Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30124
Threshold Based Region Incrementing Secret Sharing Scheme for Color Images

Authors: P. Mohamed Fathimal, P. Arockia Jansi Rani

Abstract:

In this era of online communication, which transacts data in 0s and 1s, confidentiality is a priced commodity. Ensuring safe transmission of encrypted data and their uncorrupted recovery is a matter of prime concern. Among the several techniques for secure sharing of images, this paper proposes a k out of n region incrementing image sharing scheme for color images. The highlight of this scheme is the use of simple Boolean and arithmetic operations for generating shares and the Lagrange interpolation polynomial for authenticating shares. Additionally, this scheme addresses problems faced by existing algorithms such as color reversal and pixel expansion. This paper regenerates the original secret image whereas the existing systems regenerates only the half toned secret image.

Keywords: Threshold Secret Sharing Scheme, Access Control, Steganography, Authentication, Secret Image Sharing, XOR, Pixel Expansion.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1112327

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 747

References:


[1] N. Noar, A. Shamir, 1995. “Visual Cryptography”, Advances in Cryptology: Eurocrypt' 94, Vol. 48, Springer, Berlin, 1995, Pp.1–12.
[2] A. Shamir, 1979. How to Share a Secret. Commun. Acm 22 (11), 612–613.
[3] G. R. Blakley, 1979. “Safeguarding Cryptographic Keys”. In: Proc. Fips National Comput. Conf. 48, 313–317.
[4] Ran-Zang Wang. "Region Incrementing Visual Cryptography." IEEE Signal Processing Letters (2009): 659-662.
[5] Yang, Ching-Nung, Hsiang -Wen Shih and Yu-Ying Chu and Lein Harn. "New Region Incrementing Visual Cryptographic Scheme."
[6] Ching-Nung Yang, Hsiang -Wen Shih, Chih-Cheng Wu and Lein Harn. "k out of n Region Incrementing Scheme in Visual Cryptography." IEEE Transactions on Circuits and Systems for Video Technology (2012): 799-810.
[7] P. Mohamed Fathimal, P. Arockia Jansi Rani, “K out of N Secret Sharing Scheme for Gray and Color Images”, IEEE International Conference on Electrical, Computer and Communication Technologies, March 2015.
[8] P. Mohamed Fathimal, P. Arockia Jansi Rani, “Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography”, International Journal of Science, Engineering and Technology Research, 2014.
[9] P. Mohamed Fathimal, P. Arockia Jansi Rani, “(N, N) Secret Color Image Sharing Scheme with Dynamic Group”, International Journal of Computer Network and Information Security, June, 2015.
[10] P. Mohamed Fathimal, P. Arockia Jansi Rani, “Design of Block based Visual Secret sharing scheme for color Images”, International Journal of Applied Engineering Research, May 2015.
[11] Mohamed Fathimal P., P. Arockia Jansi Rani, “K out of N Secret Sharing Scheme with Steganography and Authentication”, Advances in Intelligent Systems and Computing, Springer 2015.
[12] Mohamed Fathimal P, P. Arockia Jansi Rani, “K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication”, International Journal of Imaging and Graphics (Accepted), (2015).