1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: jetwi@etpub.com.
2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication. Papers with insufficient content may be rejected as well, make sure your paper is sufficient enough to be published...[Read More]

Efficient Visual Cryptography

Supriya A. Kinger
CSE Department, Chitkara Institute of Engineering and Technology, Rajpura, Punjab, India
AbstractVisual cryptography scheme (VCS) is a secretsharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting research topic after the formal introduction of visual cryptography by Naor and Shamir in 1995. It is a powerful technique which combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares which can be stacked together to approximately recover the original image. Unfortunately, it has not been used much primarily because the decryption process entails a severe degradation in image quality in terms of loss of resolution and contrast. Its usage is also hampered by the lack of proper techniques for handling grayscale and color images. In this paper, I have developed a novel technique which enables visual cryptography of color as well as grayscale images. The physical transparency stacking type of decryption allows for the recovery of the traditional visual cryptography quality image. An enhanced stacking technique allows for the decryption into a halftone quality image. And finally, a computation based decryption scheme makes the perfect recovery of the original image possible. Based on this basic scheme, I have then established a progressive mechanism to share color images at multiple resolutions. I extracted shares from each resolution layer to construct a hierarchical structure; the images of different resolutions can then be restored by stacking the different shared images together. I have implemented our technique and present results.

Index Termssecret sharing, color halftoning, image sharing, multiple resolutions, secret sharing, and visual cryptography  

Cite: Supriya A. Kinger, "Efficient Visual Cryptography," Journal of Emerging Technologies in Web Intelligence, Vol. 2, No. 2, pp. 137-141, May 2010. doi:10.4304/jetwi.2.2.137-141
Copyright © 2013-2020 Journal of Emerging Technologies in Web Intelligence, All Rights Reserved
E-mail: jetwi@etpub.com