IMPLEMENTATION OF VISUAL CRYPTOGRAPHY TECHNIQUE ON SQUARE BW SECRET IMAGES

  • Stephanie I. Pella(1*)
    Universitas Nusa Cendana
  • M. J. Pella(2)
    Universitas Nusa Cendana
  • (*) Corresponding Author
Keywords: Visual Cryptography, Computer Security, Secret Sharing, BW Image.

Abstract

The advance of computer security technology has led to the invention of many cryptography algorithms. Visual Cryptography is a cryptography technique that needs no cryptographic computation in decoding. To encode a secret image, the image is encrypted to several transparent shares. In order to retrieve the secret image shares are stacked on top of each other. This paper describes a technical implementation of this algorithm on a square black and white image for VC2,2 Scheme and VC3,3 Scheme. The result shows that the model works well with an image that contains text.

Downloads

Download data is not yet available.

Author Biographies

Stephanie I. Pella, Universitas Nusa Cendana

Electrical Engineering Department, Faculty of Science and Engineering, University of Nusa Cendana

M. J. Pella, Universitas Nusa Cendana

Mathematics Department, Faculty of Science and Engineering, University of Nusa Cendana

References

William Stalling. 2011 Network Security Essential: Application and Standards, Prentice Hall.

M. Naor and A. Shamir. 1994. Visual Cryptography. in Proc. Advances in Cryptology. vol. 950, LNCS, pp. 1-12.

G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. 1996. Visual Cryptography for General Access Structures. Inf. Comput. vol. 129, no. 2, pp. 86-106.

C.-N. Yang and C.-S. Laih. 1999. Some New Types of Visual Secret Sharing Schemes. in Proc. Nat. Computer Symp. vol. 3, pp. 260-268.

W.-G. Tzeng and C.-M. Hu. 2002. A New Approach for Visual Cryptography. Design, Codes and Cryptography. 27,207-227

PlumX Metrics

Published
2012-04-01
How to Cite
[1]
S. Pella and M. J. Pella, “IMPLEMENTATION OF VISUAL CRYPTOGRAPHY TECHNIQUE ON SQUARE BW SECRET IMAGES”, JME, vol. 1, no. 1, pp. 7 - 12, Apr. 2012.
Section
Articles