DHCED and DHCOD Technique of Visual Cryptography Scheme for Encrypted and Decryption
Keywords:
Secret shares, Halftone pictures, Visual cryptography, VCS, Watermarking, DHCED and DHCODAbstract
Visual Cryptography is a new cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such some way that the decipherment will be performed by human, with none decipherment algorithmic rule. Here we have a tendency to propose a knowledge activity in halftone pictures victimisation conjugate ordered video digitizing (DHCOD) algorithmic rule that could be a changed version of information activity in halftone pictures victimisation conjugate error diffusion technique (DHCED). We have a tendency to use this DHOCD algorithmic rule for proposing a brand new 3 part visual cryptography theme. DHCOD technique is employed to cover Associate in Nursing binary visual pattern in 2 or additional ordered dither halftone pictures, which may be from identical or completely different multi-tone pictures. In projected theme we have a tendency to shall generate the shares victimisation basic visual cryptography model so imbed them into a canopy image employing a DHCOD technique, so the shares are going to be safer and pregnant
References
[1] M.Naor and A. Shamir “Visual cryptography”. Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12, 1995.
[2] Ming Sun Fu and Oscar C. Au “Data hiding in halftone images by conjugate error diffusion” D-7803-7761-3/03 © 2003 IEEE.
[3] Ming Sun Fu and Oscar C. Au “Joint Visual cryptography and watermarking”. 0-7803-8603-5/04 © 2004 IEEE.
[4] Zhongmin Wang and Gonzalo R. Arce “Halftone visual cryptography through error diffusion” ISBN 1-4244-0481- 9/06 © 2006 IEEE, pp.109-112.
[5] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo “Halftone Visual Cryptography” 0-7803-7750-8/03 © 2003 IEEE,
[6] Notes “Digital Image Processing Laboratory: Image Halftoning” April 30, 2006. Purdue University.
[7] Lingo Fang and Bin Yu “Research on pixel expansion of (2,n) Visual threshold scheme” 2006 1st International Symposium on Pervasive Computing and Applications.
[8] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
