“…Lou et al [8] proposed color visual secret sharing scheme which uses non-expanded meaningful shares . They are used to hide a secret image into two meaningful cover images.…”
Section: Using Secret Sharing Mechanism To Secure Imagesmentioning
Cloud computing is a significant model for permitting on-demand network access to shared data, software's, infrastructure, and platform resources. However, cloud storage needs a certain level of availability, confidentiality, and integrity. Information sensitivity and value encourage users to select a highly secure protocol. This work proposes a new mechanism to increase the user trust in cloud computing using the secret sharing technique. The proposed algorithm is using Base64 encoding to convert any file type to ASCII strings. Base64 strings do not need any extra process to be compressed and this can speed up the share building process. Each string is used to produce N shares (using Shamir Secret Sharing Scheme) where each share is stored in a separate location in the cloud.
“…Lou et al [8] proposed color visual secret sharing scheme which uses non-expanded meaningful shares . They are used to hide a secret image into two meaningful cover images.…”
Section: Using Secret Sharing Mechanism To Secure Imagesmentioning
Cloud computing is a significant model for permitting on-demand network access to shared data, software's, infrastructure, and platform resources. However, cloud storage needs a certain level of availability, confidentiality, and integrity. Information sensitivity and value encourage users to select a highly secure protocol. This work proposes a new mechanism to increase the user trust in cloud computing using the secret sharing technique. The proposed algorithm is using Base64 encoding to convert any file type to ASCII strings. Base64 strings do not need any extra process to be compressed and this can speed up the share building process. Each string is used to produce N shares (using Shamir Secret Sharing Scheme) where each share is stored in a separate location in the cloud.
“…This does not require any complex computation. This scheme is also used for sharing color image securely [7] Alex et al presented different methods for error diffusion in order to enhance the quality of image in the halftone shares. The halftoning VC is used to introduce the pixels of secret information into an uncoded halftone shares that existed before.…”
Secret sharing is of great importance for sharing secret or confidential information. This information can be in the form of documents, images, photographs and many more. Most of the previous visual secret sharing scheme uses shares to conceal secret images. The shares may be printed or in digital form. When the secret image is hidden into the shares, noiselike pixel appears which increase the risk of transmission. Attackers look at image having noise-like pixels with suspicion and try to intercept the image. Thus image having noise is not safe for transmission over network. Due to this transmission risk is involved in visual secret sharing. In order to overcome such problems some authors have presented another scheme known as Natural image based Visual Secret Sharing Scheme (NVSS Scheme). In this scheme the transmission of secret image occurs through different media in order to protect the secret. The n out of n NVSS scheme can transmit a digital secret image by randomly choosing n-1 natural images and one noise share. Natural images may be in digital or printed form. Noise-like share is produced by natural image and printed image. The natural shares which are unaltered minimize the risk associated during transmission.
“…Distracting the attention of observers from the fact that secret information is transmitted increases the security of the transmission process. Randomness of the data stream goes in a similar direction as making it seemingly contain unimportant information, as in the case of visual cryptography where the shares appear to contain some irrelevant images [19,27], or in the coding of audio signals which mimic the sounds emitted by animals [28].…”
The concept of black-and-white visual cryptography with two truly random shares, previously applied to color images, was improved by mixing the contents of the segments of each coding image and by randomly changing a specified number of black pixels into color ones. This was done in such a way that the changes of the contents of the decoded image were as small as possible. These modifications made the numbers of color pixels in the shares close to balanced, which potentially made it possible for the shares to be truly random. The true randomness was understood as that the data pass the suitably designed randomness tests. The randomness of the shares was tested with the NIST randomness tests. Part of the tests passed successfully, while some failed. The target of coding a color image in truly random shares was approached, but not yet reached. In visual cryptography, the decoding with the unarmed human eye is of primary importance, but besides this, simple numerical processing of the decoded image makes it possible to greatly improve the quality of the reconstructed image, so that it becomes close to that of the dithered original image.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.