Secret Image Enhanced Sharing Using Visual Cryptography
In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image becomes accessible to every individual member and ther...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2017-09-01
|
Series: | Cybernetics and Information Technologies |
Subjects: | |
Online Access: | https://doi.org/10.1515/cait-2017-0034 |
_version_ | 1818393170554126336 |
---|---|
author | Brindha K. Jeyanthi N. |
author_facet | Brindha K. Jeyanthi N. |
author_sort | Brindha K. |
collection | DOAJ |
description | In the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image becomes accessible to every individual member and there is an inherent risk of any one of the members in the group using the valuable information for illegal purposes as an intruder. To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group to retrieve either only a part or the complete secret image based purely on his access privilege rights only. |
first_indexed | 2024-12-14T05:41:03Z |
format | Article |
id | doaj.art-fbcc8102f23d4ffbbb68fc78282ffa4d |
institution | Directory Open Access Journal |
issn | 1314-4081 |
language | English |
last_indexed | 2024-12-14T05:41:03Z |
publishDate | 2017-09-01 |
publisher | Sciendo |
record_format | Article |
series | Cybernetics and Information Technologies |
spelling | doaj.art-fbcc8102f23d4ffbbb68fc78282ffa4d2022-12-21T23:15:01ZengSciendoCybernetics and Information Technologies1314-40812017-09-0117312813910.1515/cait-2017-0034Secret Image Enhanced Sharing Using Visual CryptographyBrindha K.0Jeyanthi N.1School of Information Technology and Engineering, VIT University, Vellore632014, Tamilnadu, IndiaSchool of Information Technology and Engineering, VIT University, Vellore632014, Tamilnadu, IndiaIn the conventional visual cryptographic scheme, an image is divided into several image shares, which are distributed among the members of a group, and the original image is retrieved by combining the shares of all the members. This secret image becomes accessible to every individual member and there is an inherent risk of any one of the members in the group using the valuable information for illegal purposes as an intruder. To overcome this problem, the proposed algorithm Secret Image Enhanced Sharing using Visual Cryptography (SIESVC) diligently facilitates any member in the group to retrieve either only a part or the complete secret image based purely on his access privilege rights only.https://doi.org/10.1515/cait-2017-0034visual cryptographysecret image enhanced sharing using visual cryptography (siesvc) |
spellingShingle | Brindha K. Jeyanthi N. Secret Image Enhanced Sharing Using Visual Cryptography Cybernetics and Information Technologies visual cryptography secret image enhanced sharing using visual cryptography (siesvc) |
title | Secret Image Enhanced Sharing Using Visual Cryptography |
title_full | Secret Image Enhanced Sharing Using Visual Cryptography |
title_fullStr | Secret Image Enhanced Sharing Using Visual Cryptography |
title_full_unstemmed | Secret Image Enhanced Sharing Using Visual Cryptography |
title_short | Secret Image Enhanced Sharing Using Visual Cryptography |
title_sort | secret image enhanced sharing using visual cryptography |
topic | visual cryptography secret image enhanced sharing using visual cryptography (siesvc) |
url | https://doi.org/10.1515/cait-2017-0034 |
work_keys_str_mv | AT brindhak secretimageenhancedsharingusingvisualcryptography AT jeyanthin secretimageenhancedsharingusingvisualcryptography |