Visual cryptography is considered to be a vital technique for hiding visual data from intruders. Because of its importance, it finds applications in various sectors such as E-voting system, financial documents and copyright protections etc. A number of methods have been proposed in past for encrypting color images such as color decomposition, contrast manipulation, polynomial method, using the difference in color intensity values in a color image etc. The major flaws with most of the earlier proposed methods is the complexity encountered during the implementation of the methods on a wide scale basis, the problem of random pixilation and insertion of noise in encrypted images. This paper presents a simple and highly resistant algorithm for visual cryptography to be performed on color images. The main advantage of the proposed cryptographic algorithm is the robustness and low computational cost with structure simplicity. The proposed algorithm outperformed the conventional methods when tested over sample images proven using key analysis, SSIM and histogram analysis tests. In addition, the proposed method overshadows the standard method in terms of the signal to noise ratio obtained for the encrypted image, which is much better than the SNR value obtained using the standard method. The paper also makes a worst case analysis for the SNR values for both the methods.
[1]
Remco C. Veltkamp,et al.
International Conference on Control, Automation, Robotics and Vision
,
2010
.
[2]
Eli Biham,et al.
Differential cryptanalysis of DES-like cryptosystems
,
1990,
Journal of Cryptology.
[3]
張兆源,et al.
彩色影像視覺密碼之製作; Visual Cryptography for Color Images
,
2000
.
[4]
David Chaum,et al.
Secret-ballot receipts: True voter-verifiable elections
,
2004,
IEEE Security & Privacy Magazine.
[5]
Eli Biham,et al.
Differential cryptanalysis of DES-like cryptosystems
,
1990,
Journal of Cryptology.
[6]
Eero P. Simoncelli,et al.
Image quality assessment: from error visibility to structural similarity
,
2004,
IEEE Transactions on Image Processing.
[7]
Ja-Chen Lin,et al.
Secret image sharing
,
2002,
Comput. Graph..
[8]
Ja-Chen Lin,et al.
Technical section Secret image sharing
,
2002
.
[9]
A. Rizzi.
Statistical Methods for Cryptography
,
2010
.
[10]
Jing Dong,et al.
Effects of watermarking on iris recognition performance
,
2008,
2008 10th International Conference on Control, Automation, Robotics and Vision.
[11]
W. Z. Gandhare,et al.
Secure Iris Authentication Using Visual Cryptography
,
2010,
ArXiv.
[12]
Ren-Junn Hwang,et al.
A Digital Image Copyright Protection Scheme Based on Visual Cryptography
,
2000
.