A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems

  • Krishna Prakasha
  • Rachana Kalkur
  • Vasundhara AcharyaEmail author
  • Balachandra Muniyal
  • Mayank Khandelwal
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)


Secure communication and Secure data transfer are one of the significant challenges in the era of Internet. With the development in information technology, there arose a need for invulnerable transfer of data. Visual Cryptography is the method in which the secrets are encoded in the form of shares which can be decrypted by overlapping the shares that are obtained. As the usage of images in the industrial process is rapidly rising, it is vital to protect the confidential image data from unauthorized access. The (2,2) Visual Cryptography scheme involves the encoding of the image to create two shares. It is later obtained through the stacking process. Further, Halftoning technique can be applied by the dithering process for the approximation of the colors in the image. It makes use of Floyd’s Steinberg Algorithm which uses the dithering process by mapping the required color from the eight color bit palette assigned. The design layout is broken down into two module. The first module is used to convert the image into a binary image, and the other module is used to pass the input image to Floyd’s Steinberg algorithm. This technique can be best suited for the application in the banking system or any other field where confidentiality is the primary concern.


Dithered image Error diffusion \((2, 2)\) Visual Cryptographic scheme 


  1. 1.
    Arumugam, L.R.S.: Construction of a (k, n)-visual cryptography scheme. Int. J. Des. Codes Cryptogr. 82, 629–645 (2017)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Chauhan, M.G.D.: A visual cryptographic scheme to secure image shares using digital watermarking. Int. J. Comput. Sci. Inf. Technol. 6, 4339–4343 (2015)Google Scholar
  3. 3.
    Chettri, L.: Visual cryptography scheme based on pixel expansion for black & white image. Int. J. Comput. Sci. Inf. Tech. (IJCSIT) 5(3), 4190–4193 (2014)Google Scholar
  4. 4.
    Deepa, G.: The comparative study on visual cryptography and random grid cryptography. IOSR J. Comput. Eng. (IOSR-JCE) 12(2), 4–14 (2013)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Kiran, T., Devi, K.R.: A review on visual cryptography schemes. J. Glob. Res. Comput. Sci. 3(6), 96–100 (2012)Google Scholar
  6. 6.
    Kumar, M., Singh, R.: A (2, n) and (3, n) visual cryptography scheme for black and white images. Int. J. Sci. Res. (IJSR) 3(3), 574–577 (2014)Google Scholar
  7. 7.
    Anbarasi, L.J., Vincent, M.J., Mala, G.S.A.: A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography. In: 2011 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 129–133. IEEE (2011)Google Scholar
  8. 8.
    Liu, F., Wu, C., Lin, X.: Step construction of visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 5(1), 27–38 (2010)CrossRefGoogle Scholar
  9. 9.
    Mary, D.J.G.J.: Privilege based advance halftone secure secret sharing scheme with error diffusion technique along with adaptive secure confidential key in the visual cryptography. Int. J. Comput. Intell. Res. 13, 1871–1906 (2017)Google Scholar
  10. 10.
    Guntupalli, N., Raju, P.D.R., Cheekaty, S.: An introduction to different types of visual cryptography schemes. Int. J. Sci. Adv. Technol. 1(7), 198–205 (2011)Google Scholar
  11. 11.
    Pahuja, S., Kasana, S.S.: Halftone visual cryptography for color images. In: 2017 International Conference on Computer, Communications and Electronics (Comptelix), pp. 281–285. IEEE (2017)Google Scholar
  12. 12.
    Ravella, Y., Chavan, P.: Secret encryption using (2, 2) visual cryptography scheme with DCT compression. In: 2107 International Conference on Intelligent Computing and Control Systems, pp. 344–349. IEEE (2017)Google Scholar
  13. 13.
    Rawat, K.: An approach for grey scale image in visual cryptography using error diffusion method. Int. J. Comput. Sci. Trends Technol. 5, 134–142 (2017)Google Scholar
  14. 14.
    Reddy, M.S., Mohan, S.M.: Visual cryptography scheme for secret image retrieval. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 14(6), 41–46 (2014)Google Scholar
  15. 15.
    Rohith, S., Vinay, G.: A novel two-stage binary image security system using (2, 2) visual cryptography scheme. Editorial Board 2(3), 642–646 (2012)Google Scholar
  16. 16.
    Dang, W., He, M., Wang, D., Li, X.: K out of K extended visual cryptography scheme based on “XOR”. Int. J. Comput. Commun. Eng. 4(6), 439–453 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Krishna Prakasha
    • 1
  • Rachana Kalkur
    • 1
  • Vasundhara Acharya
    • 2
    Email author
  • Balachandra Muniyal
    • 1
  • Mayank Khandelwal
    • 3
  1. 1.Department of Information and Communication TechnologyManipal Institute of Technology, MAHEManipalIndia
  2. 2.Department of Computer Science and EngineeringManipal Institute of Technology, MAHEManipalIndia
  3. 3.Aalto UniversityHelsinkiFinland

Personalised recommendations