RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

Many shares are generated from the secret images that are illogical containing certain message within them in visual cryptography. When all shares are piled jointly, they tend to expose the secret of the image. The multiple shares are used to transfer the secret image by using the encryption and decryption process by means of the elliptic curve cryptography (ECC) technique. In ECC method, the public key is randomly generated in the encryption process and decryption process, the private key (H) is generated by utilizing the optimization technique and for evaluating the performance of the optimization by using the peak signal to noise ratio (PSNR). From the test results, the PSNR has been exposed to be 65.73057, also the mean square error (MSE) value is 0.017367 and the correlation coefficient (CC) is 1 for the decrypted image without any distortion of the original image and the optimal PSNR value is attained using the cuckoo search (CS) algorithm when compared with the existing works.

[1]  Feng Liu,et al.  Optimal XOR Based (2, n)-Visual Cryptography Schemes , 2014, IWDW.

[2]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[3]  Woei-Jiunn Tsaur,et al.  Several security schemes constructed using ECC-based self-certified public key cryptosystems , 2005, Appl. Math. Comput..

[4]  Subhash C. Kak,et al.  A Recursive Threshold Visual Cryptography Scheme , 2008, IACR Cryptol. ePrint Arch..

[5]  Neeraj Shukla,et al.  Visual Cryptography Schemes using Compressed Random Shares , 2013 .

[6]  Padma Bh,et al.  Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .

[7]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[8]  P. Subba Rao,et al.  Visual Cryptography Schemes for Secret Image , 2012 .

[9]  Hao-Kuan Tso,et al.  Friendly Medical Image Sharing Scheme , 2014, J. Inf. Hiding Multim. Signal Process..

[10]  R. R. Sedamkar,et al.  Modified Visual Cryptography Scheme for Colored Secret Image Sharing , 2013 .

[11]  S. Kak,et al.  On decimal sequences (Corresp.) , 1981 .

[12]  Suyash Agrawal,et al.  Using Genetic Algorithm for Symmetric key Generation in Image Encryption , 2012 .

[13]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[14]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[15]  Ching-Nung Yang,et al.  New Colored Visual Secret Sharing Schemes , 2000, Des. Codes Cryptogr..