Home > Computer science essays > Visual cryptography

Essay: Visual cryptography

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 4 minutes
  • Price: Free download
  • Published: 26 October 2015*
  • Last Modified: 29 September 2024
  • File format: Text
  • Words: 1,078 (approx)
  • Number of pages: 5 (approx)

Text preview of this essay:

This page of the essay has 1,078 words.

Visual cryptography, degree associate rising cryptography technology, uses the characteristics of human vision to rewrite encrypted photos. Visual cryptography provides secured digital transmission that is used just for merely the once. the initial photos ar typically utilize by pattern this theme. As the simplest way of special secret sharing technology, it fully was used for many participants to code a black-and-white image. the initial image is in addition blazing by stacking the shares on. Its security is up to a one time pad and anyone will use it for coding with none science information and any computations.
Numerous guidance like military maps and business identifications ar transmitted over internet. Whereas pattern secret photos, security problems ought to be compelled to be taken into thought as a results of hackers may utilize weak link over communication network to steal info that they need .To touch upon the protection problems with secret photos, varied image secret sharing schemes ar developed.
Secret Sharing permits sharing secret info among a bunch of participants such secret writing is potential providing all the participants unit gift with their shares. Secret ar divided into any choice shares. a vicinity of secret info is termed a share. Whereas secret writing the information, it’s needed to need all the shares on transparency then manufacture them in correct order. There unit varied secret sharing schemes.
Digital information embedding in digital media is associate info technology field of quickly growing industrial, equally as national security of interest. The transmission of digital transmission product via internet is obtaining further and further trendy . as a results of the digital medium ar handily transmitted and lossless derived, they as well cause a rise of digital piracy to unravel this disadvantage, totally wholly completely different info concealing techniques unit of measurement used [1]-[4]. Covert communication or steganography, that accurately suggests that ‘covered writing’ in Greek, is that the plan of action of activity information to a lower place a canopy medium (also spoken as host), like image, video, or audio, to determine secret communication between trusting parties and conceal the existence of embedded information.
The main objective of information concealing is to talk firmly in such the method that existence message that’s embedded in anyone of the digital media is not visible to the observer. That unwanted parties should not be able to distinguish in any sense between cover-image (image not containing any secret message) and stego-image (modified cover-image that contains secret message). that the stego-image should not deviate torrential from the primary cowl image. fully totally different info concealing techniques area unit typically evaluated on following four basic attributes {of info|of knowledge|of information} |of knowledge |of knowledge concealing (i) payload – information delivery rate; (ii) strength – hidden data resistance to noise/disturbance; (iii) transparency – low host distortion for concealment purposes; and (iv) security- inability by unauthorized users to detect/access the communication.
Recently, developing info concealing technologies, notably among the kind of steganography, square measure seen to cause a threat to personal privacy, industrial and national security interests [5]. The steganalysis is that the strategy to reveal the confidential message even certain unsure media. The step technology to steganography security is sometimes spoken as steganalysis, which could be classified into a pair of categories: Passive and active. the primary task of passive steganalysis is to come back to a choice the presence or absence of hidden info in given media objects (binary hypothesis testing problem). Active steganalysis (also cited as forensics steganalysis) refers to the effort by unmotivated recipients to extract/remove/modify the actual hidden info.
II. LITERATURE SURVEY
Naor and Shamir planned a ‘(k, n)-threshold visual secret sharing scheme’ within the year 1994, that is currently usually cited as Visual Cryptography(VC) [1]. The key feature of their theme is that the key image will be decrypted just by the human sensory system. Therefore no information of cryptography is needed once a user uses a system using visual cryptography. every share sounds like a group of random pixels and seems purposeless by itself. The generated shares alone don’t reveal something regarding the key image.
Till the year 1997 visual cryptography schemes were applied to exclusively black and white photos. Initial coloured visual cryptography theme was developed by Verheul and Van Tilborg [2]. Coloured secret photos could also be shared with the concept of arcs to construct a coloured visual cryptography theme. In c-colorful visual cryptography theme one pixel is reworked into m sub pixels, and each sub pixel is split into c color regions. In each sub pixel, there’s specifically one color region coloured, and each one the other color regions area unit black. the colour of one pixel depends on the interrelations between the stacked sub pixels. For a coloured visual cryptography theme with c colours, the image component growth m is c?? 3.
For sharing a secret color image and in addition to come up with the many share to transmit secret color image, Chang Jiang and Tsai [3] anticipated color visual cryptography theme. For a secret color image a pair of necessary color photos are chosen as cowl photos that square measure an identical size as a result of the key color image. Then keep with a predefined Color Index Table, the key color image square measure hidden into a pair of camouflage photos. One disadvantage of this theme is that more home is required to accumulate the colour index table.
When additional colours square measure there at intervals the key image the larger the dimensions of shares can become. To beat this limitation, Chin-Chen Chang Jiang et al [4] developed a secret color image sharing theme supported modified visual cryptography. This theme provides a further economical technique to hide a grey image in completely totally different shares through out this theme, size of the shares is fixed; it doesn’t vary once the quantity of colours showing among the key image differs. Theme does not want any predefined Color Index Table.
For reducing element growth in color visual cryptography theme S. J. Shyu [5] suggested a additional economical coloured visual secret sharing theme with element growth of [ log2c*m] wherever m is that the element growth of the exploited binary theme. Du-Shiau Tsai et al [6] devised a secret image sharing theme for true-color secret pictures. within the planned theme through combination of neural networks and variant visual secret sharing, the standard of the reconstructed secret image and camouflage pictures square measure visually identical because the corresponding original pictures.

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Visual cryptography. Available from:<https://www.essaysauce.com/computer-science-essays/essay-visual-cryptography/> [Accessed 19-11-24].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.