banner

Semantic pixel encoding visual secret sharing technique for balancing quality and security in color images

Kanchan Patil, Jyotsna Vilas Barpute, Mrudul Arkadi, Sapana Deepak Bhirud, Catherine Esther Karunya A, John Blesswin A, Selva Mary G, Shibani Raju S

Abstract


Color images are widely utilized across various domains, encompassing digital media and extending to critical applications in satellite and military arenas. As the significance of these images has grown, the need to protect their content from unauthorized access and potential threats has been underscored. Visual Secret Sharing (VSS) schemes have been proposed as effective mechanisms, with images being encrypted into multiple shares that, individually, offer no discernible information about the original content. Nevertheless, issues such as pixel expansion have been noted in traditional VSS methods, which result in increased complexity and a potential compromise in image quality. Maintaining impeccable image quality is emphasized, mainly since critical application decisions are often based on the clarity and accuracy of image details. The Semantic Pixel Encoding Visual Secret Sharing (SPEVSS) technique is proposed to address these identified challenges. A robust mechanism has been formulated through the integration of semantic pixel encoding with VSS, effectively countering pixel expansion while preserving the fidelity of the original image. As a result of this research, computational complexity has been significantly reduced, decryption methodologies have been made more efficient, and a more robust security framework for colour images has been established. The performance of the proposed SPEVSS shows the reconstructed images show the PSNR of 42 dB has been recorded in images processed, underscoring the method’s capability to balance security and optimal image quality.


Keywords


semantic images; visual secret sharing; color visual cryptography; pixel encoding

Full Text:

PDF

References


1. Naor M, Shamir A. Visual cryptography. Lecture Notes in Computer Science. 1995, 1-12. doi: 10.1007/bfb0053419

2. Ito K, Takahashi Y. An Overview of Visual Cryptography Techniques. Cryptographic Systems Journal, 2020, 44(1), 12–25.

3. Arora A, Garg H, Shivani S. Privacy Protection of Digital Images Using Watermarking and QR Code-based Visual Cryptography. Advances in Multimedia. 2023, 2023: 1-9. doi: 10.1155/2023/6945340

4. Kang I, Arce GR, Lee HK. Color Extended Visual Cryptography Using Error Diffusion. IEEE Transactions on Image Processing. 2011, 20(1): 132-145. doi: 10.1109/tip.2010.2056376

5. Attaullah ST, Jamal SS. An Improved Chaotic Cryptosystem for Image Encryption and Digital Watermarking. Wireless Personal Communications. 2019, 110(3): 1429-1442. doi: 10.1007/s11277-019-06793-1

6. Yang CN, Sun LZ, Cai SR. Extended color visual cryptography for black and white secret image. Theoretical Computer Science. 2016, 609: 143-161. doi: 10.1016/j.tcs.2015.09.016

7. Aswad FM, Salman I, Mostafa SA. An optimization of color halftone visual cryptography scheme based on Bat algorithm. Journal of Intelligent Systems. 2021, 30(1): 816-835. doi: 10.1515/jisys-2021-0042

8. Selva Mary G, Manoj Kumar S. A self-verifiable computational visual cryptographic protocol for secure two-dimensional image communication. Measurement Science and Technology. 2019, 30(12): 125404. doi: 10.1088/1361-6501/ab2faa

9. Ibrahim D, Sihwail R, Arrifin KAZ, et al. A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm. Symmetry. 2023, 15(7): 1305. doi: 10.3390/sym15071305

10. Çiftci E, Sümer E. A novel steganography method for binary and color halftone images. PeerJ Computer Science. 2022, 8: e1062. doi: 10.7717/peerj-cs.1062

11. Selva Mary G, Blesswin AJ, Kumar SM. Self-authentication Model to Prevent Cheating Issues in Grayscale Visual Secret Sharing Schemes. Wireless Personal Communications. 2022, 125(2): 1695-1714. doi: 10.1007/s11277-022-09628-8

12. Rani N, Sharma SR, Mishra V. Grayscale and colored image encryption model using a novel fused magic cube. Nonlinear Dynamics. 2022, 108(2): 1773-1796. doi: 10.1007/s11071-022-07276-y

13. Selva Mary G, Manoj Kumar S. Secure grayscale image communication using significant visual cryptography scheme in real time applications. Multimedia Tools and Applications. 2019, 79(15-16): 10363-10382. doi: 10.1007/s11042-019-7202-7

14. Somwanshi DR, Humbe VT. A Secure and Verifiable Color Visual Cryptography Scheme with LSB Based Image Steganography. International Journal of Advanced Trends in Computer Science and Engineering, 2021, 10(4), 2669–2677.

15. Wang L, Yan B, Yang HM, et al. Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images. Symmetry. 2020, 13(1): 65. doi: 10.3390/sym13010065

16. Wu X, Yang CN. Probabilistic color visual cryptography schemes for black and white secret images. Journal of Visual Communication and Image Representation. 2020, 70: 102793. doi: 10.1016/j.jvcir.2020.102793

17. Blesswin J, Mary S, Suryawanshi S, et al. Secure transmission of grayscale images with triggered error visual sharing. Journal of Autonomous Intelligence. 2023, 6(2): 957. doi: 10.32629/jai.v6i2.957

18. Qi Wang, John Blesswin A, et al. Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885

19. Pan JS, Liu T, Yang HM, et al. Visual cryptography scheme for secret color images with color QR codes. Journal of Visual Communication and Image Representation. 2022, 82: 103405. doi: 10.1016/j.jvcir.2021.103405

20. Salim MZ, Abboud AJ, Yildirim R. A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery. Electronics. 2022, 11(1): 136. doi: 10.3390/electronics11010136

21. Blesswin J, Mary S, Gobinath T, et al. Error-induced inverse pixel visual cryptography for secure QR code communication. Journal of Autonomous Intelligence. 2023, 7(1). doi: 10.32629/jai.v7i1.1129

22. Zhang D, Ren L, Shafiq M, et al. A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing. Computational Intelligence and Neuroscience. 2023, 2023: 1-11. doi: 10.1155/2023/6758406

23. Hodeish ME, Humbe VT. An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion. Multimedia Tools and Applications. 2018, 77(19): 24937-24953. doi: 10.1007/s11042-018-5724-z

24. John Blesswin A, Selva Mary G, Manoj Kumar S. Multiple Secret Image Communication Using Visual Cryptography. Wireless Personal Communications. 2021, 122(4): 3085-3103. doi: 10.1007/s11277-021-09041-7

25. John Blesswin A, Mary S, Gobinath T, et al. Error-induced inverse pixel visual cryptography for secure QR code communication, Journal of Autonomous Intelligence. 2023, 7(1): 1129.

26. Sherine A, Peter G, Stonier AA, et al. CMY Color Spaced-Based Visual Cryptography Scheme for Secret Sharing of Data. Wireless Communications and Mobile Computing. 2022, 1–12.




DOI: https://doi.org/10.32629/jai.v7i3.1159

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Kanchan Patil, Jyotsna Vilas Barpute, Mrudul Arkadi, Sapana Deepak Bhirud, Catherine Esther Karunya A, John Blesswin A, Selva Mary G, Shibani Raju S

License URL: https://creativecommons.org/licenses/by-nc/4.0/