IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography

A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography
View Sample PDF
Author(s): Ram Chandra Barik (National Institute of Technology, Durgapur, India), Suvamoy Changder (National Institute of Technology, Durgapur, India)and Sitanshu Sekhar Sahu (Birla Institute of Technology, Mesra, India)
Copyright: 2019
Volume: 6
Issue: 1
Pages: 25
Source title: International Journal of Rough Sets and Data Analysis (IJRSDA)
Editor(s)-in-Chief: Parikshit Narendra Mahalle (Department of Artificial Intelligence and Data Science, Bansilal Ramnath Agarwal Charitable Trust's, Vishwakarma Institute of Information Technology, India)
DOI: 10.4018/IJRSDA.2019010102

Purchase

View A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography on the publisher's website for pricing and purchasing information.

Abstract

Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing scheme among N number of participants with pixel expansion. Later on, many researchers extended the visual secret sharing scheme with no expansion of pixel regions in binary and color images. By stacking k shares the secret can be decoded using normal vision. In this paper the authors have proposed a modification towards visual cryptography by converting the message in the form of printable ASCII character-based numerical encoding patterns in a binary host image. The encoding of the message is represented as ASCII numeric and a texture of those numeric are arranged to form a binary host image. Then, N numbers of shares are built up but after stacking all the shares the decoding of the message is achieved by converting ASCII numeric to the secret.

Related Content

Tianlong Wang, Chaoyang Wang, Zhiqiang Liu, Shuai Ma, Huibo Yan. © 2024. 15 pages.
Xudong Cao, Chenchen Chen, Lejia Zhang, Li Pan. © 2024. 25 pages.
Shengfeng Xie, Jingwei Li. © 2024. 20 pages.
Xiaoyuan Wang, Hongfei Wang, Jianping Wang, Jiajia Wang. © 2024. 24 pages.
Jiao Hao, Zongbao Zhang, Yihan Ping. © 2024. 14 pages.
Qinmei Wang. © 2024. 13 pages.
Wenzhen Mai, Mohamud Saeed Ambashe, Chukwuka Christian Ohueri. © 2024. 18 pages.
Body Bottom