A Novel Pixel Shuffling And Amalgamation Scheme For Visual Secret Sharing In Cloud Environment
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2021 by IJETT Journal|
|Year of Publication : 2021|
|Authors : P.Anusha, Dr.R.Maruthi, Dr.L.Rama Parvathy
|DOI : 10.14445/22315381/IJETT-V69I4P207|
MLA Style: P.Anusha, Dr.R.Maruthi, Dr.L.Rama Parvathy "A Novel Pixel Shuffling And Amalgamation Scheme For Visual Secret Sharing In Cloud Environment" International Journal of Engineering Trends and Technology 69.4(2021):44-48.
APA Style:P.Anusha, Dr.R.Maruthi, Dr.L.Rama Parvathy. A Novel Pixel Shuffling And Amalgamation Scheme For Visual Secret Sharing In Cloud Environment International Journal of Engineering Trends and Technology, 69(4),44-48.
Nowadays, centralized storage has to be implemented in each and every organization to make their data available from anywhere through a cloud environment. The accessibility of data can be varied for public and private clouds. The main reason behind the centralization is the legitimate users can able to make utilization of data stored. Here the visual images can also be stored and shared with the members and non-members of the cloud environment. It is to make secure storage and transmission of image data with the visual secret sharing techniques. However, the existing techniques provide more security over the data sharing through the VSS techniques, sometimes it is vulnerable to threats and attacks, and the main reason is the need to make this transmission without degrading the quality of visual images. Here a novel pixel shuffling and amalgamation scheme has been developed and utilized for visual secret sharing with meaningful shares in the cloud environment. It can able to make secret visual images with high throughput and highly secure with the protection of threats while sharing with cloud members. The experimental results show that the novel algorithm can give high performance and accuracy with the security mechanisms.
 Bincy Jolly and Senthilnathan. T., An Efficient E2C2 Visual Cryptographic Technique to Secure Medical Images in Cloud Environment, Intl. Journal of Innovative Technology and Exploring Engineering, 9(2) (2019) 4709-4714.
 C Chen Chang, B Li, and J Sang Lee., Secret Sharing using Visual Cryptography, Journal of Electronic Science and Technology, 8(4) (2010) 289-299.
 Dutta, R., & Annappa, B., Privacy and trust in cloud database using threshold-based secret sharing, International Conference on Advances in Computing, Communications and Informatics (ICACCI), India, (2013).
 Jin, X., Wu, Y., Li, X., Li, Y., Zhao, G., & Guo, K., PPViBe: Privacy-preserving background extractor via secret sharing in multiple cloud servers, 8th International Conference on Wireless Communications & Signal Processing (WCSP), China, (2016).
 Kester, Q.-A., Nana, L., & Pascu, A. C., A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Shuffling, 2013 European Modelling Symposium, UK,(2014)
 Kukreja, S., SinghKasana, S., & Kasana, G., Random Grid-Based Extended Visual Secret Sharing Scheme for Image Authentication, 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), India, January (2018).
 Liu, S., Fujiyoshi, M., & Kiya, H., A cheat was preventing method with efficient pixel expansion for Naor-Shamir’s visual cryptography, IEEE International Conference on Image Processing (ICIP), France, (2015).
 Mamta, Khare, M. D., & Yadav, C. S., Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review, International Conference on Innovations in Control, Communication and Information Systems (ICICCI), India, March (2019).
 Nadlamani, G. F., & Shaikh, S., Preserving privacy using TPA for cloud storage based on regenerating code, International Conference on Recent Trends in Information Technology (ICRTIT), India, September (2016).
 P. Li, Z. Liu, and C.-N. Yang., A construction method of (t,k,n) essential secret image sharing scheme, Signal Process., Image Communications., 65 (2018) 210–220.
 Reshi, A. A., & Parah, S. A., Performance Evaluation and Future Scope of Image Secret Sharing Schemes, Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), India, December (2018).
 S Takahashi and K Iwamura., Secret Sharing Scheme Suitable for Cloud Computing, IEEE 27th International Conference on Advanced Information Networking and Applications, (2013) 53-537.
 Shyong Jian Shyu, & Ming Chiang Chen., Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes, IEEE Transactions on Information Forensics and Security, 6(1) (2011) 960–969.
 Shyu, S. J., & Chen, M. C., Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures, IEEE Transactions on Circuits and Systems for Video Technology, 25(9)(2015) 1557–1561.
 Thomas, S. A., & Gharge, S., Review on Various Visual Cryptography Schemes, International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), India, (2018).
 Wu, W.-C., Cheng, K.-C., & Yang, S.-C., Secret digital images over cloud computing using meaningful secret sharing technique, International Conference on Applied System Innovation (ICASI), Japan, (2017).
 X Yan, Y Lu, and L Liu., General Meaningful Shadow Construction in Secret Image Sharing, IEEE Access, 6 (2018) 45246-45255.
 X. Wu, C.-N. Yang, Y. T. Zhuang, and S.-C. Hsu., Improving recovered image quality in secret image sharing by simple modular arithmetic, Signal Process., Image Communications., 66(2018) 42–49.
 Yan, X., Lu, Y., Chen, Y., Lu, C., Zhu, B., & Liao, Q., Secret Image Sharing Based on Error-Correcting Codes, IEEE 3rd International Conference on Big Data Security on Cloud (Big Data Security), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), China, May (2017).
 Zhang, Z., Zhou, F., Qin, S., Jia, Q., & Xu, Z., Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications, IEEE Access, 8(2020) 66828–66838.
Visual Secret Sharing, Public and Private Clouds, Cloud Security