Implementation of Random Grid Visual Cryptography for Color Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 106 | Views: 328

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.6 / 10


     

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra


Abstract: Visual Cryptography is a special encryption technique that encrypts the secrect image into n numbers of shares to hide information in images in such a way that it can be decrypted by the human visual system. It is imperceptible to reveal the secret information unless a certain number of shares (K) or more are superimposed. Simple Visual Cryptography is very insecure. Variable length key based Visual Cryptography for color image uses a varible length Symmetric key based Visual Cryptography scheme for color images where a secrect key is used to encrypt the image and division of the encrypted image is done useing Random Number. Unless the secrect key is known, the original image will not be decrypted. Here secrect key ensures the security of images. The proposed method introduces the concept of above scheme. Encryption process encrypts Original Image using variable length Symmetric key, gives encrypted image. Share generation process divides the encrypted images into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.


Keywords: Visual Cryptography VS, Random Numbers, Secret Sharing, Symmetric key


Edition: Volume 4 Issue 5, May 2015


Pages: 2545 - 2549



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Snehal N. Meshram, Sneha U. Bohra, "Implementation of Random Grid Visual Cryptography for Color Images", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 2545-2549, https://www.ijsr.net/getabstract.php?paperid=21051501, DOI: https://www.doi.org/10.21275/21051501

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article
Top