Multi Reduce Permuted Share Visual Cryptography Technique

Visual Cryptography is an exceptional encryption technique to conceal information in images in such a way that it can be decrypted by the human visualization if the correct key image is utilized. Visual cryptography (VC) is a way of protecting the secret image which encodes the image into various shares and distributes them to various members. In k out of n (k, n) method, the secret image is allocated into n shares such that when k or more members by assembling their limpidity through an overhead projector to divulges the secret image. This work proposes a novel, simple and hard to decode (k, n) visual cryptography procedure which is used to successfully sharing the secret image with extreme concealment. We have used permutation for n share, so that it becomes impossible for an outsider or attacker to decrypt the message encoded in an image. Index Terms – Visual Cryptography, Share, Permutation, Encryption, Decryption.

[1]  P. Vasanthi Kumari,et al.  Compression of Quasi-Group Encrypted Grayscale Images , 2012 .

[2]  Rohini Sharma,et al.  Region Based Energy Balanced Inter-cluster communication Protocol for Sensor networks , 2015, ArXiv.

[3]  D. K. Lobiyal,et al.  Dual Transmission Power and Ant Colony Optimization based Lifespan Maximization Protocol for Sensor Networks , 2015, Int. J. Bus. Data Commun. Netw..

[4]  Anupkumar M Bongale,et al.  Image Encryption based on FEAL Algorithm , 2013 .

[5]  Kirti Bhatia,et al.  Nodes Deployment Strategies for Sensor Networks: An Investigation , 2016 .

[6]  Somdip Dey SD-EI: A cryptographic technique to encrypt images , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[7]  Somaya Al-Máadeed,et al.  A New Chaos-Based Image-Encryption and Compression Algorithm , 2012, J. Electr. Comput. Eng..

[8]  D. K. Lobiyal,et al.  Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN , 2016, Informatics.

[9]  Varsha Bhatt,et al.  IMPLEMENTATION OF NEW ADVANCE IMAGE ENCRYPTION ALGORITHM TO ENHANCE SECURITY OF MULTIMEDIA COMPONENT , 2012 .

[10]  Kirti Bhatia,et al.  IIEPDR: Improved Information and Energy Proficient Data Relaying Routing Protocol for Wireless Body Area Networks , 2017 .

[11]  D. K. Lobiyal,et al.  Energy based proficiency analysis of ad-hoc routing protocols in wireless sensor networks , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[12]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[13]  H. Mangalam,et al.  Wavelet-based Image Compression of Quasi Encrypted Grayscale Images , 2012 .

[14]  Kirti Bhatia,et al.  Swarm Intelligence Inspired Energy Efficient Routing Protocols for Sensor Networks: An Investigation , 2016 .

[15]  Rohini Sharma,et al.  Energy Holes Avoiding Techniques in Sensor Networks: A survey , 2015 .

[16]  Kirti Bhatia,et al.  A Study on Functioning of Selenium Automation Testing Structure , 2017 .

[17]  Kirti Bhatia,et al.  ETM: A survey on Energy, Thermal and Mobility Efficient Routing Protocols for Wireless Body Area Sensor Network , 2017 .

[18]  D. K. Lobiyal,et al.  Intelligent Water Drop Based Coverage-Connectivity and Lifespan Maximization Protocol for Wireless Sensor Networks , 2019, Recent Patents on Engineering.

[19]  D. K. Lobiyal,et al.  Proficiency Analysis of AODV, DSR and TORA Ad-hoc Routing Protocols for Energy Holes Problem in Wireless Sensor Networks☆ , 2015 .