A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

  • G. Lakshmeeswari
  • D. Rajya Lakshmi
  • Y. Srinivas
  • G. Hima Bindu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 177)


This article presents a novel methodology of a visual cryptographic system based on Telugu Text. Visual Cryptography concerns with the methodology of hiding a secret message in n shares such that each individual receives one share and only the authorized person can identify the secret messages after superimposing one share upon the other. Many techniques are proposed in literature where in Rotation Visual Cryptography the underlying message of hiding is done by rotating the shares at different angles or directions. The proposed sliding scheme reveals the information by horizontal sliding of a share in downward direction by an angle of 1800.


Visual cryptography Encoded Telugu text Human Visual System Sliding Scheme 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dinesh Reddy, B., Valli Kumari, V., Raju, K.V.S.V.N., Prassanna Raju, Y.H.: Rotation Visual Cryptography. Using Basic (2, 2) Scheme. IJCS & CT 3(2) (January 2011) (ISSN 0974-3375)Google Scholar
  2. 2.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  3. 3.
    Tsai, P.-F., Wang, M.-S.: An (3, 3)-Visual Secret Sharing Scheme for Handling Three Secret DataGoogle Scholar
  4. 4.
    Hsu, H.C., Chen, T.S., Lin, Y.H.: The ringed shadow image technology of Visual Cryptography by applying diverse rotating angles to hide the secret sharing. Networking, Sensing and Control 2, 996–1001 (2004)Google Scholar
  5. 5.
    Lakshmeeswari, G., Rajya Lakshmi, D., Lalitha Bhaskari, D.: Extended Encoding of Telugu Text for Hiding Compatibility. IJCA 30(5) (September 2011)Google Scholar
  6. 6.
    Weir, J., Yan, W.Q.: Sharing Multiple Secrets Using Visual Cryptography. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009 (2009), doi:10.1109/ISCAS.2009.5117797Google Scholar
  7. 7.
    Ge, L., Tang, S.: Sharing “Multi-Secret Based on Circle Properties”. In: 2008 International Conference on Computational Intelligence and Security (2008)Google Scholar
  8. 8.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for Visual Cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001)MathSciNetMATHCrossRefGoogle Scholar
  9. 9.
    Yu, B., Xu, X., Fang, L.: Multi-Secret sharing threshold Visual Cryptography Scheme. International Conference on Computational Intelligence and Security (2007)Google Scholar
  10. 10.
    Lakshmeeswari, G., Rajya Lakshmi, D., Srinivas, Y.: A New Encoding Scheme of Telugu Text for Information Hiding. International Journal of Computational Intelligence Techniques 2(1), 26–28 (2011) ISSN: 0976–20466 & E-ISSN: 0976–0474Google Scholar
  11. 11.
    Wu, H., Chang, C.C.: Sharing Visual Multiple Secrets using Circle Shares. Computer Standards & Interfaces 28, 123–135 (2005)CrossRefGoogle Scholar
  12. 12.
    Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone Visual Cryptography, vol. 15(8), pp. 2441–2453. IEEE (2006)Google Scholar
  13. 13.
    Fu, Z., Yu, B.: Research on Rotation Visual Cryptography Scheme. In: International Symposium on Engineering and Electronic Commerce (2009)Google Scholar
  14. 14.
    Myodo, E., Sakazawa, S., Takishima, Y.: Visual Cryptography based on void-and-cluster Half toning technique. In: ICIP, pp. 97–100 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • G. Lakshmeeswari
    • 1
  • D. Rajya Lakshmi
    • 1
  • Y. Srinivas
    • 1
  • G. Hima Bindu
    • 1
  1. 1.GIT, GITAM UniversityVisakhapatnamIndia

Personalised recommendations