A new k out of n secret image sharing scheme in visual cryptography

Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead projector to reveals the secret image. This paper proposed a brand new of simple and robust (k, n) visual cryptography technique which is used to effectively sharing the secret image with utmost confidentiality. In share creation process, specified new condition for random matrices and then XOR operations are performed to generate the `n' transparencies. It is possible to decode the secret image visually by superimposing a k subset of transparencies. Nevertheless no secret data can be acquired from the superposition of an illegal subset. Experiments, statistical and security assessments are carried out on the shares to validate the strength of the proposed scheme by means of a sequence of investigations such as visual testing, encryption quality testing, security analysis and different attacks. The proposed (k, n) VC scheme offers a consistent protection for communicating images over the public channels.

[1]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[2]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[3]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[4]  Abhijit Mustafi,et al.  BOOLEAN XOR BASED (K,N) THRESHOLD VISUAL CRYPTOGRAPHY FOR GRAYSCALE IMAGES , 2013 .

[5]  Ching-Nung Yang,et al.  Aspect ratio invariant visual cryptography by image filtering and resizing , 2012, Personal and Ubiquitous Computing.

[6]  Musheer Ahmad,et al.  Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion , 2014, ArXiv.

[7]  Chin-Chen Chang,et al.  Sharing a verifiable secret image using two shadows , 2009, Pattern Recognit..

[8]  Jyoti Rao,et al.  Extended Visual Cryptography for Color Shares using Random Number Generators , 2012 .

[9]  Debasree Sarkar,et al.  Secret Image Sharing Scheme Based on a Boolean Operation , 2014 .

[10]  Hao Luo,et al.  Color transfer in visual cryptography , 2014 .

[11]  Wei Sun,et al.  Non-expansible XOR-based visual cryptography scheme with meaningful shares , 2015, Signal Process..

[12]  Mohammad Eshghi,et al.  Image encryption based on gyrator transform using chaotic maps , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.

[13]  Saurabh Dutta,et al.  An Approach of Visual Cryptography Scheme by Cumulative Image Encryption Technique Using Image-key Encryption, Bit-Sieved Operation and K-N Secret Sharing Scheme , 2013 .

[14]  Wei Sun,et al.  Improved tagged visual cryptography by random grids , 2014, Signal Process..

[15]  Neeraj Shukla,et al.  Visual Cryptography Schemes using Compressed Random Shares , 2013 .

[16]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[17]  Gwoboa Horng,et al.  A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..