z-logo
open-access-imgOpen Access
Design and Implementation of a (2, 2) and a (2, 3) Visual Cryptographic Scheme
Author(s) -
Ujjwal Chakraborty,
Jayanta Kumar Paul,
Priya Ranjan Sinha Mahapatra
Publication year - 2010
Publication title -
international journal of computer and communication technology
Language(s) - English
Resource type - Journals
eISSN - 2231-0371
pISSN - 0975-7449
DOI - 10.47893/ijcct.2010.1047
Subject(s) - pixel , visual cryptography , computer science , image (mathematics) , scheme (mathematics) , dimension (graph theory) , computer vision , artificial intelligence , cryptography , block (permutation group theory) , process (computing) , mathematics , algorithm , secret sharing , mathematical analysis , geometry , pure mathematics , operating system
In this paper two methods for (2, 2) and (2, 3) visual cryptographic scheme(VCS) is proposed. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. As 4 output pixels are generated from 4 input pixels dimension and aspect ratio of the decrypted image remain same during the process. The second scheme considers 2 pixels (1 block) of input image at a time and generates 3 output pixels in each share. Here probability of /3 for black pixel is maintained in each share. The scheme improves the contrast of output image. The dimension of revealed image is increased by 1.5 times in horizontal direction and remains same in vertical direction.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom