Open Access   Article Go Back

DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption

S. Ponnarasi1 , T. Rajendran2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 23-27, Dec-2018

Online published on Dec 31, 2018

Copyright © S. Ponnarasi, T. Rajendran . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Ponnarasi, T. Rajendran, “DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.23-27, 2018.

MLA Style Citation: S. Ponnarasi, T. Rajendran "DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption." International Journal of Computer Sciences and Engineering 06.11 (2018): 23-27.

APA Style Citation: S. Ponnarasi, T. Rajendran, (2018). DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption. International Journal of Computer Sciences and Engineering, 06(11), 23-27.

BibTex Style Citation:
@article{Ponnarasi_2018,
author = {S. Ponnarasi, T. Rajendran},
title = {DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {23-27},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=534},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=534
TI - DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption
T2 - International Journal of Computer Sciences and Engineering
AU - S. Ponnarasi, T. Rajendran
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 23-27
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such some way that the decipherment will be performed by human, with none decipherment algorithmic rule. Here we have a tendency to propose a knowledge activity in halftone pictures victimisation conjugate ordered video digitizing (DHCOD) algorithmic rule that could be a changed version of information activity in halftone pictures victimisation conjugate error diffusion technique (DHCED). We have a tendency to use this DHOCD algorithmic rule for proposing a brand new 3 part visual cryptography theme. DHCOD technique is employed to cover Associate in Nursing binary visual pattern in 2 or additional ordered dither halftone pictures, which may be from identical or completely different multi-tone pictures. In projected theme we have a tendency to shall generate the shares victimisation basic visual cryptography model so imbed them into a canopy image employing a DHCOD technique, so the shares are going to be safer and pregnant.

Key-Words / Index Term

Secret shares, Halftone pictures, Visual cryptography, VCS, Watermarking, DHCED and DHCOD

References

[1] M.Naor and A. Shamir “Visual cryptography”. Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12, 1995.
[2] Ming Sun Fu and Oscar C. Au “Data hiding in halftone images by conjugate error diffusion” D-7803-7761-3/03 © 2003 IEEE.
[3] Ming Sun Fu and Oscar C. Au “Joint Visual cryptography and watermarking”. 0-7803-8603-5/04 © 2004 IEEE.
[4] Zhongmin Wang and Gonzalo R. Arce “Halftone visual cryptography through error diffusion” ISBN 1-4244-0481- 9/06 © 2006 IEEE, pp.109-112.
[5] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo “Halftone Visual Cryptography” 0-7803-7750-8/03 © 2003 IEEE,
[6] Notes “Digital Image Processing Laboratory: Image Halftoning” April 30, 2006. Purdue University.
[7] Lingo Fang and Bin Yu “Research on pixel expansion of (2,n) Visual threshold scheme” 2006 1st International Symposium on Pervasive Computing and Applications.
[8] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106.
[9] V. S. Miller, Uses of Elliptic Curve in Cryptography, ser. Lectures notes on Computer Sciences. New York, USA: Springer-Verlag, 1986, vol. 218, ch. Advances in Cryptography- Proceedings of Crypto85, pp. 417– 426.
[10] P. C. v. O. Alfred J. Menezes and S. A. Vanstone, Handbook of Applied Cryptography, 1st ed. CRC Press, 1996.
[11] D. R. Stinson, Cryptography: Theory and Practice, 2nd ed. CRC Press, 2002.