Abstract
Optimal secure visual cryptography for brain MRI medical image is proposed in this paper. Initially, the brain MRI images are selected and then discrete wavelet transform is applied to the brain MRI image for partitioning the image into blocks. Then Gaussian based cuckoo search algorithm is utilized to select the optimal position for every block. Next the proposed technique creates the dual shares from the secret image. Then the secret shares are embedded in the corresponding positions of the blocks. After embedding, the extraction operation is carried out. Here visual cryptographic design is used for the purpose of image authentication and verification. The extracted secret image has dual shares, based on that the receiver views the input image. The authentication and verification of medical image are assisted with the help of target database. All the secret images are registered previously in the target database. The performance of the proposed method is estimated by Peak Signal to Noise Ratio (PSNR), Mean square error (MSE) and normalized correlation. The implementation is done by MATLAB platform.
Similar content being viewed by others
References
Aditya, K., Choudhary, A., Raj, A., Sing, M., & Adhikari, A. (2017) ‘Image watermarking based on cuckoo search with dwt using lévy flight algorithms’, In Proceedings of International Conference on Networks & Advances in Computational Technologies (NetACT) IEEE, pp. 29–33
Ansari N, Shaikh R (2015) Reversible data hiding in encrypted image using visual cryptography. Int j recent inn trends comput Commun 3(2):89–92
Chiu PL, Lee KH (2015) User-friendly threshold visual cryptography with complementary cover images. Int J Signal Process 108:476–488
Durairaj M, Sutharson V (2015) A survey on visual cryptography for secret data sharing. Int j comput sci inf technol 6(4):4047–4053
Kester QA (2013) A visual cryptographic encryption technical for securing medical images. Int j emerg technol adv eng 3(6):496–500
Lee CC, Chen HH, Liu HT, Chen GW, Tsai CS (2014) A new visual cryptography with multilevel encoding. Int J Vis Lang Comput 25(3):243–250
Lee JS, Chang CC, Huynh NT, Tsai HY (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. Int j digital signal process 40:131–139
Madhuri KL, Thakur V, Jaiswal R, Sonawane S, Nalavade R (2012) Biometric data security using recursive visual cryptography. Int j inf knowl manag 2(2):32–36
Mande A, Tibdewal M (2013) A fast encryption algorithm for color extended visual cryptography. Int j emerg technol adv eng 3(4):364–371
Manimurugan S, Ramajayam N (2012) Visual cryptography based on modified RLE compression without pixel expansion. Int j eng innov technol 2(3):135–138
Mohod AA, Bijwe KB (2014) An image database security using multilayer multi share visual cryptography: a review. Int j appl innov eng manag 3(10):210–215
Nagdive PS, Raut AB (2015) Visual cryptography and steganography: a review. int j adv res comput sci manag stud 3(1):58–65
Pachiappan K, Annaji S, Jayakumar N (2014) Security in medical images using enhanced visual secret sharing scheme. Int j sci eng technol res 3(9):1642–1645
Pandey V, Shrivastava M (2012) Medical image protection using steganography by crypto-image as cover image. Int j adv comput res 2(5):45–48
Rakhunde SM (2014) Reversible data hiding using visual cryptography: a review. Int j innov res comput commun Eng 2(1):2815–2822
Rakhunde SM, Nikose AA (2014) A novel and improved technique for reversible data hiding using visual cryptography. Int j adv res comput commun eng 3(6):6951–6956
Surekha B, Swamy GN (2012) Visual secret sharing based digital image watermarking. Int J Comput Sci 9(2):312–317
Tedmori S, Najdawi NA (2012) Lossless image cryptography algorithm based on discrete cosine transform. Int j inf technol 9(5):471–478
Umaamaheshvari A, Thanushkodi K (2012) A novel watermarking technique based on visual cryptography. Int j adv res comput Eng Technol 1(7):70–74
Wang DS, Song T, Dong L, Yang CN (2013) Optimal contrast grayscale visual cryptography schemes with reversing. IEEE trans forensics secur 8(12):2059–2072
Wang X, Pei Q, Li H (2014) A lossless tagged visual cryptography scheme. IEEE signal process lett 21(7):853–856
Wang X, Pang K, Zhou X, Zhou Y, Li L, Xue J (2015) A visual model-based perceptual image hash for content authentication. IEEE trans inf forensics secur 10(7):1336–1349
Yan X, Wang S, Niu X, Yang CN (2014) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Int j digital signal process 38:53–65
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Alif Siddiqua Begum, A., Nirmala, S. Secure visual cryptography for medical image using modified cuckoo search. Multimed Tools Appl 77, 27041–27060 (2018). https://doi.org/10.1007/s11042-018-5903-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5903-y