IJCNIS Vol. 9, No. 5, 8 May 2017
Cover page and Table of Contents: PDF (size: 559KB)
Cheating Prevention, Secret Sharing, Visual Cryptography, Verification Image, Secret Image, RGB, CMYK, LSB
Secret Image Sharing using Verifiable method has become an important field in cryptography in today’s world. Security is of main concern and verifiability has become a demand of this era in order to avoid cheating prevention and a new scheme of secret image sharing scheme for identification of the presence of cheater is has been analyzed and described. A method for ensuring integrity of secret image prior to its recovery is proposed. An secret image and verification image are used to create shares by ARGB to CMYK conversions which are sent via cover image for transmission. The shares created are meaningful therefore this method is able of identifying whether cheater exists or not in order to preserve the integrity of the image.
Priya Venny, Jyoti Rao, "A Method for Verifiable Secret Image Sharing", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.5, pp. 38-43, 2017. DOI:10.5815/ijcnis.2017.05.05
[1]M. Naor and A. Shamir, Visual cryptography, Lecture Notes Computer Science, vol. 50, pp. 1-12, 1995.
[2]Mary, G. Germine, and M. Mary Shanthi Rani. "A Study on Secret Image Hiding in Diverse Color Spaces."
[3]Chen, Yu-Chi, Du-Shiau Tsai, and Gwoboa Horng. "Visual secret sharing with cheating prevention revisited." Digital Signal Processing 23.5 (2013): 1496-1504.
[4]Tan, Xiaoqing, and Qiong Zhang. "A Kind of Verifiable Visual Cryptography Scheme." Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on. IEEE, 2013.
[5]Rao, Jyoti, and Priya Venny. "A new approach of Secret Image Sharing using Verifiable scheme." Computing, Communication and Automation (ICCCA), 2016 International Conference on. IEEE, 2016.
[6]Rose, A. Angel, and Sabu M. Thampi. "A Secure Verifiable Scheme for Secret Image Sharing." Procedia Computer Science 58 (2015): 140-150.
[7]Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
[8]Besteena, K. J., and Philumon Joseph. "Reversible data hiding in selectively encrypted RGB images by reserving room in advance." Computational Systems and Communications (ICCSC), 2014 First International Conference on. IEEE, 2014.
[9]Jana, Biswabandhu, et al. "Cheating prevention in Visual Cryptographic Schemes using message embedding: A hardware based practical approach."Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on. IEEE, 2014.
[10]https://www.scribd.com/doc/54600936/Steganography-Report.
[11]Vijayalakshmi, V., G. Zayaraz, and V. Nagaraj. "A modulo based LSB steganography method." Control, Automation, Communication and Energy Conservation, 2009. INCACEC 2009. 2009 International Conference on. IEEE, 200