Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/468618
Title: Investigations on secret sharing strategies for image communications using visual cryptography
Researcher: Selva Mary, G
Guide(s): Manoj Kumar, S
Keywords: Engineering and Technology
Computer Science
Computer Science Software Engineering
Image communication
Meaningful shares
Visual Cryptography
University: Anna University
Completed Date: 2021
Abstract: The exposure of Internet has increased the commercial and personal transactions by facilitating communication easier. Sensitive information such as, Personal Identifiable Information (PII), Payment Card Industry (PCI) information and Protected Health Information (PHI) are shared among people as an image file format. The privacy and security of such information is the most imperative constraint while communicating from server to server across the Internet. With the rise in activity of cyber criminals who intercept the sensitive information, it is important to protect it against security breaches, identity theft, and financial frauds. Visual Cryptography (VC) is an efficient encryption scheme used to encrypt a confidential sensitive image into number of shares and transmit the same to the participants. At the destination, the shares are stacked together to reconstruct the confidential image. Individual shares do not expose any data. VC schemes are applied to binary images, grayscale images and color images. In this research work, two new VC schemes namely; (a) Significant Visual Cryptography (SVC), (b) Self-verifiable Computational Visual Cryptography (SCVC) are designed and developed. To support the proposed SVC, a new technique named Error Abatement Technique (EAT) is also developed to generate significant image. The proposed VC schemes support grayscale secret images. The proposed SVC supports SVC, and SVC. This research work intended towards; (a) secure communication of secret image (b) improved quality of the reconstructed secret image (c) no pixel expansion issues (d) minimal computational cost (e) self-verification of the reconstructed secret image to authenticate its integrity. newline
Pagination: xiv,120p
URI: http://hdl.handle.net/10603/468618
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.09 kBAdobe PDFView/Open
02_prelim pages.pdf2.63 MBAdobe PDFView/Open
03_content.pdf537.45 kBAdobe PDFView/Open
04_abstract.pdf182.52 kBAdobe PDFView/Open
05_chapter 1.pdf460.12 kBAdobe PDFView/Open
06_chapter 2.pdf1.15 MBAdobe PDFView/Open
07_chapter 3.pdf401.88 kBAdobe PDFView/Open
08_chapter 4.pdf1.37 MBAdobe PDFView/Open
09_chapter 5.pdf3.3 MBAdobe PDFView/Open
10_annexures.pdf124.21 kBAdobe PDFView/Open
80_recommendation.pdf73.3 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: