Skip to main content

Advertisement

Log in

Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abdulla Alan A, Sellahewa Harin, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17,799–17,823

    Article  Google Scholar 

  2. Ahmed N, Saleem Y, Habib H, Afzal S, Khurshid S (2015) A novel image encryption scheme based on orthogonal vectors. Nucleus 52(2):71–78

    Google Scholar 

  3. Almuhammadi S, Al-Hejri I (2017) A comparative analysis of aes common modes of operation. In: 2017 IEEE 30th Canadian conference on electrical and computer engineering (CCECE). IEEE, pp 1–4

  4. AshaBhadran R (2015) An improved visual cryptography scheme for color images. Int Res J Eng Technol (IRJET) 2(05)

  5. Bhatnagar R, Kumar M (2018) Visual cryptography: A literature survey. In: 2018 Second international conference on electronics, communication and aerospace technology (ICECA). IEEE, pp 78–83

  6. Chandini MS (2020) An overview about a milestone in information security: steganography. Int J Progress Res Sci Eng 1(2):33–35

    Google Scholar 

  7. Chattonadhvav AK, Ghosh D, Pati RS, Nag A, Ghosh S (2018) Visual cryptography: review and analysis of existing methods. In: 2018 Global wireless summit (GWS). IEEE, pp 236–241

  8. Cimato S, Yang CN (2017) Visual cryptography and secret image sharing. CRC press, Boca Raton

    Book  Google Scholar 

  9. Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electric Eng 70:647–658

    Article  Google Scholar 

  10. Ibrahim DR, Abdullah R, Teh JS (2020) An enhanced color visual cryptography scheme based on the binary dragonfly algorithm. Int J Comput Appl 1–10

  11. Jain A, Soni S (2017) Visual cryptography and image processing based approach for secure transactions in banking sector. In: 2017 2nd International conference on telecommunication and networks (TEL-NET). IEEE, pp 1–5

  12. Karwande VKS, Kankale AP, Thakare PG (2018) A review on visual cryptography schemes. Int J Res Eng Sci Manag 1(10):368–372

    Google Scholar 

  13. Pahuja S, Kasana SS (2017) Halftone visual cryptography for color images. In: 2017 International conference on computer, communications and electronics (Comptelix). IEEE, pp 281–285

  14. Paknahad SM, Hosseini SA, Alagheband MR (2016) User-friendly visual secret sharing for color images based on random grids. In: 2016 10th international symposium on communication systems, networks and digital signal processing (CSNDSP). IEEE, pp 1–6

  15. Purushothaman V, Sreedhar S (2016) An improved secret sharing using xor-based visual cryptography. In: 2016 Online international conference on green engineering and technologies (IC-GET). IEEE, pp 1–4

  16. Qureshi MA, Aziz A, Ahmed B, Khalid A, Munir H (2012) Comparative analysis and implementation of efficient digital image watermarking schemes. Int J Comput Electric Eng 4(4):558

    Article  Google Scholar 

  17. Rao J, Patil V (2015) Visual cryptography for image privacy protection using diverse image media. In: 2015 International conference on green computing and internet of things (ICGCIoT). IEEE, pp 855–859

  18. Ratheesh V, Jogesh J (2014) A visual cryptographic scheme for owner authentication using embedded shares. IJCSE, Tech rep

  19. Ravella Y, Chavan P (2017) Secret encryption using (2, 2) visual cryptography scheme with dct compression. In: 2017 International conference on intelligent computing and control systems (ICICCS). IEEE, pp 344–349

  20. Saher M, Amin A, Qureshi IA, Qureshi MA, Jawaid MM (2018) Efficient advanced encryption standard for securing cognitive radio networks. Mehran Univ Res J Eng Technol 37(4):645–654

    Article  Google Scholar 

  21. Shankar K, Eswaran P (2015) Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput Sci 70:462–468

    Article  Google Scholar 

  22. Shankar K, Eswaran P (2017) Rgb based multiple share creation in visual cryptography with aid of elliptic curve cryptography. Chin Commun 14 (2):118–130

    Article  Google Scholar 

  23. Siahaan APU (2017) Rc4 technique in visual cryptography rgb image encryption. Int J Adv Trends Comput Sci Eng 3(7)

  24. Sushma CH, Kumari P, Surya L (2021) Analysis on visual cryptography to secure image by using digital watermarking. Solid State Technol 64 (2):203–208

    Google Scholar 

  25. Tan L, Liu K, Yan X, Wan S, Chen J, Chang C (2018) Visual secret sharing scheme for color qr code. In: 2018 IEEE 3rd International conference on image, vision and computing (ICIVC). IEEE, pp 961–965

  26. Thomas SA, Gharge S (2017) Review on various visual cryptography schemes. In: 2017 International conference on current trends in computer, electrical, electronics and communication (CTCEEC). IEEE, pp 1164–1167

  27. Thomas SA, Gharge S (2018) Halftone visual cryptography for grayscale images using error diffusion and direct binary search. In: 2018 2nd International conference on trends in electronics and informatics (ICOEI). IEEE, pp 1091–1096

  28. Yan X, Liu F, Yan WQ, Yang G, Lu Y (2020) Weighted visual cryptographic scheme with improved image quality. Multimed Tools Appl 79:21,345–21,360

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Ali Qureshi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, S., Hayat, M.F., Qureshi, M.A. et al. Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary Images. Multimed Tools Appl 80, 32071–32090 (2021). https://doi.org/10.1007/s11042-021-11152-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11152-z

Keywords

Navigation