Skip to main content
Log in

Secure visual cryptography for medical image using modified cuckoo search

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Optimal secure visual cryptography for brain MRI medical image is proposed in this paper. Initially, the brain MRI images are selected and then discrete wavelet transform is applied to the brain MRI image for partitioning the image into blocks. Then Gaussian based cuckoo search algorithm is utilized to select the optimal position for every block. Next the proposed technique creates the dual shares from the secret image. Then the secret shares are embedded in the corresponding positions of the blocks. After embedding, the extraction operation is carried out. Here visual cryptographic design is used for the purpose of image authentication and verification. The extracted secret image has dual shares, based on that the receiver views the input image. The authentication and verification of medical image are assisted with the help of target database. All the secret images are registered previously in the target database. The performance of the proposed method is estimated by Peak Signal to Noise Ratio (PSNR), Mean square error (MSE) and normalized correlation. The implementation is done by MATLAB platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Aditya, K., Choudhary, A., Raj, A., Sing, M., & Adhikari, A. (2017) ‘Image watermarking based on cuckoo search with dwt using lévy flight algorithms’, In Proceedings of International Conference on Networks & Advances in Computational Technologies (NetACT) IEEE, pp. 29–33

  2. Ansari N, Shaikh R (2015) Reversible data hiding in encrypted image using visual cryptography. Int j recent inn trends comput Commun 3(2):89–92

    Google Scholar 

  3. Chiu PL, Lee KH (2015) User-friendly threshold visual cryptography with complementary cover images. Int J Signal Process 108:476–488

    Article  Google Scholar 

  4. Durairaj M, Sutharson V (2015) A survey on visual cryptography for secret data sharing. Int j comput sci inf technol 6(4):4047–4053

    Google Scholar 

  5. Kester QA (2013) A visual cryptographic encryption technical for securing medical images. Int j emerg technol adv eng 3(6):496–500

    Google Scholar 

  6. Lee CC, Chen HH, Liu HT, Chen GW, Tsai CS (2014) A new visual cryptography with multilevel encoding. Int J Vis Lang Comput 25(3):243–250

    Article  Google Scholar 

  7. Lee JS, Chang CC, Huynh NT, Tsai HY (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Int j digital signal process 40:131–139

    Article  MathSciNet  Google Scholar 

  8. Madhuri KL, Thakur V, Jaiswal R, Sonawane S, Nalavade R (2012) Biometric data security using recursive visual cryptography. Int j inf knowl manag 2(2):32–36

    Google Scholar 

  9. Mande A, Tibdewal M (2013) A fast encryption algorithm for color extended visual cryptography. Int j emerg technol adv eng 3(4):364–371

    Google Scholar 

  10. Manimurugan S, Ramajayam N (2012) Visual cryptography based on modified RLE compression without pixel expansion. Int j eng innov technol 2(3):135–138

    Google Scholar 

  11. Mohod AA, Bijwe KB (2014) An image database security using multilayer multi share visual cryptography: a review. Int j appl innov eng manag 3(10):210–215

    Google Scholar 

  12. Nagdive PS, Raut AB (2015) Visual cryptography and steganography: a review. int j adv res comput sci manag stud 3(1):58–65

    Google Scholar 

  13. Pachiappan K, Annaji S, Jayakumar N (2014) Security in medical images using enhanced visual secret sharing scheme. Int j sci eng technol res 3(9):1642–1645

    Google Scholar 

  14. Pandey V, Shrivastava M (2012) Medical image protection using steganography by crypto-image as cover image. Int j adv comput res 2(5):45–48

    Google Scholar 

  15. Rakhunde SM (2014) Reversible data hiding using visual cryptography: a review. Int j innov res comput commun Eng 2(1):2815–2822

    Google Scholar 

  16. Rakhunde SM, Nikose AA (2014) A novel and improved technique for reversible data hiding using visual cryptography. Int j adv res comput commun eng 3(6):6951–6956

    Google Scholar 

  17. Surekha B, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(2):312–317

    Google Scholar 

  18. Tedmori S, Najdawi NA (2012) Lossless image cryptography algorithm based on discrete cosine transform. Int j inf technol 9(5):471–478

    Google Scholar 

  19. Umaamaheshvari A, Thanushkodi K (2012) A novel watermarking technique based on visual cryptography. Int j adv res comput Eng Technol 1(7):70–74

    Google Scholar 

  20. Wang DS, Song T, Dong L, Yang CN (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE trans forensics secur 8(12):2059–2072

    Article  Google Scholar 

  21. Wang X, Pei Q, Li H (2014) A lossless tagged visual cryptography scheme. IEEE signal process lett 21(7):853–856

    Article  Google Scholar 

  22. Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE trans inf forensics secur 10(7):1336–1349

    Article  Google Scholar 

  23. Yan X, Wang S, Niu X, Yang CN (2014) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Int j digital signal process 38:53–65

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Alif Siddiqua Begum.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alif Siddiqua Begum, A., Nirmala, S. Secure visual cryptography for medical image using modified cuckoo search. Multimed Tools Appl 77, 27041–27060 (2018). https://doi.org/10.1007/s11042-018-5903-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5903-y

Keywords

Navigation