skip to main content
article

Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications

Published: 01 July 2019 Publication History

Abstract

In the modern years, multimedia security has become a prime agenda for secure transmission over unsecured channels due to the increase in digitalization of media. Cryptography is one of the techniques, which can be used for security of exchanged data. The visual cryptographic scheme generates numerous unreasonable shares of the image with specific information. The secret information hidden in the image can be retrieved by accumulating all the shares. The basic idea behind this cryptographic scheme is the encryption of image which hides the secret into m several image shares. By this process, it turns to be complex for the hackers to retrieve the original data of the image. Furthermore, to increase the confidentiality and privacy of the original image, there is in demand to make use of the efficient encryption algorithm. According to this, a new image encryption and decryption is developed using diffusion method with a combination of chaotic maps. Overall, the proposed visual cryptographic method is divided into three phases namely, i) Separation of color bands, ii) Generation of several shares and iii) Encryption & Decryption. Firstly, the color image is divided into three bands (R, G and B) and then various shares of the image are generated based on the pixel measures. After that, the encryption and decryption are done by using diffusion process associated with chaotic map. Experimental results of various analysis and computer simulation confirm that the new algorithm offers high security and is suitable for practical image encryption.

References

[1]
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86---106
[2]
Ateniese G, Blundo C, Santis AD, Stinson DR Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143---161
[3]
Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud University-Computer and Information Sciences
[4]
Barik RC, Changder S, Sahu SS (2017) Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. Computational Intelligence in Data Mining, Springer, Singapore, pp 449---458
[5]
Chang C, Tsai C, Chen T (2000) A new scheme for sharing secret color images in computer network. International Conference on Parallel and Distributed Systems, pp. 21---27
[6]
Chang C-C, Yu T-X (2002) Sharing a secret gray image in multiple images. Proceedings of the First International Symposium on Cyber Worlds (CW.02)
[7]
Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. International Conference on Engineering
[8]
Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. J Opt Commun 14(8):552---560
[9]
Chen L, Zhao D (2009) Color image encoding in dual fractional Fourier-wavelet domain with random phases. J Opt Commun 282:3433---3438
[10]
Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647---658
[11]
Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, MHS 1995, pp. 39---43. IEEE, New York
[12]
Fang W, Lin J (2006) Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis 16(4):632---636
[13]
Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Secur 78:pp.301---320
[14]
Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. Journal of Information Security and Applications 35:119---127
[15]
Hou YC, Wei SC, Lin CY (2014) Random-grid-based visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 24(5):733---744
[16]
Kalai Selvi R, Kavitha V (2012) Crypto System based Authentication using CSTA in Grid. Int J Comput Appl 48(22)
[17]
Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended Visual Cryptography for Color Images Using Coding Tables. International Conference on Communication, Information & Computing Technology (ICCICT), pp. 19---20
[18]
Khoirom MS, Laiphrakpam DS, Themrichon T (2018) Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik 168:370---375
[19]
Kumar S, Kumar M, Budhiraja R, Das MK, Singh S (2018) A cryptographic model for better information security. Journal of Information Security and Applications 43:123---138
[20]
Liu Z, Dai J, Sun X, Liu S (2010) Color image encryption by using the rotation of color vector in Hartley transform domains. Journal on Optical Lasers 48(5)
[21]
Liu S, Fujiyoshi M, Kiya H (2011) A Leakage Suppressed Two-level Security Visual Secret Sharing Scheme, Journal on Intelligent Signal Processing and Communication Systems (ISPACS), pp. 7---9
[22]
Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik's cube principle. J Electr Comput Eng:1---14
[23]
Lukac R, Plataniotis KN (2004) Colour image secret sharing. IEEE Electronics Letters 40(9)
[24]
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf Optimizer. Adv Eng Softw 69:46---61
[25]
Mohanty M, Gehrmann C, Atrey PK (2014) Avoiding Weak Parameters in Secret Image Sharing. IEEE
[26]
Naor M, Shamir A (1995) Visual cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1---12
[27]
Nautiyal I, Sharma M (2014) Encryption using elliptic curve cryptography using java as implementation tool. J Adv Res Comput Sci Softw Eng 4(1):620---625
[28]
Padma B, Chandravathi D, Prapoorna Roja P (2010) Encoding and decoding of a message in the Implementation of elliptic curve cryptography using Koblitz's method. Int J Comput Sci Eng 2(5):1904---1907
[29]
Pandey LN, Shukla N (2013) Visual Cryptography Schemes using Compressed Random Shares. Journal of Advance Research in Computer Science and Management Studies 1(4):62---66
[30]
Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudo-random permutation substitution scheme for image encryption. Opt Commun 284:4331---4339
[31]
Popescu C (2011) A secure e-cash transfer system based on the elliptic curve discrete logarithm problem. Journal on Informatica 3(22):395---409
[32]
Rijmen V, Preneel B (1996) Efficient color visual encryption for shared colors of Benetton, Eurocrypto'96. Rump Session, Berlin
[33]
Roy PK, Mandal D (2013) Oppositional biogeography-based optimization for optimal power flow. Int J Electr Power Energy Syst 53:123---134
[34]
Roy PK, Paul C, Sultana S (2014) Oppositional teaching learning based optimization approach for combined heat and power dispatch. Int J Electr Power Energy Syst 57:392---403
[35]
Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12---21
[36]
Singh P, Raman B, Misra M (2017) A (n, n) Threshold Non-expansible XOR based Visual Cryptography with Unique Meaningful Shares. Signal Processing
[37]
Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image Encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137---140
[38]
Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137---140
[39]
Srinivas M, Patnaik LM (1994) Genetic algorithms: a survey. Computer (Long Beach Calif) 27(17---26)
[40]
Sujatha K, Shalini Punithavathani D (2018). Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks. Multimed Tools Appl 77(2):1735---1759
[41]
Sundararaj V, (2016) An Efficient Threshold Prediction Scheme for Wavelet Based ECG Signal Noise Reduction Using Variable Step Size Firefly Algorithm. International Journal of Intelligent Engineering and Systems 9(3):117---126
[42]
Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277---288
[43]
Vinu Sundararaj, (2019) Optimal task assignment in mobile cloud computing by queue based Ant-Bee algorithm. Wireless Personal Communications 104(1):173---197
[44]
Tao R, Xiang-Yi M, Wang Y (2010) Image encryption with multi orders of fractional Fourier transforms. IEEE Trans Inf Forensics Security 5:734---738
[45]
Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21---34
[46]
USC-SIPI Image Database. http://sipi.usc.edu/database/database.php
[47]
Vinod Kumar Y, Malviya AK, Gupta DL, Satyendra S, Ganesh C (2012) Public key cryptosystem Technique for elliptic curve cryptography with generator g for image encryption. Int J Comput Appl 3(3):298---302
[48]
Wang S, Gu K, Ma S, Lin W, Liu X, Gao W Guided image contrast enhancement based on retrieved images in cloud. IEEE Transactions on Multimedia 18(2):219---232
[49]
Wu X, Ou D, Dai L, Sun W (2013) XOR-based meaningful visual secret sharing by generalized random grids. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security
[50]
Yang X-S (2010b) A new metaheuristic bat-inspired algorithm. In: González JR, Pelta DA, Cruz C, Terrazas G, Krasnogor N (eds) Nature inspired cooperative strategies for optimization (NICSO 2010). Springer Berlin Heidelberg, Berlin, pp 65---74
[51]
Yi K, Leihong Z, Dawei Z (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58---64
[52]
You X, Li Q, Tao D et al (2014) Local metric learning for exemplar-based object detection. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1265---1276
[53]
Youmaran R, Adler A, Miri A (2006) An Improved Visual Cryptography Scheme For Secret Hiding. J Commun:340---343
[54]
Zhu Z et al (2015) An adaptive hybrid pattern for noise-robust texture analysis. Pattern Recogn 48(8):2592---2608

Cited By

View all
  1. Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Multimedia Tools and Applications
        Multimedia Tools and Applications  Volume 78, Issue 13
        Jul 2019
        1595 pages

        Publisher

        Kluwer Academic Publishers

        United States

        Publication History

        Published: 01 July 2019

        Author Tags

        1. Correlation coefficient
        2. Diffusion
        3. Logistic map
        4. Mean square error
        5. Multimedia
        6. Peak signal noise ratio
        7. Visual cryptography
        8. encryption and decryption

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media