Skip to main content
Log in

Authentic secret share creation techniques using visual cryptography with public key encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the digital transparent world, share the secret messages are challenged one. Visual cryptography (VC) is safer method for information transfer without any distraction by hackers. It is giving more security to the information sharing through digital form. This method hides the messages into images. So intruder cannot understand the distorted image and the data communication become secured. Through VC method number of shares has been generated from the original images. So here each RGB pixel shares are separately created by Visual Secret Share (VSS) scheme. The created multiple shares of the secret images are encrypted and decrypted with RSA algorithm. In the encryption process the multiplication technique is used for key generation process and public key is used for encryption process and private key is used for decryption process. Secret image’s quality has been compared through the Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) values. The experimental result of decrypted image PSNR value is 156.32 and MSE value is 0.5031. The Number of Changing Pixel Rate (NPCR) and Unified Averaged Changed Intensity (UACI) values are compared for the secure level of the secret image. The result of decrypted image NPCR value is 69.44 and UACI value is 13.88. Finally, the experiment result shows that the proposed method is giving more security and quality of secret image sharing and also execution time is faster than existing method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig.   1
Chart 1
Chart 2
Chart 3
Chart 4

Similar content being viewed by others

References

  1. Asha Bhadran R (2015) An improved visual cryptography scheme for color images. Int Res J Eng Technol 02(05)

  2. Gupta N, Vyas RR (2017) Image encryption using elliptic curve cryptography. International Journal of Innovation & Advancement in Computer Science 6(9)

  3. Hegde SS, Bhaskara Rao N (2011) Visual cryptography (VC) using Zigzag scan approach. IJCSET 1(8)

  4. Jesalkumari JA and Sedamkar RR (2013) “Modified Visual Cryptography Scheme for Colored Secret Image Sharing”, in International Journal of Computer Applications Technology and Research ,Volume 2– Issue 3, 2013, pp: 350–356.

  5. Karolin M, Meyyappan T (2015) RGB based secret sharing scheme in color visual cryptography. Int J Adv Res Comput Commun Eng 4(7):151–155. https://doi.org/10.17148/IJARCCE.2015.4734

  6. Karolin M, Meyyappan T (2019) Secret multiple share creation with color images using visual cryptography. International conference on communication and signal processing April 4–6 2019, pp 0058–0062. https://doi.org/10.1109/iccsp.2019.8698013

  7. Karolin M, Meyyappan T (2019) Image encryption and decryption using RSA algorithm with share creation techniques. Int J Eng Adv Technol 9(2):2797–2800. https://doi.org/10.35940/ijeat.B4021.129219

  8. Loukhaoukha K, Chouinard J, Berdai A (2012) A secure image encryption algorithm based on Rubik’s cube principle. J Electr Comput Eng 2012

  9. Mahto D member Iaeng, Danish Ali Khan member Iaeng and Dilip Kumar yadav member Iaeng “Security Analysis of Elliptic Curve Cryptography and RSA” Proceeding of the World Congress on Engineering July1, 2016, Vol: 1.

  10. Naor M, Shamir A (1995) Visual cryptography. Proceedings of Advances in Cryptology: Eurocrypt94, Lecture Notes Computer Science 950:1–12. https://doi.org/10.1007/BFb0053419

  11. Pandey LN and Shukla N (2013) “Visual Cryptography Schemes using Compressed Random Shares”, in International Journal of Advanced Research in Computer Science and Management Studies, Volume 1, Issue 4, pp:62–66.

  12. Patel and Srivastava (2017) “A new technique for color share generation using visual cryptography” 2016 International Conference on Inventive Computation Technologies, January 2017, DOI: https://doi.org/10.1109/INVENTIVE.2016.7824848, Publisher: IEEE.

  13. Patel N, Vyavahare P and Panchal M (2016) “A Novel Verifiable Multi-Secret sharing scheme Based on Elliptic Curve Cryptography” 2016 Tenth International Conference on Emerging security Information, Systems and Technologies ISBN: 978–1–61208-493-0.

  14. Priyanka, Kulkarni (2019) Secret image sharing using 2-pixel visual cryptography encryption. Int J Recent Technol Eng 8(4). https://doi.org/10.35940/ijrte.C4307.118419

  15. Rijmen V, Preneel B (1996) Efficient color visual encryption for shared colors of benetton. Eurocrypto’96, Rump Session, Berlin

  16. Saturwar, Chaudhari (2017) Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking. 2017 Second International Conference on Electrical, Computer and Communication Technologies, November 2017. https://doi.org/10.1109/ICECCT.2017.8117849, Publisher: IEEE

  17. Shankar K, Eswaran P (2016) RGB based secure share creation in visual cryptography using optimal elliptic curve cryptography techniques. J Circuits Syst Comput 25(11)

  18. Sharma M, Saraswat R (2013) Secure visual cryptography technique for color images using RSA algorithm. Int J Engi Innov Technol 2(10)

  19. Singh SR, Khan AK and Singh TS (2016) “A Critical Review on Elliptic Curve Cryptography” 2016 International Conference on Automatic Control and dynamic Optimization Techniques.

  20. Vandana, Sreela (2017) An improved secret sharing using XOR-based visual cryptography. 2016 Online International Conference on Green Engineering and Technologies, May 2017. https://doi.org/10.1109/GET.2016.7916633, Publisher: IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Karolin.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Karolin, M., Meyyappan, T. Authentic secret share creation techniques using visual cryptography with public key encryption. Multimed Tools Appl 80, 32023–32040 (2021). https://doi.org/10.1007/s11042-021-11202-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11202-6

Keywords

Navigation