Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Visual Cryptographic Algorithm for Color Images Using Matrix Transpose Technique

Ramesh D. Kodi, M. Balavaishnavi

Abstract


Cryptography is the process of converting the contents from readable format to non-readable format so as to secure the actual contents. Particularly, Visual Cryptography is the process of encrypting images in such a way to decrypt simple by human but not with the aid of any electronic media. For Visual cryptography, numbers of techniques have been proposed before. In this paper, a new Inter Exchange of Pixel Colour Technique (IEPCT) for colour image is proposed. The proposed IEPCT is used colour optimization technique. It has been designed to reduce the number of share images. When using IEPCT, the size of encrypted image is kept same as to the original image. In the proposed model the plain image has internally divided based on RBG channels. Trade-off is done between RBG Channels. Each Channel is considered as M x N matrices. Further the pixels are shuffled using Matrix Transpose Techniques (MTT). Transposed images are fused together to get the encrypted image. The quality of the image is also kept unchanged in this proposed technique.

Keywords


Colour Optimization, IEPCT, Image Shuffling, Information Security, MTT, Visual Cryptography

Full Text:

PDF

References


Sara Tedmomi and Nijad Al-Najdami, “Lossless Image Cryptography Algorithm based on Discrete Cosine Transform”, The international Arab Journal of Information Technology, Vol. 9, No. 5, 2012.

Namrate Joshi and Vishal Sharma, “A Review New Methodology for Visual Cryptography in Color Image Based on Cyclic Shift Pixel Method”, International Journal of Engineering Research and Technology (IJERT), Vol. 1, No. 6, 2012.

Ayan Banerjee and Sreya Banerjee, “A Robust Visual Cryptography Technique for Photographic Grayscale Image using Block Optimization and Blind Invisible WaterMarking”, International Journal of Computer Theroy and Enginnering, Vol. 4, No. 2, 2012.

Lavanya Bandamneni, V. Venkatra Rao, “Color Extended Visual Cryptography Using Error Diffusion for High Visual Quality Shares”, International Journal of Electronics and Computer Science Engineering, Vol. 1, No. 3, pp. 1176-1182, 2012.

S. Bosu Babu and S. S. P. Kumar, “Enhanced Color Visual Cryptography”, JRACST – Engineering Science and Technolgoy: An International Journal (ESTIJ), Vol. 2, No. 5, 2012.

Tripta Deendayal and Ch.Sunitha , “Enhanced Visual Cryptography Using color Error diffusion and Digital Watermarking”, International Journal Computer Technology & Applications, Vol. 3, Issue.1, 261-264, 2012.

N. Madhumidha and S. Chandramathi, “Visual Cryptography for Color Image Using Color Error Diffusion”, Bonfring International Journal of Advances in Image Processing, Vol. 2, Issue 1, Part 2, 2012.

Sesha Pallavi Indrakanti, P. S. Aradhani, “Permutation based Image Encryption Technique”, International Journals of Computer Applications, Vol. 28, No. 8, 2011.

M. Agnihotra Sharma and M. Chinna RaoVisual, “Cryptography Authentication for Data Matrix Codes”, International Journal of Computer Science and Telecommunication, Vol. 2, No. 8, pp. 58-62, 2011.

Shyamalendu Kandar and Bibhas Chandra Dhara, “k-n Secret Sharing Visual Cryptography Scheme on Color Image using Random Sequence”, International Journal of Computer Applications, Vol 25– No.11, 2011.

M. Arun Kumar and K Jhon singh, “Novel Secure Technique Using Visual Cryptography and Advance AES for Images”, International Journal of Knowledge Management and e-learning, Vol. 3, No. 1, pp. 29-34, 2011.

Nagaraj V. Dharwadkar, B. B. Amberker, Sushil Raj Joshi, “Visual Cryptography for Color Image Using Color Error Diffusion”, ICGSI – GVIP Journal, Vol. 10, No. 1, 2010.

Kiran Kumari, Shalini Bhatia, “Multi-Pixel Visual Cryptography for Color Images with Meaningful Shares”, International Journal of Engineering Science and Technology, Vol. 2, No. 6, pp. 2398-2407, 2010.

Musheer Ahmad and M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journals of Computer Science and Engineering, Vol. 2, No. 1, pp. 46-50, 2009.

C. Dongming, Z. zhiliang and Y. Guangming, "An Improved Image Encryption Algorithm Based on Chaos", IEEE International Conference for Young Computer Scientists, pp. 2792-2796, 2008.

Mizuho Nakajima and Yasushi Yamaguchi, “Extended Visual Cryptography”, ICCSI Journal, Vol 2 Issue 2, 2008.

Zhi Zhou, Gonzalo R. Arce, Giovanni Dicrescenzo, “Halftone Visual Cryptography”, IEEE Transaction on Image Processing, Vol. 15, No. 8, 2006.

N. K. Pareek, V. Patidar, K. K. Sud, “Image encryption using chaotic logistic map.” Image and Vision Computing, Vol. 24, No. 9, pp. 926–934, 2006.

Young-Chang Hou, “Visual Cryptography for Color Images”, Pattern Recognition, The Journal of the Pattern Recognition Society, Vol. 36, pp. 1619-1629, 2003.

Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformed Algorithm”, IAENG International Journal of Computer Science, Vol. 35, No. 1, 2003.

Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson. “Extended capabilities for visual cryptography”, Theoretical Computer Science, Vol. 250, No 1-2, pp. 143–161,Jan 6, 2001.

M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptology-Eurocrypt, pp. 1–12, 1994.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.