Extending the Visual Cryptography Algorithm Without Removing Cover Images
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2013 by IJETT Journal|
|Year of Publication : 2013|
|Authors : Dr.V.R.Anitha , Dilip kumar Kotthapalli|
Dr.V.R.Anitha , Dilip kumar Kotthapalli . "Extending the Visual Cryptography Algorithm Without Removing Cover Images ". International Journal of Engineering Trends and Technology (IJETT). V4(4):1288-1291 Apr 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.
Visual cryptography is a simple and powerful method which can provide high security for confidential information. This technique generate noise - like random pixels on share imag es to hide secret information which on overlay decrypt the information this technique is known as conventional visual secret sharing schemes. It suffers a management problem, because of which dealers cannot visually identify each share. This problem is sol ved by the extended visual cryptography scheme (EVCS), which adds a meaningful cover image in each share. But while removing the extra cover image it produces extra noise or degrades the hidden image quality. Hence we are Extending the visual cryptography algorithm without removing cover images where it reduces pixel expan sion problem and shares match duration
 M . Naor and A. Shamir, “Visual cryptography,” in Proc. Advances in Cryptology (Eurprocrypt’94) , 1994, pp. 1 – 12.
 E.R.Verheul and H. C. A. v. Tilborg, “Constructions and properties of k - out - of - n visual secret sharing schemes,” Designs Codes Crypto. , vol. 1 1, pp. 179 – 196, 1997.
 H. Koga, “A general formula of the (t,n) - threshold visual secret sharing scheme,” in Proc. Advances in Cryptology (Asiacrypt) , 2002, pp. 328 – 345.
 Gamil R.S. Qaid and Sanjay N. Talbar,’’Encryption and Decryption of Digital Im age Using Color signal ” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2, March 2012
 C. Blundo, S. Cimato, and A. D. Santis, “Visual cryptography schemes with optimal pixel expansion,” Theor. Comput. Sci. , vol. 369, pp.169 – 182, 2006.
 D. Wang, L. Zhang, N. Ma, and X. Li, “Two secret sharing schemes based on boolean operations,” Pattern Recognit. , vol. 40, pp. 2776 – 2785, 2007.
 G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general acc ess structures,” Inform. Comput. , vol. 129, pp. 86 – 106, 1996.
 C. S. Hsu, S. F. Tu, and Y. C. Hou, “An optimization model for visual cryptography schemes with unexpanded shares,” Found. Intelligent Syst., LNAI , vol. 4203, pp. 58 – 67, 2006.
 G. Atenies e, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theor. Comput. Sci. , vol. 250, pp. 143 – 161, 2001
Extended visual cryptography (EVC), pixel expansion problem, shares synchronization, general access structure