Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 2 , PP: 300-310, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations

M. Revathi 1 * , Devi .D 2 , R. Menaha 3 , R. Dineshkumar 4 , S. Mohan 5

  • 1 Associate professor, Measi institute of information technology, Royapettah, Chennai, India - (revathiirtt@gmail.com)
  • 2 Assistant professor, Sri krishna college of Engineering and Technology, Coimbatore, India - (devi@skcet.ac.in)
  • 3 Associate Professor, Department of Information Technology, Sri Eshwar College of Engineering, Coimbatore-32, India - (rmenahasenthil@gmail.com)
  • 4 Associate professor, Department of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, India - (mail2rdinesh@gmail.com)
  • 5 Assistant Professor, Department of ECE, Nehru Institute of Engineering and Technology, India - (smohan2507@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.140221

    Received: January 24, 2024 Revised: March 30, 2024 Accepted: July 09, 2024
    Abstract

    By splitting a picture into many parts, which, when reassembled, disclose the original image without requiring complicated math, visual cryptography is a strong method for protecting visual information. Problems with pixel enlargement, decreased picture quality, and restricted access structures are common with traditional visual cryptography techniques. Our proposed improved visual cryptography approach incorporates pixel-wise operations and critical access structures to solve these challenges and increase flexibility, picture quality, and security. To reconstruct a picture, our technique calls for building visual cryptographic shares based on critical access structures that specify the exact combinations of shares needed. In order to maintain the image's resolution and reduce pixel expansion, we use pixel-wise processes. By improving the peak signal-to-noise ratio (PSNR) by up to 20% compared to conventional approaches, experimental data show that our strategy greatly improves picture quality. In addition, the suggested approach guarantees that individual shares do not disclose any information on the original picture, thereby maintaining high security requirements. Finally, it is clear that the enhanced visual cryptographic system is well-suited for a wide range of uses in safe communications and data security due to its strong solution for secure picture sharing, increased picture quality, and adjustable access control.

    Keywords :

    Visual Cryptography , Image Security , Pixel-Wise Operations , Access Structures , Image Quality , Secure Image Sharin , Data Protection , Peak Signal-to-Noise Ratio (PSNR) , Visual Cryptographic Shares , Information Security

    References

    [1]       Lee, K. H., & Chiu, P. L. (2011). An extended visual cryptography algorithm for general access structures. IEEE transactions on information forensics and security7(1), 219-229.

    [2]       Wang, Y., Chen, J., & Wang, J. (2023). Visually meaningful image encryption based on 2D compressive sensing and dynamic embedding. Journal of Information Security and Applications, 78, 103613.

    [3]       Zhang, F., Guo, Y., Pu, M., Chen, L., Xu, M., Liao, M., ... & Luo, X. (2023). Meta-optics empowered vector visual cryptography for high security and rapid decryption. Nature Communications, 14(1), 1946.

    [4]       Gupta, S., Nitish, Harish, M., & Sharma, A. K. (2024). A hybrid authenticated image encryption scheme using elliptic curves for enhanced security. International Journal of Information Technology, 1-18.

    [5]       Qi, Z., MaungMaung, A., & Kiya, H. (2023). Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption. Journal of Imaging, 9(4), 85.

    [6]       Renuka Devi, K., Nithyapriya, S., Pradeep, G., Menaha, R., & Suganyadevi, S. (2023). Securing Shared Data Based on Homomorphic Encryption Schemes. In Homomorphic Encryption for Financial Cryptography: Recent Inventions and Challenges (pp. 53-83). Cham: Springer International Publishing.

    [7]       Maity, K., & Mukhopadhyay, S. (2023). VSBSIS: A verifiable SVD-based secret image sharing scheme for lossless and efficient reconstruction. Displays, 78, 102455.

    [8]       Gao, K., Chang, C. C., & Lin, C. C. (2023). Cryptanalysis of Reversible Data Hiding in Encrypted Images Based on the VQ Attack. Symmetry, 15(1), 189.

    [9]       Heednacram, A., & Keaomanee, Y. (2024). Four enhanced algorithms for full size image hiding in chest x-ray images. Multimedia Tools and Applications, 1-27.

    [10]    Sharma, P. L., Gupta, S., Nayyar, A., Harish, M., Gupta, K., & Sharma, A. K. (2024). ECC based novel color image encryption methodology using primitive polynomial. Multimedia Tools and Applications, 1-40.

    [11]    Wu, X., Wong, D. S., & Li, Q. (2009). Threshold visual cryptography scheme for color images with no pixel expansion. In Proceedings of the Second Symposium International Computer Science and Computation Technology (pp. 310-315).

    [12]    Liu, B., Martin, R. R., Huang, J. W., & Hu, S. M. (2014, October). Structure aware visual cryptography. In Computer Graphics Forum (Vol. 33, No. 7, pp. 141-150).

    [13]    Shivani, S., & Agarwal, S. (2018). VPVC: verifiable progressive visual cryptography. Pattern Analysis and Applications, 21(1), 139-166.

    [14]    Wang, L., Yan, B., Yang, H. M., & Pan, J. S. (2020). Flip extended visual cryptography for gray-scale and color cover images. Symmetry, 13(1), 65.

    [15]    P.Ramya. , , R.Anitha. , Rajalakshmi, J.. , , R.Dineshkumar. Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 186-197. DOI: https://doi.org/10.54216/JCIM.140213.

    [16]    M.Rajendiran. , , Jayanthi.E. , R, Suganthi. , Jamuna, M.. , , Dr.S.Vimalnath. Trustworthy-Based Authentication Model with Intrusion Detection for IoT-Enabled Networks with Deep Learning Algorithm. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 198-213. DOI: https://doi.org/10.54216/JCIM.140214.

    [17]    Soman, N., & Baby, S. (2016). XOR-Based Visual Cryptography. Int. J. Cybern. Informatics, 5(2), 253-264.

    [18]    Senthilkumaran, N.. Automated Brain Tumor Detection and Classification in MRI Images: A Hybrid Image Processing Techniques. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 239-252. DOI: https://doi.org/10.54216/JCIM.140216.

    [19]    M. Suriya, E. Anitha, N. Sudarssan, A. Venu Venkat, V. S. Deepak Saran and K. Kunguma Sakthivel, "An Efficient Artificial Intelligence based Human-Machine Interaction System," 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 2023, pp. 2067-2071, doi: 10.1109/ICACCS57279.2023.10112925. Haldorai, A., Murugan, S., &

    [20]  Balakrishnan, M. (2024). Bi-Model Emotional AI for Audio-Visual Human Emotion Detection Using Hybrid Deep Learning Model. In Artificial Intelligence for Sustainable Development (pp. 293-315). Cham: Springer Nature Switzerland.

    Cite This Article As :
    Revathi, M.. , .D, Devi. , Menaha, R.. , Dineshkumar, R.. , S., . Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 300-310. DOI: https://doi.org/10.54216/JCIM.140221
    Revathi, M. .D, D. Menaha, R. Dineshkumar, R. S., . (2024). Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations. Journal of Cybersecurity and Information Management, (), 300-310. DOI: https://doi.org/10.54216/JCIM.140221
    Revathi, M.. .D, Devi. Menaha, R.. Dineshkumar, R.. S., . Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations. Journal of Cybersecurity and Information Management , no. (2024): 300-310. DOI: https://doi.org/10.54216/JCIM.140221
    Revathi, M. , .D, D. , Menaha, R. , Dineshkumar, R. , S., . (2024) . Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations. Journal of Cybersecurity and Information Management , () , 300-310 . DOI: https://doi.org/10.54216/JCIM.140221
    Revathi M. , .D D. , Menaha R. , Dineshkumar R. , S. . [2024]. Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations. Journal of Cybersecurity and Information Management. (): 300-310. DOI: https://doi.org/10.54216/JCIM.140221
    Revathi, M. .D, D. Menaha, R. Dineshkumar, R. S., . "Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations," Journal of Cybersecurity and Information Management, vol. , no. , pp. 300-310, 2024. DOI: https://doi.org/10.54216/JCIM.140221