Implementation of Random Grid Visual Cryptography for Color Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Visual Cryptography is a special encryption technique that encrypts the secrect image into n numbers of shares to hide information in images in such a way that it can be decrypted by the human visual system. It is imperceptible to reveal the secret information unless a certain number of shares (K) or more are superimposed. Simple Visual Cryptography is very insecure.Variable length key based Visual Cryptography for color image uses a varible length Symmetric key based Visual Cryptography scheme for color images where a secrect key is used to encrypt the image and division of the encrypted image is done useing Random Number. Unless the secrect key is known, the original image will not be decrypted. Here secrect key ensures the security of images. The proposed method introduces the concept of above scheme. Encryption process encrypts Original Image using variable length Symmetric key, gives encrypted image. Share generation process divides the encrypted images into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.

Keywords: Visual Cryptography VS, Random Numbers, Secret Sharing, Symmetric key

Edition: Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Share this Article

How to Cite this Article?

Snehal N. Meshram, Sneha U. Bohra, "Implementation of Random Grid Visual Cryptography for Color Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=21051501, Volume 4 Issue 5, May 2015, 2545 - 2549

132 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Visual Cryptography VS'

Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 114 , Downloads: 113 | CTR: 99 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2392 - 2395

Review on Implementation of Random Grid Visual Cryptoraphy for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Similar Articles with Keyword 'Random Numbers'

Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 118 , Downloads: 108 | CTR: 92 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 5, May 2016

Pages: 2480 - 2485

Test Pattern Generation for Integrated Circuit Test Using Distance between Vectors

Emad Aldeen Widaat Alla Musa, Dr. Abdelrahman Elsharif Karrar, Dr. Abu Khari Bin Aain

Share this Article

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Views: 114 , Downloads: 113 | CTR: 99 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2392 - 2395

Review on Implementation of Random Grid Visual Cryptoraphy for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Similar Articles with Keyword 'Secret Sharing'

Views: 126 , Downloads: 100 | CTR: 79 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Views: 133 , Downloads: 103 | CTR: 77 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2433 - 2435

Literature Review on a Natural Image Based VSS Scheme for Sharing Secret Image

Priya K. Rahangdale, A. N. Jaiswal

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3220 - 3224

Verifiable Secure Secret Image Sharing Scheme

Angel Rose A, Sinu Maria Kurian

Share this Article

Views: 130 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1689 - 1691

Authentication of Colored Document Image with Data Repair Capability

Pradnya Kadam, Nishigandha Khandagale, Poonam Yadav

Share this Article

Similar Articles with Keyword 'Symmetric key'

Views: 132 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 114 , Downloads: 104 | CTR: 91 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Views: 129 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Views: 132 , Downloads: 105 | CTR: 80 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 148 , Downloads: 105 | CTR: 71 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article
Top