Visual Cryptography for Image Processing: A Survey

Abstract

The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in order to get the secret image. Or the qualified set of participants alone can get the secret image. This new system has two phases. In the initial phase, the secret image as an input generates or creates some meaningless shares (4 shares) based on an algorithm called GAS algorithm. In next phase, the cover images are added in each share. They are added using an algorithm called stamping algorithm and distributes the embedded pictures or images to the participants. In receiver end, the embedded images are processed to receive the covering images from the shares generated and by overlapping those shares, the secret images are retrieved. These shares are arranged in correct order. In proposed system the security problem and the pixel expansion problems are reduced. It also helps to increase in the number of shares. Finally the obtained secret image can be viewed in a high resolution. Soundarya B A | Sowmeya D | Yazhini G V"Visual Cryptography for Image Processing: A Survey" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd8206.pdf http://www.ijtsrd.com/engineering/information-technology/8206/visual-cryptography-for-image-processing-a-survey/soundarya-b-a

Authors and Affiliations

Keywords

Related Articles

The Art and Science of Entrepreneurial Leadership in Manufacturing Industries - A Case Study of Selected Manufacturing Units in Industrial Estate, Vijayawada

The main objective of the empirical research is to identify and study, the styles of leadership in the manufacturing industrial sector in Industrial Estate, Vijayawada. The data was collected through case study method. O...

LSB Based Image Steganography for Information Security System

Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hid...

Text Extraction from Image using Python

With so much of our lives computerized, it is vitally important that machines and humans can understand one another and pass information back and forth. Mostly computers have things their way we have to & talk to them th...

A Review of Self Perceptions on Life Goals Achievements Implications on Self Development

The claim that positive self perceptions or self beliefs are key elements of a positive and healthy personality has put them firmly on the political agenda. The idea that positive selfesteem, in particular, immunises peo...

Modeling and Simulation of Grid Connected PV System

In today’s scenario, renewable energy based applications are increasing due to the global warming issue and increase in the prices of fossil fuels. Renewable energy sources RES like sun, biomass, air, water etc. are envi...

Download PDF file
  • EP ID EP358914
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

(2017). Visual Cryptography for Image Processing: A Survey. International Journal of Trend in Scientific Research and Development, 2(1), -. https://europub.co.uk/articles/-A-358914