a survey on visual cryptography techniques

Upload: anonymous-vqrjlen

Post on 08-Jul-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    1/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 100 

    ABSTRACTVisual Cryptography is a new technique for securing the visual information like picture, text etc. The basic idea of Visual

    Cryptography is that images are divided into several parts called shares. These shares are distributed among concerned

     participants and to decrypt them arrange or stacked to get the image back. At first there are various measures on which performance of visual cryptography schemes depends, such as pixel expansion, visual quality, image quality, contrast, security,

    quality of shares, size, computational complexity. Visual Cryptography techniques was developed for binary images only but

    later on it was advanced for colour images also. In this paper, we have done the literature survey on existing work which used

     different techniques for visual cryptography from 2011 to 2015.

    Keywords : visual cryptography, pixel expansion, visual quality, security, quality of shares.

    1.INTRODUCTIONVisual cryptography is introduced by first in 1994 Noar and Shamir. Visual cryptography is a cryptographic techniquewhich allows visual information (e.g. printed text, hand written notes and pictures) to be encrypted in such a way thatthe decryption can be performed by thehuman visual system, without the aid of computers.This paper provides overview of various visual cryptography schemes. Taking limited bandwidth and storage into

    consideration two criteria pixel expansion and number ofshares encoded is of significance. Smaller pixel expansionresults in smaller size of the share. Encoding multiple secret images in to the same share images requires less overheadwhile sharing multiple secrets. Meaningful shares avoid attention of hacker considering the securityissues over thecommunication channels.This paper is organized as follow: 1.over view of black and white visual cryptography scheme, 2.color visualcryptography scheme 3.gray scale image visual cryptography scheme 4.analysis of various visual cryptography scheme.

    1.1 BLACK AND WHITE VISUAL CRYPTOGRAPHY SCHEME:

     Naor and Shamir’s proposed encoding scheme to share a binary image into two shares Share1 and Share2. If pixel iswhite one of the above two rows of Table1is chosen togenerate Share1and Share2.Similarly If pixel is black one of the below two rows of Table1 is chosen to generate Share1and Share2. Here each share pixel p is encoded into twowhiteand two black pixels each of share alone gives no is clue about the pixel p whether it is white or black. Secretimage is shown only when both of the images became shares are upper imposed.

    Figure 1 Black and White image VCS

    A SURVEY ON VISUAL CRYPTOGRAPHY

    TECHNIQUESM.SIVA KUMAR

    1, A.SHILPA

    2, J.R.VIJAYALAKSHMI

    3

    1,2,3 Department of Computer Science and Engineering,Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India.

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    2/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 101 

    Table 1: Construction of Black and White image VC

    To hide a binary image into two meaningful shares Chin Chen Chang et al suggested spatial-domain image hidingschemes. These two secret shares are embedded into two gray level cover images. To decode the hidden messages,embedding images can be superimposed.Balancing the performance between pixel expansion and contrast Liguo Fangrecommend a (2, n) scheme based on combination. Threshold visual secret sharing schemes mixed XOR and ORoperation with reversing and based on binary linear error correcting code was suggested by Xiao Qing and Tan .Thedisadvantage of the above schemes is that only one set of confidential messages can be embedded, so to share largeamounts of confidential messages several shares have to be generated.1.2 GRAY SCALE IMAGE CRYPTOGRAPHY SCHEME:

    The (2, 2)–VCS scheme is introduce the basic concepts of threshold visual secret sharing schemes. In the encryption process, secret image is divide into two shares, and each share belongs to the corresponding secrete image. In thedecryption process, two corresponding shares are mound together to retrieve the secret image. With (k, n) threshold

    visual cryptography scheme for gray level images using dithering technique, the reduction the reduction size ofdecrypted image compared to technique is obtain but the quality of decrypted image depends upon the quality ofhalftone image. The half toning is performed by Adaptive order technique of gray-level image by using a space-filingcurve to perform an adaptive variation of the cluster size. For the encryption using half-toning technique gray levelimage is changed into approximate binary image or halftone image having pixel value 0 and1. By considering the caseof (2, 2) - VCS, the step is divide the secrete image into two shares. For decryption the original image is reconstructed by mound binary shares.

    254: [1 1 1 1 1 1 1 0]Table 2-Construction of gray scale image VC

    Share1 (1st half): 0 1 0 1 0 1 0 0Share2 (1st half): 1 0 1 0 1 0 1 0

    --------------------1 1 1 1 1 1 1 0 = 254

    Share3 (1st half) : 0 0 1 0 0 1 0 0Share1 (2nd half): 1 1 0 1 1 0 1 0

    -------------------1 1 1 1 1 1 1 0 = 254

    Share2 (2nd half): 1 1 1 0 1 1 1 0

    Share3 (2nd half): 1 0 0 1 0 1 0 0-------------------

    1 1 1 1 1 1 1 0 = 254

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    3/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 102 

    Secret image share1 share2Figure 2 Gray scale image VCS

    Combining any two half shares will give exact bit and by doing the same procedure for the whole grayscale block gives perfect high quality image when reconstructed without any loss of contrast.

    1.3 COLOR VISUAL CRYPTOGRAPHY SCHEME:Until the year 1997 visual cryptography schemes were applied to only black and white images. First colored visual

    cryptography scheme was developed by Verheul and Van Tilborg. Colored secret images can be shared with theconcept of arcs to construct a colored visual cryptography scheme. In c-colorful visual cryptography scheme one pixel istransformed into m sub pixels, and each sub pixel is divided into c color regions. In each subpixel, there is exactly onecolor region colored, and all the other color regions are black. The color of one pixel depends on the interrelations between the stacked sub pixels. For a colored visual cryptography scheme with c colors, the pixel expansion m is c× 3.Yang and Laihimproved the pixel expansion to c × 2 of Verheul and Van Tilborg . But in both of these schemes sharegenerated were meaningless. For sharing a secret color image and also to generate the meaningful share to transmitsecret color image Chang and Tsai anticipated color visual cryptography scheme. For a secret color image twosignificant color images areselected as cover images which are the same size as the secret color image. Then accordingto a predefined Color Index Table, the secret color image will be hidden into twocamouflage images. One disadvantageof this scheme is that extra space is required to accumulate the Color Index Table. When more colors are there in thesecret image the larger the size of shares will become. To overcome this limitation Chin- Chen Chang et al developed a

    secret color image sharing scheme based on modified visual cryptography.Table 3: Construction of color image VC

    Figure 3 Color image VCS

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    4/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 103 

    2. ANALYSIS OF VARIOUS VISUAL CRYPTOGRAPHY SCHEME:Table 4: Table for Visual Cryptography problems and solving techniques

    AUTHOR NAME TITLE AND YEAR METHOD TO SOLVE PROBLEM

    Xuehu Yan et al Halftone Visual CryptographyWith Minimum Auxiliary

    Black Pixel & Uniform ImageQuality2015

    HVCS(Halftone Visual CryptographyScheme)

    Error diffusion

    Large auxiliary black pixeldistribution

    P.G.Haritha et al A New Visual CryptographyTechnique For Color Images

    2015

    VSSError DiffusionChen technique

    Visual qualityPixel expansion

    Contrast lossMs.Deepti

    Chaudhary et alA Secure Authentication Using

    Visual Cryptography& Steganography

    2015

    Steganography(LSB)VC (k,n)

    Authenticity

    J. Ida Christy et al Feed Forward Networks InColor Extended VisualCryptography To

    Generate Meaningful Shares2015

    EVCS

    ColorHalftoning

    Random pixelmanagement

    Pixel expansion

    AlfiyaSaiyyad et al Secure Authentication ByImage Processing And Visual

    Cryptography For BankingApplications.

    2015

    Image processing

    Correlation method

    Authenticity

    RiteshD.Yelane etal

    Security Approach By UsingVisual Cryptographic

    Technique2015

    EVCS

    Halftone

    Informationsecurity

    ContrastShrutiSekra et al Steganography Using Genetic

    Encryption Along With VisualCryptography

    2015

    Steganography (using LSB-Geneticalgorithm)

    VCS

    Authenticity

    SujitAhirrao et al Visual Cryptography SchemeFor Color Image Using K-N

    Secret Sharing Algorithm2015

    K n secret sharing algorithm

    Secure Visual Crytography

    Water Marking(LSB)

    Malicious attacks

    Sankar Das et al Visual Cryptography usingThree Independent Shares in

    Color Images2015

    (3,3)VCSRandom insertion of bits

    Floyds error diffusion Halftone

    Reconstruction ofsecret message

    Fersna et al Progressive VCS Without PixelExpansion For Color Images

    2015

    Progressive Visual Cryptography

    Halftone

    Digital watermarking algorithms

    Pixel expansion

    Security

    Contrast

    AparnaBhosale etal

    Reducing Transmission RiskUsing Diverse Image

    Media

    2015

    (n,n) NVSS(natural image based VSSscheme)

    Transmission risk problem

    Jainthi.K. et al A Novel CryptographicTechnique That Emphasis

    Visual

    K out of k (EVCS)

    Floyds steinberg error diffusion

    Security

    Visual quality

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    5/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 104 

    Quality And Efficieny By FloydSteinberg Error

    Diffusion Method2015

    algorithm

    Random grids

    Halftone

    Contrast

    Size

    Quality ofreconstructedimage

    Ketanraukundiya etal

    Secure System Framework forSecure VisualCryptography

    2015

    Steganography(LSB)

    (CRT)Chinese Remainder Theorem

    RNS(Residual Number System)

    Pixel expansion

    Security

    Image qualityVandhana.G.Pujari

    et al Novel Approach for Visual

    Cryptography Using AdaptiveLocalFilter2015

    Adaptive local filters Quality ofdecrypted image

    Alkhamohan et al Contrast Enhancement in ColorExtended Visual Cryptography

    2015

    ABM(Additional Basis Matrix) Contrast loss

    Pixelreconstruction

    F.R.Shiny Malar Secured Privacy PreservingMechanism for Distributed

    Digital Documents2015

    Visual cryptic filtering scheme

    Error transformission technique

    Image quality

    Security

    Kai-Hui Lee et al Digital Image Sharing byDiverse Image Media

    2014

    (n,n) NVSS (Natural Visual SecretSharing)

    Transmission risk problem

    Che-Wei Lee et al  A Secret-Sharing-Based

    Method for Authenticationof Grayscale Document Images

    via the Use of thePNG Image With a Data Repair

    Capability2014

    Shamir secret sharing scheme Image

    authentication

    Kai-Hui Lee et al Sharing Visual Secrets inSingle Image Random Dot

    Stereograms2014

    BVCS(Binocular VisualCryptography Scheme)

    SIRDSS(Single Image Random DotStereograms

    Transmission risk problem

    HaoLuo et al Color Transfer In Visual

    Cryptography2014

    (k-n)Secret Sharing Algorithm Computational

    complexity

    Cheng-Chi Lee etal

    A new Visual Cryptographywith Multi-level Encoding

    2014

    VSS(Visual Secret Sharing) Pixel expansion

    Shruti M.Rakhunde

    Reversible Data Hiding UsingVisual Cryptography: A

    Review2014

    RDH(Reversible Data Hiding)

    SDS(Seiving-Divison Shuffling)Algorithm

    Lossless image

    Encryption/decryption cost

    Jyoti Rao et al Survey Of Visual CryptographySchemes Without

    Pixel Expansion2014

    Wu –chen Scheme

    Shyu et al scheme

    Xia oyu et al Scheme

    Pixel expansion

    Count of secretimage shares

    Share generation

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    6/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 105 

    Tsungleihlin,horng-lee chen et alscheme

    K.V.Ramana et al Error Diffusion Based ColorVisual Cryptography ForSecure Communication

    2014

    Error diffusion

    VIP Synchroniztion

    Floyds and Steinberg error filters

    Color diffusion

    Less visual qualityof meaningful andmeaningless shares

    Shekhachenthara etal

    A Novel Approach On ColorExtended Visual CryptographyFor General Access Structures

    Using Error Diffusion2014

    PVC watermarking Quality ofMeaningful share

    LekhikaChettri Visual Cryptography SchemeBased On Pixel

    Expansion for Black & White

    Image2014

    (2,2) Visual cryptography algorithm

    K out of k Visual Cryptography

    Scheme

    Pixel expansion

    Security

    Contrast

    T.Anuradha et al A Novel Gaussian ErrorDiffusion based Colour

    Extended Visual Cryptography2014

    Color EVCS

    Gaussion Error Diffusion

    PSNR(Peak Signal to Noise Ratio)

     NCC(Normalized CorrelationCofficient)

    MSE(Mean Square Environment)

    Quality of shares

    Security

    Performace

    Bharanivendhan .Net al

    Visual Cryptography Schemesfor Secret Image Sharing

    using GAS Algorithm2014

    GAS algorithm

    Stamping algorithm

    Visual quality

    Security

    Resolution ofshares

    Pixel expansionDhara Trivedi et al Visual Cryptography in

    Biometrics Passport2014

    Bio metricies Authenticity

    Security

    ShyongJianShyu Visual Cryptograms OfRandom Grids For General

    Access Structures2013

    VCRG-GAS(Visual Cryptograms OfRandom Grids For General Access

    Structures)

    Pixel expansion

    ShyongJianShyu etal

    General Constructions ForThreshold Multi-Secret Visual

    Cryptography Scheme2013

    (k,n,s,R)MVCS(Multi-Secret VisualCryptography Scheme)

    ILP(Integer Linear Programming)

    Pixel expansion

    Kai-Hui Lee et al Image Size Invariant VisualCryptography For General

    Access Structures Subject To

    Display Quality Constraints2013

    SIVCS(Size Invariant VisualCryptography Scheme)

    Pixel expansion

    Uncontrollable

    display quality problemRoberto De Prisco

    et alColor Visual Cryptography

    Scheme for Black and WhiteCBW-VC(Color-Black And White)

    Visual CryptographyPixel expansion

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    7/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 106 

    Secret Images2013 BW-VC(Black And White) Visual

    Cryptography

    Peng Li et al Sharing More Information in

    Gray VCS2013

    SHIGVCS(Sharing More Information

    in Gray VCS)

    PSSS(Polynomial-based SecretSharing Scheme)

    Visual quality

    Pixel expansion

    Th. RupachandraSingh et al

    Video Watermarking SchemeBased Visual Cryptography

    And Scene Change & Detection2013

    Video watermarking scheme Video pre processing

    Grishma R.Bhokare et al

    Color Extended VisualCryptography Using Error

    Diffusion With VIPSynchronization

    2013

    Error diffusion

    VIP Synchronization

    (k-n) Secret Sharing Algorithm

    Visual quality

    Color shares

    Pixel expansion

    Dr.V.R.Anitha et al Extending The VisualCryptography Algorithm Using

    ImageWatermarking Technique

    2013

    Watermarking Pixel expansion

    Display quality

    Anuprita U. mande Parameter Evaluation andReview of Various

    Error-Diffusion Half toningalgorithms used in

    Color Visual Cryptography2013

    (E-D) algorithms

    Floyds-stengberg halftone algorithm

    Jarvis halftone algorithm

    Stucki halftone algorithm

    ModificationFloyds-stengberg halftone algorithm

    Contrast loss

    Perceived loss

    Anuprita U. mande A Fast Encryption Algorithmfor Color Extended Visual

    Cryptography2013

    Faster and easier color VC encryptionmethod

    Floyds-stengberg halftone algorithm

    Jarvis halftone algorithm

    Stucki halftone algorithm

    ModificationFloyds-stengberg halftone algorithm

    Contrast

    Image (visual)quality

    Sathiya k et al Comparison of VisualCryptographic

    Algorithms for Quality ImagesUsing XOR

    2013

    Floyds-stengberg halftone algorithm

    Javris halftone algorithm

    Stucki halftoneAlgorithm

    Pixel reversal technique

    Visual quality

    Dr.V.R.ANITH etal Extending the VisualCryptography AlgorithmWithout Removing Cover

    Images

    EVCS without Remove cover image Management problem

    Pixel expansion

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    8/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 107 

    2013SonalWange A Visual Cryptography to

    Secure Biometric Database: AReview2013

    Biometric identification technique Authentication

    MitsuguIwamoto A Weak Security Notion ForVisual Secret Sharing Scheme2012

    WS-VSSUS-VSS Contrast loss

    Pixel expansionChing-Nung Yang

    et alK Out N Region Incrementing

    Scheme In Visual Cryptography2012

    RIVCS(Region Incrementing schemeIn Visual Cryptography Scheme)

    Wang scheme-Incorrect color

     problem

    Amir Kolaman etal

    Quaternion StructuredSimilarity A New Quality Index

    For Color Images2012

    VQM(Visual Quality Matrix)

    QTP(Quaternion Image Processing)

    QSSIM(Quaternion Structured

    SIMilarity

    Image quality

    Duan-Yu Chen etal

    Visual Depth Guided ColorImage Rain Streaks Removal

    Using Sparse Coding2012

    Rain removal framework

    Sparse coding

    Rain removal

    Kai - H ui L e e etal

    An Extended VisualCryptography For General

    Access Structures2012

    EVCS(Extended Visual CryptographyScheme)

    Stamping algorithm

    Pixel expansion,Display quality,Random pixelmanagement

     problemPankajaPatil et al Visual Cryptography For

    Color Images Using ErrorDiffusion And Pixel

    Synchronization2012

    Error diffusion

    VIP Synchronization

    Javris and Floyds error diffusion

    Low frequencydifference

    Visual contrast

    Anshul Sharma Performance Of Error Filters InHalftone

    Visual Cryptography2012

    Error diffusion filters

    (PSNR&UQI)

    Image quality ofhalftone shares

    AnanthakumarKendra et al

    An Improved (8, 8) ColourVisual Cryptography Scheme

    UsingFloyd Error Diffusion

    2012

    Authentication

    Security

    VIPSynchroniztion

    CRC AlgorithmColor VC

    Error diffusion

    Manimurugan.S etal

    Visual Cryptography Based OnModified

    RLE Compression withoutPixel Expansion

    2012

    RLE compression Pixel expansion

    Decrypted imagequality

    Security

    Anushal Sharma et

    al

    Performance of Error Filters on

    Shares in HalftoneVisual Cryptography via ErrorDiffusion

    2012

    All Error Diffusion Algorithm

    Sierra,Stevenson-Arce error filters

    Visual quality

    Contrast

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    9/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 108 

    InKoo Kang et al Color Extended VisualCryptography Using Error

    Diffusion2011

    Visual information pixel (VIP)synchronization

    Error diffusion

    Low visual qualityof shares

    Tzung-Her Chen et

    al

    User Friendly Random Grid

    Based Visual Secret Sharing2011

    RGVSS(Random Grid Based Visual

    Secret Sharing)

    Pixel expansion

    ShyongJianShyu etal

    Optimum Pixel Expansion ForThreshold Visual Secret

    Sharing Scheme2011

    ILP(Integer Linear Programming) Pixel expansion

    Velmurugan.N etal

    Visual Pixel Expansion ofSecret Image

    2011

    VCSORVCSXOR

    Pixel expansion

    Small contrast N Krishna Prakash

    et alVisual Cryptography Scheme

    For Color Images

    Using Half Toning Via DirectBinary Search With AdaptiveSearch And Swap

    2011

    Direct Binary Search(DBS) withadaptive search and swap method

    Quality of halftoneimage

    Computationalcompexity

    MorampudiNareshkumar et al

    A Novel Approach ForCheating Prevention

    Through Visual CryptographicAnalysis

    2011

    Robust Cheating PreventionAlgorithm

    Cheating problem

    Shiny Malar. F R etal

    Error Filtering Schemes forColor Images in Visual

    Cryptography2011

    Visual cryptic filtering Scheme

    Fourier transform

    Quality of image

    Blurring effects

    Pixel expansion

    3.PROPOSED METHODOLOGYProposed methodology has been divided into three phases. It will support all image file formats including 2D,and 3Dimages.3.1 Halftone Image Creation

    In this phase, the original color image is taken from the system that may be any file format (expect *.bmp,*.wbmp).Then the original image is halftoned using Floyd – Steinberg algorithm. In this algorithm takes less time to performhalftones. Then the halftone image is ready to generate shares. The halftone image pixels are not expanded and alsohighly contrasted.3.2 Share Generation

    In this second phase, the halftone is generated into share images using K-N secret sharing algorithm. The n number oftransparency shares are generated and every share was saved. These shares are same size, pixel and different intransparency levels and also meaningful images.3.3 Reconstruction

    In this third phase, the selected k number of shares are overlapped and reconstruct the halftone image. The finalreconstructed images is highly contrasted and free from pixel expansion problem.

    4. FUTURE SCOPE:We had suggested a future development of VC scheme to,1.Apply VC for videos.

    2. Using MSB algorithm in steganography for encoding and decoding in VC.4.1 CONCLUSION

    In today’s world security of the image is very important. In this paper we have surveyed different problems andtechniques in the years (2011-2015). This survey table is very useful to understand problems and corresponding

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    10/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 109 

     problem solving techniques and also identifies available techniques to solve a problem. In the 20 years of VC historythe extended and embedded VC techniques are hard to hack the hidden information. We conclude that all techniquesare good for data hiding and have their own advantages and disadvantages and give a security so that no one can accessthe image in open network.

    REFERENCES[1] P.G.Haritha, Mrs.M.MathinaKani, “A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES“, international journal for trends in engineering & technology, volume 4 issue 2 – April 2015 - ISSN: 2349 –9303.

    [2] Ms.Deepti Chaudhary, Mrs.RashmiWelekar,” A Secure Authentication Using Visual Cryptography&Steganography “, International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 –March 2015.

    [3] Prof.SujitAhirrao, TusharkumarSakariya, AbhijeetBhokare,RahulThube , “VISUAL CRYPTOGRAPHY SCHEMEFOR COLOR IMAGE USING K-N SECRET SHARING ALGORITHM “, International Journal of AdvancedTechnology in Engineering and Science www.ijates.com Volume No.03, Issue No. 02, February 2015 ISSN(online): 2348 – 7550.

    [4] ShrutiSekra, SamtaBalpande, KarishmaMulani, “STEGANOGRAPHY USING GENETIC ENCRYPTIONALONG WITH VISUAL CRYPTOGRAPHY”, SSRG International Journal of Computer Science andEngineering(SSRG-IJCSE) – volume 2 issue 1 January 2015.

    [5] Miss .AlfiyaSaiyyad, Miss.AsmaKhan,Prof.MadhuriBadole, ”SECURE AUTHENTICATION BY IMAGEPROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS “,International Journal ofAdvance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue(NCRTIT 2015), January2015.ISSN 2348–4853.

    [6] J. Ida Christy and V. Seenivasagam ,“FEED FORWARD NETWORKS IN COLOR EXTENDED VISUALCRYPTOGRAPHY TO GENERATE MEANINGFUL SHARES” , International Journal of Security and ItsApplications Vol.9, No.1 (2015).

    [7] SonamSoni, A Road Map to Visual Cryptography ,International Journal of Advanced Research in ComputerScience and Software Engineering, Volume 5, Issue 4, 2015,ISSN: 2277 128X.

    [8] YoungJaeMaeng, Aziz Mohaisen, Mun-Kyu Lee , DaeHunNyang , Transaction authentication usingcomplementary colors, Science Direct computers & security48(2015) 167e181.

    [9] Xuehu Yan , Shen Wang , XiamuNiu , Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , Digital Signal Processing 38 (2015) 53–65.

    [10] Sankar Das, Sandipan Chowdhury, DibyaChakraborty, Arijit Das, AsokeNath, Visual Cryptography using ThreeIndependent Shares in Color Images,International Journal of Innovative Research in Advanced Engineering(IJIRAE) ISSN: 2349-2163 ,Issue 4, Volume 2 (April 2015).

    [11] Hemant N. Randhir ,A Literature Review on Pixel Rotation, Pixel Expansion and Number of Share Generation InVisual Cryptography, International Journal of Advance Foundation and Research in Computer (IJAFRC), Volume2, Issue 2, February 2015, ISSN 2348 – 4853.

    [12] Fersna S, Athira V,Progressive visual cryptography scheme without pixel expansion for color images,InternationalJournal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.

    [13] Ms.BhawnaShrivas, Prof.ShwetaYadav,A Survey on Visual Cryptography Techniques and their Applications,International Journal of Computer Science and Information Technologies, Vol. 6 (2), 2015, 1076-1079.

    [14] AparnaBhosale, Jyoti Rao, Reducing Transmission Risk Using Diverse Image Media, International Journal ofComputer Science and Information Technologies, Vol. 6 (3) , 2015, 3080-3084.[15] Jainthi.K, Prabhu.P, A NOVEL CRYPTOGRAPHIC TECHNIQUE THAT EMPHASIS VISUAL QUALITY AND

    EFFICIENY BY FLOYD STEINBERG ERROR DIFFUSION METHOD, International Journal of Research inEngineering and Technology, Volume: 04 Issue: 02 | Feb-2015.

    [16] KetanRajuKundiya, Ram B. Joshi , Secure System Framework for Secure Visual Cryptography, InternationalJournal of Computer Applications (0975 – 8887), Volume 109 – No. 14, January 2015.

    [17] Vandana G. Pujari, S. R. Khot,Novel Approach for Visual Cryptography Using Adaptive Local Filter,InternationalJournal of Advance Research in Computer Science and Management Studies, Volume 3, Issue 2, February 2015,ISSN: 232 7782.

    [18] Alkha Mohan, Jayakrishnan A,Contrast Enhancement in Color Extended Visual Cryptography, InternationalJournal of Advanced Research in Computer Science and Software Engineering , Volume 5, Issue 3, March 2015ISSN: 2277 128X.

    [19] SonamSoni,A Road Map to Visual Cryptography,International Journal of Advanced Research in Computer Scienceand Software Engineering, Volume 5, Issue 4, 2015, ISSN: 2277 128X.

    [20] F.R. Shiny Malar and M.K. Jeyakumar, Secured Privacy Preserving Mechanism for Distributed DigitalDocuments, Research Journal of Applied Sciences, Engineering and Technology 10(5): 495-503, 2015.

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    11/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 110 

    [21] Rucha R. Raut1, Prof.KomalB.Bijwe, A Survey Report on Visual Cryptography and Secret Fragment VisibleMosaic Images, International Journal of Application or Innovation in Engineering & Management(IJAIEM),Volume 3, Issue 10, October 2014, ISSN 2319 – 4847.

    [22] Prashant B Swadas, SamipPatel,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY,IJRET: International Journal of Research inEngineering and Technology,2014.

    [23] Cheng-Chi Lee, Hong-Hao Chen, Hung-Ting Liu , Guo-Wei Chen, Chwei-Shyong Tsai, A new visualcryptography with multi-level encoding, Journal of Visual Languages and Computing, 25 (2014) 243–250.[24] Ching-NungYang , Yao-Yu Yang, New extended visual cryptography schemes with clearer shadow images ,

    Information Sciences 271 (2014) 246–263.[25] HaoLuo a, Hua Chen a, Yongheng Shang , Zhenfei Zhao, Yanhua Zhang, Color transfer in visual

    cryptography,Measurement 51 (2014) 81–90, journal homepage: www.elsevier.com/locate/ measurement.[26] Ashish Sharma, Devesh Kumar Srivastava, A Comprehensive View on Encryption Techniques of Visual

    Cryptography, International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ,ISSN 2277 –8322.

    [27] Shruti M. Rakhunde, Reversible Data Hiding using Visual Cryptography: A Review, International Journal ofInnovative Research in Computer and Communication Engineering, Vol. 2, Issue 1, January 2014.

    [28] Asst. Prof.Jyoti Rao1, Dr.Vikram Patil2, Ms.Smita Patil3,Survey of Visual Cryptography Schemes without PixelExpansion,International Journal Of Engineering And Computer Science ISSN:2319-7242 ,Volume 3 Issue 9,September 2014 Page No. 8372-8376.

    [29] K.V.Ramana, Y.AdiLakshmi,Error Diffusion Based Color Visual Cryptography for SecureCommunication,International Journal of Advanced Research in Computer and Communication Engineering Vol.3, Issue 1, January 2014.

    [30] ShekhaChenthara, Deepika M.P, Dr. Varghese Paul,A Novel Approach on Color Extended Visual Cryptographyfor General Access Structures using Error Diffusion, International Journal of Advanced Research in Computer andCommunication EngineeringVol. 3, Issue 2, February 2014.

    [31] LekhikaChettri, Visual Cryptography Scheme Based On Pixel Expansion for Black & White Image, InternationalJournal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4190-4193.

    [32] T. Anuradha, Dr. K. Usha Rani, A Novel Gaussian Error Diffusion based Colour Extended Visual Cryptography,International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6528-6531.

    [33] Prashant B Swadas1, Samip Patel2,DhrutiDarji, A COMPARATIVELY STUDY ON VISUAL

    CRYPTOGRAPHY, International Journal of Research in Engineering and Technology, Volume: 03 Issue: 01 | Jan-2014.

    [34] Bharanivendhan N, Amitha T, Ph. D, Visual Cryptography Schemes for Secret Image Sharing using GASAlgorithm, International Journal of Computer Applications (0975 – 8887) Volume 92 – No.8, April 2014.

    [35] Dhara Trivedi, Dr, Jigar Patel, Visual Cryptography in Biometrics Passport, International Journal on Recent andInnovation Trends in Computing and Communication ISSN: 2321 -8169 Volume: 2 Issue: 3 483 – 487, March2014.

    [36] Kai-Hui Lee and Pei-Ling Chiu, Sharing Visual Secrets in Single Image Random Dot Stereograms, IEEETRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014.

    [37] Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing by Diverse Image Media, IEEE TRANSACTIONS ONINFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.

    [38] Th. Rupachandra Singh, Kh. Manglem Singh b, Sudipta Roy, Video watermarking scheme based on visual

    cryptography and scene change detection, International Journal of Electronics and Communications (AEÜ) , Int. J.Electron. Commun.(AEÜ) 67 (2013) 645–651.[39] PengLi ,Ching-Nung Yang, Qian Kong , Yanpeng Ma , Zheng Liu , Sharing more information in gray visual

    cryptography scheme, J. Vis. Commun. Image R. 24 (2013) 1380–1393.[40] Roberto De Prisco , Alfredo De Santis, Color visual cryptography schemes for black and white secret images ,

    Theoretical Computer Science 510 (2013) 62–86.[41] Hsiao-ChingLin ,Ching-Nung Yang , Chi-Sung Laih , Hui-Tang Lin , Natural language letter based visual

    cryptography scheme , J. Vis. Commun. Image R. 24 (2013) 318–331.[42] Grishma R. Bhokare, Prof. C. J. Shelke,Prof. C. J. Shelke, Color Extended Visual Cryptography Using Error

    Diffusion With VIP Synchronization, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2, Issue 10, October 2013, Page No. 3066-3069.

    [43] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli, EXTENDING THE VISUAL CRYPTOGRAPHYALGORITHM USING IMAGE WATERMARKING TECHNIQUE, International Journal of Computers &

    Technology, Volume 5, No. 2, May -June, 2013, ISSN 2277-3061.[44] Anuprita U. Mande, Manish N. Tibdewal, Parameter Evaluation and Review of Various Error-Diffusion Half

    toning algorithms used in Color Visual Cryptography,International Journal of Engineering and InnovativeTechnology (IJEIT) Volume 2, Issue 8, February 2013, ISSN: 2277-3754.

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    12/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    Volume 5, Issue 2, February 2016 Page 111 

    [45] AnupritaMande, Manish Tibdewal, A Fast Encryption Algorithm for Color Extended VisualCryptography,International Journal of Emerging Technology and Advanced Engineering ,Website:www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013).

    [46] Sathiya K, Senthamilarasi K , Janani G, Akila victor, Comparison of Visual Cryptographic Algorithms for QualityImages Using XOR , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

    ,Volume 2, Issue 2, March – April 2013 ISSN 2278-6856.[47] Dr.V.R.Anitha, M.Tech, Ph.d, DilipkumarKotthapalli , Extending the Visual Cryptography Algorithm WithoutRemoving Cover Images ,International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4-April 2013.

    [48] SonalWange,A Visual Cryptography to Secure Biometric Database: A Review, International Journal of AdvancedResearch in Computer Science and Software Engineering , Volume 3, Issue 11, November 2013, ISSN: 2277128X.

    [49] ShyongJianShyu, Visual Cryptograms of Random Grids for General Access Structures , IEEE TRANSACTIONSON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 3, MARCH 2013.

    [50] Kai-Hui Lee and Pei-Ling Chiu, Image Size Invariant Visual Cryptographyfor General Access Structures Subjectto Display Quality Constraints, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 10,OCTOBER 2013.

    [51] ShyongJianShyu and Hung - WeiJiang, General Constructions for Threshold Multiple – Secret VisualCryptographic Schemes, IEEE TRANSACTION FORMATION FORENSICS AND SECURITY,VOL.8,NO.5 ,MAY 2013.

    [52] Thottempudi Kiran1 and K. Rajani Devi , A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES, Journal ofGlobal Research in Computer Science,Volume 3, No. 6, June 2012,ISSN-2229-371X.

    [53] JaishriChourasia, M. B. Potdar, Abdul Jhummarwala, KeyurParmar, Halftone Image Watermarking based onVisual Cryptography, International Journal of Computer Applications (0975 – 8887) Volume 41– No.20, March2012.

    [54] PankajaPatil, BharatiPannyagol, VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSIONAND PIXEL SYNCHRONIZATION, International Journal of Latest Trends in Engineering and Technology(IJLTET), Vol. 1, Issue 2, July 2012, ISSN: 2278-621X.

    [55] Anshul Sharma1, PERFORMANCE OF ERROR FILTERS IN HALFTONE VISUAL CRYPTOGRAPHY,International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012.

    [56] VIKAS SINDHU,A REVIEW ON IMAGE HALFTONE PROCESSING, JOURNAL OF INFORMATION,KNOWLEDGE AND RESEARCH IN ELECTRONICS AND COMMUNICATION, ISSN: 0975 – 6779| NOV 12TO OCT 13 | VOLUME – 02, ISSUE – 02.

    [57] Anantha Kumar Kondra, Smt. U. V. RatnaKumari, An Improved (8, 8) Colour Visual Cryptography SchemeUsing Floyd Error Diffusion , International Journal of Engineering Research and Applications (IJERA) ISSN:2248-9622 Vol. 2, Issue 5, September- October 2012, pp.1090-1096.

    [58] Manimurugan.S, Ramajayam.N, Visual Cryptography Based On Modified RLE Compression without PixelExpansion,International Journal of Engineering and Innovative Technology (IJEIT) ,Volume 2, Issue 3, September2012, ISSN: 2277-3754.

    [59] Anshul Sharma, Sunil Agrawal, Performance of Error Filters on Shares in Halftone Visual Cryptography via ErrorDiffusion, International Journal of Computer Applications (0975 – 8887) Volume 45– No.12, May 2012.

    [60] Che-Wei Lee, and Wen-Hsiang Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document

    Images via the Use of the PNG Image With a Data Repair Capability, IEEE TRANSACTIONS ON IMAGEPROCESSING, VOL.21, NO.1, JANUARY 2012.[61] Kai - Hui Lee and Pei - Ling Chiu, An Extended Visual Cryptography Algorithm for General Access Structures,

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY , VOL.7, NO.1, FEBRUARY2012.

    [62] Ching-Nung Yang, Hsiang-Wen Shih, Chih-Cheng Wu, and LeinHarn, K Out of n Region Incrementing Schemein Visual Cryptography, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,VOL. 22, NO. 5, MAY 2012.

    [63] Amir Kolaman and OrlyYadid-Pecht, Quaternion Structural Similarity: A New Quality Index for Color Images,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.

    [64] Velmurugan.N, Vijayaraj.A, Visual Pixel Expansion of Secret Image, Global Journal of Computer Science andTechnology,Volume 11, Issue 20 ,Version 1.0 December 2011.

    [65] N Krishna Prakash,and S Govindaraju ,Visual Cryptography Scheme for Color Images Using Half Toning Via

    Direct Binary Search with Adaptive Search and Swap, International Journal of Computer and ElectricalEngineering, Vol. 3, No. 6, December 2011.

  • 8/19/2019 A SURVEY ON VISUAL CRYPTOGRAPHY TECHNIQUES

    13/13

    International Journal of Application or Innovation in Engineering& Management (IJAIEM)Web Site: www.ijaiem.org Email: [email protected]

    Volume 5, Issue 2, February 2016 ISSN 2319 - 4847 

    V l 5 I 2 F b 2016 112

    [66] MorampudiNareshkumar, DatrikaSrinivasRao,Sravanthi, A Novel Approach for Cheating Prevention throughVisual Cryptographic Analysis, International Journal of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011.

    [67] Shiny Malar F.R, Jeya Kumar M.K, Error Filtering Schemes for Color Images in Visual Cryptography,International Journal of Advanced Computer Science and Applications,Vol. 2, No. 11, 2011.

    [68] InKoo Kang, Gonzalo R. Arce, and Heung-Kyu Lee, Color Extended Visual Cryptography Using Error Diffusion,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011.[69] Tzung-Her Chen and Kai-Hsiang Tsao, User-Friendly Random-Grid-Based Visual Secret Sharing, IEEE

    TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 11, NOVEMBER 2011.

    [70] Ran-Zan Wang and Shuo-Fang Hsu, Tagged Visual Cryptography, IEEE SIGNAL PROCESSING LETTERS,VOL. 18, NO.11, NOVEMBER 2011.

    [71] ShyamalenduKandar, ArnabMaiti, Bibhas Chandra Dhara ,Visual Cryptography Scheme for Color Image UsingRandom Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer ScienceIssues, Vol. 8, Issue 3, No. 1, May 2011.

    [72] RiteshD.Yelane, Dr.Nitiket. N. Mhala, Prof. B. J. ,”Chilke,Security Approach by Using Visual CryptographicTechnique “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume5, Issue 1, January 2015.

    AUTHORS

    M.Sivakumaris currently pursuing Bachelor of Engineering in Computer Science&Engineering from SriRamakrishna Engineering College, Coimbatore.His interests include Cryptography&Network Security,WebDevelopment.

    A.Shilpais currently pursuing Bachelor of Engineering in Computer Science&Engineering from SriRamakrishna Engineering College, Coimbatore. Her interests include Cryptography&Network Security,DBMS.

    J.R.Vijayalakshmiis currently pursuing Bachelor of Engineeringin Computer Science&Engineering fromSri Ramakrishna Engineering College, Coimbatore. Her interests include Cryptography&NetworkSecurity,Artificial Intelligence.