Title :
Effective recovery technique for halftone images in Visual Cryptography
Author :
Blesswin, John ; Rema ; Joselin, Jenifer
Author_Institution :
Dept. of Comput. Sci. & Eng., Karunya Univ., Coimbatore, India
Abstract :
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the thousands of images collected by the satellite which are stored in image library and sent to Google for use on Google Earth and Google maps. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generate shadows by visual cryptography algorithms. An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party(TTP).
Keywords :
cryptography; geophysical image processing; image coding; image reconstruction; Google Earth; Google maps; Rehash technique; binary logo; error correction-coding scheme; halftone image recovery technique; human visual system; image library; image reconstruction; image selfverification scheme; information security; trusted third party; visual cryptography technique; Color; Cryptography; Gray-scale; Image reconstruction; Pixel; Reliability; Visualization; Contrast; Halftoning; Pixels; Rehashing technique; Shares; Verifying shares; Visual Secret sharing; stacking;
Conference_Titel :
Recent Advances in Space Technology Services and Climate Change (RSTSCC), 2010
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-9184-1
DOI :
10.1109/RSTSCC.2010.5712808