Visual cryptography (VC), an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted images. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data security, entity authentication, and data origin authentication, but it is not the only means of providing information security, rather one of the techniques. VC is a new technique that provides information security which uses simple algorithms unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. Previous methods in the literature show good results for black and white VC schemes, however, they are not sufficient to be applied directly to shares due to different structures. Some methods for color VC are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. Visual secret sharing encrypts a secret message into halftone image shares. This article introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a visual cryptography encryption method that produces meaningful shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.