A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography

A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography

Ram Chandra Barik, Suvamoy Changder, Sitanshu Sekhar Sahu
Copyright: © 2019 |Pages: 25
DOI: 10.4018/IJRSDA.2019010102
Article PDF Download
Open access articles are freely available for download

Abstract

Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing scheme among N number of participants with pixel expansion. Later on, many researchers extended the visual secret sharing scheme with no expansion of pixel regions in binary and color images. By stacking k shares the secret can be decoded using normal vision. In this paper the authors have proposed a modification towards visual cryptography by converting the message in the form of printable ASCII character-based numerical encoding patterns in a binary host image. The encoding of the message is represented as ASCII numeric and a texture of those numeric are arranged to form a binary host image. Then, N numbers of shares are built up but after stacking all the shares the decoding of the message is achieved by converting ASCII numeric to the secret.
Article Preview
Top

Introduction

Demand of information exchange in heavy data traffic is increasing day by day with the influence of digital media over internet. Information security in modern era is a major concern for many mathematicians, computer scientists. For abstracting the secret from malicious access, third party attack there are many algorithms and mathematics was being proposed in last three decade. Usage of Mathematics makes many cryptographic algorithms robust. Today’s world is roaming behind the information operated in electronic media and internet technology starting from banking sector (both offline and online banking) to multimedia industry. As advancement of electronic media, digital communication makes the world is in finger press at the same time misuse of information is a big threat to modern world. Cryptography makes the secret information into an unreadable format and plays a vital role in presence of third parties or eavesdropper for secure communication. In the last three decades, popular cryptographic algorithms RSA, AES, DES, Blowfish, Secret Sharing etc. using private key and public key concepts provides security to text-based information. Day by day evolution of digital multimedia information system demands to build new cryptographic algorithm to cope with current technological arena. Steganography, Visual Cryptography, QR Code are emerging areas of security over modern multimedia technology. Visual Cryptography combines secret sharing scheme proposed by (Shamir 1979) with visual transparencies into n number of shares. The concept of visual cryptography is combined with visual secret sharing, threshold secret sharing scheme to produce a robust encryption and decryption method which has the broad areas of application. To divide secret data into shares which generate random shares of (k-1) polynomial degree using modulus based arithmetic where (kn). f(x) can be derived in equation (1) as

IJRSDA.2019010102.m01
(1)

Secret data is IJRSDA.2019010102.m02, IJRSDA.2019010102.m03 is the prime number IJRSDA.2019010102.m04 andIJRSDA.2019010102.m05. From the integer values of uniformly distributed [1; p) the coefficients IJRSDA.2019010102.m06 are chosen randomly. Mathematically Lagrange's interpolation is used in secret sharing scheme which is represented in equation (2), (3) and (4) using Lagrange's interpolation IJRSDA.2019010102.m07, I = 1, 2…n.

IJRSDA.2019010102.m08
(2)
IJRSDA.2019010102.m09
(3)
IJRSDA.2019010102.m10
(4)
Figure 1.

Shows the (2, n) secret sharing scheme

IJRSDA.2019010102.f01

Visual Cryptography gives a new dimension to information security arena using secret sharing scheme among a set of trusted participants. Beauty of this security concept is that unlike other highly computational with bigger complexity method such as RSA, AES, DES the decoding of the corresponding secret can be achieve using normal human perception without performing the computation at receivers end. Visual Cryptography has versatile application areas starting from banking sector to other security area.

Complete Article List

Search this Journal:
Reset
Volume 9: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 8: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 7: 4 Issues (2021): 1 Released, 3 Forthcoming
Volume 6: 3 Issues (2019)
Volume 5: 4 Issues (2018)
Volume 4: 4 Issues (2017)
Volume 3: 4 Issues (2016)
Volume 2: 2 Issues (2015)
Volume 1: 2 Issues (2014)
View Complete Journal Contents Listing