Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach

Progressive Visual Cryptography PVC is quite suitable for sharing sensitive digital data.Previous research on PVC, such as Fang et al. 2006 and W.P.Fang et al.2008 were all carrying pixel-expansion problem and also gives a poor visual quality on the recovered stacked image. Recently, Hou&Quan 2011 have developed a progressive scheme for secret sharing. It is observed that shares generated by the scheme are free from pixel expansion problem, but shares are not fully secure. In this paper, a new progressive sharing algorithm based on logistic chaotic map has been proposed to overcome the said limitation of Hou 2011 scheme. The irregular outputs of the logistic map are used to encode a secret digital information carrying image. The performance of the algorithm in the scheme of Hou 2011 is critically analyzed and compared with new suggested scheme. Empirical results are presented to showcase the performance of the authors' proposed scheme in terms of its effectiveness imperceptibility and security and feasibility.

[1]  Nilanjan Dey,et al.  Digital Analysis of Microscopic Images in Medicine , 2015 .

[2]  S. S. Chaudhuri,et al.  Detection and measurement of arc of lumen calcification from intravascular ultrasound using Harris Corner detection , 2012, 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS.

[3]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[4]  Nilanjan Dey,et al.  Firefly Algorithm for Optimization of Scaling Factors During Embedding of Manifold Medical Information: An Application in Ophthalmology Imaging , 2014 .

[5]  Filippo Molinari,et al.  Shape‐Based Approach for Coronary Calcium Lesion Volume Measurement on Intravascular Ultrasound Imaging and Its Association With Carotid Intima‐Media Thickness , 2015, Journal of ultrasound in medicine : official journal of the American Institute of Ultrasound in Medicine.

[6]  Masatsugu Tsuji,et al.  Impact of ICT on Innovation , 2020, Disruptive Technology.

[7]  Feng Liu,et al.  Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..

[8]  Nilanjan Dey,et al.  Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search , 2013, Int. J. Bio Inspired Comput..

[9]  Young-Chang Hou,et al.  Progressive Visual Cryptography With Unexpanded Shares , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Alfredo De Santis,et al.  On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..

[11]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[12]  Ralph R. Martin,et al.  Structure Aware Visual Cryptography , 2014, Comput. Graph. Forum.

[13]  Gwoboa Horng,et al.  A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..

[14]  Nilanjan Dey,et al.  Embedding of Blink Frequency in Electrooculography Signal using Difference Expansion based Reversible Watermarking Technique , 2013, ArXiv.

[15]  Minvydas Ragulskis,et al.  Dynamic visual cryptography for optical assessment of chaotic oscillations , 2014 .

[16]  Wen-Guey Tzeng,et al.  A New Approach for Visual Cryptography , 2002, Des. Codes Cryptogr..

[17]  Feng Liu,et al.  K out of K Extended Visual Cryptography Scheme by Random Grids , 2014, Signal Process..

[18]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[19]  Alan C. Bovik,et al.  Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.

[20]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[21]  Gwoboa Horng,et al.  Comment on “Cheating Prevention in Visual Cryptography” , 2012, IEEE Transactions on Image Processing.

[22]  Nilanjan Dey,et al.  Wavelet Based Normal and Abnormal Heart Sound Identification using Spectrogram Analysis , 2012, ArXiv.

[23]  Nilanjan Dey,et al.  Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..

[24]  Jasjit S. Suri,et al.  Effect of Geometric-Based Coronary Calcium Volume as a Feature Along with its Shape-Based Attributes for Cardiological Risk Prediction from Low Contrast Intravascular Ultrasound , 2014 .

[25]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[26]  Gwoboa Horng,et al.  A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography , 2012, J. Vis. Commun. Image Represent..

[27]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[28]  Balasubramanian Raman,et al.  A blind watermarking algorithm based on fractional Fourier transform and visual cryptography , 2012, Signal Process..

[29]  Kazi Md. Rokibul Alam,et al.  An Exploitation of Visual Cryptography to Ensure Enhanced Security in Several Applications , 2013 .

[30]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[31]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[32]  Shyamalendu Kandar,et al.  Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking , 2011 .

[33]  Feng Liu,et al.  Improving the visual quality of size invariant visual cryptography scheme , 2012, J. Vis. Commun. Image Represent..

[34]  Pei-Ling Chiu,et al.  Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.