International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 101

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan [2]


Abstract: Visual secret sharing, or the so-called visual cryptography, is a well-known scheme that encrypts a secret image into several meaningless share images, usually printed on transparencies, and decrypts as stacking some or all share images by the human visual system. More and more researches about visual secret sharing and its applications have been recently proposed. Here a novel image sharing scheme is proposed to encode a secret into meaningful host images. It consists of Error Di usion, Permutation Encoding, Steganography, Cheating Prevention. Since the secret images are grayscale images, rst apply EDBTC, then the secret image is encrypted based on permutation. Finally hide the shares created by adaptive region incrementing and cheating prevention algorithm into host images.


Keywords: sharing, encoding, decoding, secret sharing, Cheating Prevention


Edition: Volume 4 Issue 11, November 2015,


Pages: 1526 - 1530


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Anju Mohan, "A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1526-1530, https://www.ijsr.net/get_abstract.php?paper_id=NOV151430

Similar Articles with Keyword 'sharing'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top