, T., et al.: Hierarchical visual cryptography for grayscale image. In: International Conference on Green Engineering and Technologies, pp. 1–4 (2016)Google Scholar
  2. 2.
    Lin, D., et al.: Cheating prevention visual cryptography scheme using Latin square. Inf. Secur. IET 11(4), 211–219 (2017)CrossRefGoogle Scholar
  3. 3.
    Liu, F., et al.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)CrossRefGoogle Scholar
  4. 4.
    Gaur, S., et al.: A study of privacy preserving system based on progressive VCS and RST attacks. In: International Conference on Global Trends in Signal Processing Information Computing and Communication, pp. 138–142 (2016)Google Scholar
  5. 5.
    Luo, H., et al.: Robust and progressive color image visual secret sharing cooperated with data hiding. In: International Conference on Intelligent Systems Design and Applications, vol. 3, pp. 431–436 (2008)Google Scholar
  6. 6.
    Srivastava, R., et al.: A new technique for color share generation using visual cryptography. In: International Conference on Inventive Computation Technologies, vol. 2, pp. 1–4 (2016)Google Scholar
  7. 7.
    Sulaiman, M.K., et al.: A master share XOR based visual cryptography scheme by random grids. In: International Conference on Control Communication, Computing, India, pp. 528–533 (2015)Google Scholar
  8. 8.
    Govindaraju, S., et al.: Visual secret sharing schemes for color images using halftoning. In: International Conference on Computational Intelligence and Multimedia Applications, vol. 3, pp. 174–178 (2007)Google Scholar
  9. 9.
    Pawar, S., et al.: Extended capabilities of feature-extraction for digital image sharing by diverse image media. In: International Conference on Computing Analytics and Security Trends, pp. 1–6 (2016)Google Scholar
  10. 10.
    Tsai, et al.: Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognit. 39, 1530–1541 (2006)CrossRefGoogle Scholar
  11. 11.
    Prem Jacob, T., Pradeep, K.: OCSA: task scheduling algorithm in cloud computing environment. Int. J. Intell. Eng. Syst. 11(3), 2018 (2018).  https://doi.org/10.22266/ijies2018.0630.29CrossRefGoogle Scholar
  12. 12.
    Van Dijk, M., et al.: Security displays enabling secure communications. In: International Conference on Pervasive Computing. LNCS, vol. 2802, Boppard Germany, pp. 271–284. Springer, Berlin (2004)Google Scholar
  13. 13.
    De Santis, A., et al.: Improved schemes for visual cryptography. Des. Codes Cryptogr. 24, 255–278 (2001)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Pradeep, K., Prem Jacob, T.: CGSA scheduler: a multi-objective-based hybrid approach for task scheduling in cloud environment. Inf. Secur. J. Glob. Perspect. (2017).  https://doi.org/10.1080/19393555.2017.1407848CrossRefGoogle Scholar
  15. 15.
    Pravin, A., Srinivasan, S.: An efficient programming rule extraction and detection of violations in software source code using neural networks. In: IEE-Fourth International Conference on Advanced Computing, ICoAC 2012 MIT, Anna University, Chennai, pp. 1–4 (2012)Google Scholar
  16. 16.
    Jain, A.: Visual cryptography and image processing-based approach for secure transactions in banking sector. In: International Conference on Telecommunication and Networks, pp. 1–5 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSathyabama Institute of Science and TechnologyChennaiIndia

Personalised recommendations