73 research outputs found

    Survey on Securing Medical Image Transmission using Visual Cryptography Techniques

    Get PDF
    Visual cryptography scheme is a cryptographic technique which allows visual information text or image to be encrypted in such a way that the decryption can be performed by the human visual system and without the aid of computers. It encodes the secret image into shares of different patterns. Visual Cryptography is done on black and white image as well as on color image. This paper includes the literature survey regarding Visual Cryptography techniques for secure medical image transmission

    Development of Visual Cryptography Technique for Authentication Using Facial Images

    Get PDF
    Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption. Incurrent technology, most of visual cryptography areembedded a secret using multiple shares. Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares in proper sequence the original secret image revealed

    An Optimization Model for Secure Sharing of Visual Cryptographic Images Generated by Using arbitrary Pixel Stereogram

    Get PDF
    Visual cryptography schemes (VCSs) are the methods to provide data security in network systems by generating random and non meaningful shares of a original image under consideration. There occurs a problem of transmission loss and also the possibility of the intruder attack when the shares are passed within the same network. Previous research have focused on hiding the shares in halftone images but the possible risks they lead to are pixel expansion problems and degradation in the quality of the resultant images. Hence a binocular VCS (BVCS) and an encryption algorithm are proposed to hide the shared pixels in the single image random dot stereogram’s (SIRDSs) along with the different modes of transmission for the generated possible shares. Since the SIRDSs have the same 2D appearance as the conventional shares of a VCS, this paper tries to use SIRDSs as cover images of the shares of VCSs to reduce the transmission risk of the shares. The encryption algorithm used may modify the random dots in SIRDS’s to equalize the quality of the resultant image. This process is done using the construction rule of BVCS. Altering the dots may also have a impact on the pixel quality and hence an optimization model based on the quality requirement is used. Finally the shares are passed to the recipients over varied networks DOI: 10.17762/ijritcc2321-8169.150314

    Visual Pixel Expansion of Secret Image

    Get PDF
    Two common drawbacks of the visual cryptography scheme VCS are the large pixel expansion of each share image and the small contrast of the recovered secret image In this paper we propose a step construction to construct VCSOR and VCSXOR for general access structure by applying 2 2 -VCS recursively where a participant may receive multiple share images The proposed step construction generates VCSOR and VCSXOR which have optimal pixel expansion and contrast for each qualified set in the general access structure in most cases Our scheme applies a technique to simplify the access structure which can reduce the average pixel expansion APE in most cases compared with many of the results in the literature Finally we give some experimental results and comparisons to show the effectiveness of the proposed schem

    IMPLEMENTASI TEKNIK KRIPTOGRAFI VISUAL PADA CITRA KEABUAN DAN BERWARNA UNTUK OTENTIKASI PENGGUNA PADA TRANSAKSI ONLINE

    Get PDF
    Visual cryptography (VC) technique encodes an image into two or more shares that appear random in human eyes. In the decryption section, the pixels in the shared images are combined to obtain the information contained in the original image. This study applies visual cryptographic techniques to graysle and color images for user authentication in online transactions using the VC2,2 scheme. The server computer encodes the CAPTCHA image into two shared images that are sent to the user through different channels or applications. To authenticate himself, the user performs an XOR operation on both share images, identifies the information contained in the CAPTCHA and sends it to the server. In encryption test, histogram of the share image has a different pattern from the original image. The description test shows the decrypted image in this study visually has a better quality than the binary image has better quality than binary images

    A Self Recovery Approach using Halftone Images for Medical Imagery System

    Get PDF
    ABSTRACT Security has become an inseparable issue even in the field of medical applications. Communication in medicine and healthcare is very important. The fast growth of the exchange traffic in medical imagery on the Internet justifies the creation of adapted tools guaranteeing the quality and the confidentiality of the information while respecting the legal and ethical constraints, specific to this field. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the medical images over in the internet. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generates shadows by visual cryptography algorithms. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 -6375(Online) Volume 1 Number 2, Sep -Oct (2010), pp. 133-146 © IAEME, http://www.iaeme.com/ijcet.html , © IAEME 134 An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party (TTP). IJCET © I A E M E International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 -6367(Print), ISSN 0976 -6375(Online) Volume 1, Number 2

    A Review on Image mosaicing for secure Transmission of University Exam Question Paper

    Get PDF
    The rapid spread of the digital world nowadays which is powered by ever faster system demands greater speed and security. Real time to secure an image is a challenging task due to the processing time and computational requirement for RGB image. So, to cope with these concerns, many innovative techniques of image processing for data hiding are required. In this paper new data hiding scheme is proposed which is known as image mosaicing. Image mosaicing is the process of merging split images to produce a single and complete image of the document. For this technique two input images are required one is secret image and second is target image, by merging these two a new image is made called as a mosaic image. So, the creation of mosaic image and lossless recovery of secret input image for question paper security is presented in this paper
    • …
    corecore