Multiple Image Encryption using Random Circular Grids and Recursive Image Hiding
نویسندگان
چکیده
The visual secret sharing (VSS) scheme encrypts the secret information into various meaningless shares. These shares are distributed to the authorized participants and the secret information can be retrieved by any k out of n participants by stacking their respective shares on top of each other. This scheme uses HVS (Human Visual System) to decrypt the information, and thus no technical or financial investment is required. Moreover, it is a one-time pad technique, so decrypting the information by an attacker is almost impossible. This paper proposes an improved visual secret sharing technique in which we aim to build upon the random grid approach of visual cryptography and test the feasibility of Recursive Image Hiding to hide multiple secrets at varying levels of the grids generated. Since we are using circular random grids, it is even possible to hide multiple images in the same grids and obtain the secret images for different angles of rotation of the grids. The participants need to be in possession of both the shares, as well as the fixes angle of rotation for which the secret can be obtained, in order to decrypt the image. In case of recursive image hiding, numerous secrets are hidden recursively in the shares of the original images at each level. Shares carry information for the subsequent secrets as well, thus leading to increased capacity. Also, the limitation on the number of secrets that can be hidden can be overcome because for each grid, multiple secrets can be recursively hidden. Thus, not only will we be able to hide multiple images, but multiple grids as well which in turn carry the information for multiple images. General Terms Visual cryptography, visual secret sharing scheme
منابع مشابه
رمزنگاری تصاویر با استفاده از اتوماتای سلولی برگشت پذیر
In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the ...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملRecursive Information Hiding of Secrets by Random Grids
This article presents the method of recursive information hiding of secret images by random grids, which hides the additional secret information in the shares of the larger secret in a recursive manner. The proposed method increases the information conveyed per bit of the shares to nearly 100 percent, and has the size of each share the same as that of the original secret image without any expan...
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملReversible Data Hiding in Images using Circular Hough Transform
Recently reversible data hiding (RDH) is getting more and more attention in encrypted images, as it maintains the excellent property that the original image cover can be losslessly recovered after the embedded data is extracted while image and data are protected and are confidential.This paper presents a method for reversible data hiding using circular hough transformation(CHT). CHT detects the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014