DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption

Authors

  • Ponnarasi S Department of Computer Science, Government Arts and Science College, Kangeyam- 638108, India
  • Rajendran T Department of Computer Science, Government Arts and Science College, Kangeyam- 638108, India

Keywords:

Secret shares, Halftone pictures, Visual cryptography, VCS, Watermarking, DHCED and DHCOD

Abstract

Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such some way that the decipherment will be performed by human, with none decipherment algorithmic rule. Here we have a tendency to propose a knowledge activity in halftone pictures victimisation conjugate ordered video digitizing (DHCOD) algorithmic rule that could be a changed version of information activity in halftone pictures victimisation conjugate error diffusion technique (DHCED). We have a tendency to use this DHOCD algorithmic rule for proposing a brand new 3 part visual cryptography theme. DHCOD technique is employed to cover Associate in Nursing binary visual pattern in 2 or additional ordered dither halftone pictures, which may be from identical or completely different multi-tone pictures. In projected theme we have a tendency to shall generate the shares victimisation basic visual cryptography model so imbed them into a canopy image employing a DHCOD technique, so the shares are going to be safer and pregnant

References

[1] M.Naor and A. Shamir “Visual cryptography”. Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12, 1995.

[2] Ming Sun Fu and Oscar C. Au “Data hiding in halftone images by conjugate error diffusion” D-7803-7761-3/03 © 2003 IEEE.

[3] Ming Sun Fu and Oscar C. Au “Joint Visual cryptography and watermarking”. 0-7803-8603-5/04 © 2004 IEEE.

[4] Zhongmin Wang and Gonzalo R. Arce “Halftone visual cryptography through error diffusion” ISBN 1-4244-0481- 9/06 © 2006 IEEE, pp.109-112.

[5] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo “Halftone Visual Cryptography” 0-7803-7750-8/03 © 2003 IEEE,

[6] Notes “Digital Image Processing Laboratory: Image Halftoning” April 30, 2006. Purdue University.

[7] Lingo Fang and Bin Yu “Research on pixel expansion of (2,n) Visual threshold scheme” 2006 1st International Symposium on Pervasive Computing and Applications.

[8] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106

Downloads

Published

2025-11-18

How to Cite

[1]
S. Ponnarasi and T. Rajendran, “DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 23–27, Nov. 2025.