Skip to main content
Log in

Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the modern years, multimedia security has become a prime agenda for secure transmission over unsecured channels due to the increase in digitalization of media. Cryptography is one of the techniques, which can be used for security of exchanged data. The visual cryptographic scheme generates numerous unreasonable shares of the image with specific information. The secret information hidden in the image can be retrieved by accumulating all the shares. The basic idea behind this cryptographic scheme is the encryption of image which hides the secret into m several image shares. By this process, it turns to be complex for the hackers to retrieve the original data of the image. Furthermore, to increase the confidentiality and privacy of the original image, there is in demand to make use of the efficient encryption algorithm. According to this, a new image encryption and decryption is developed using diffusion method with a combination of chaotic maps. Overall, the proposed visual cryptographic method is divided into three phases namely, i) Separation of color bands, ii) Generation of several shares and iii) Encryption & Decryption. Firstly, the color image is divided into three bands (R, G and B) and then various shares of the image are generated based on the pixel measures. After that, the encryption and decryption are done by using diffusion process associated with chaotic map. Experimental results of various analysis and computer simulation confirm that the new algorithm offers high security and is suitable for practical image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106

    Article  MathSciNet  MATH  Google Scholar 

  2. Ateniese G, Blundo C, Santis AD, Stinson DR Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161

  3. Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. Journal of King Saud University-Computer and Information Sciences

  4. Barik RC, Changder S, Sahu SS (2017) Image Texture-Based New Cryptography Scheme Using Advanced Encryption Standard. Computational Intelligence in Data Mining, Springer, Singapore, pp 449–458

    Google Scholar 

  5. Chang C, Tsai C, Chen T (2000) A new scheme for sharing secret color images in computer network. International Conference on Parallel and Distributed Systems, pp. 21–27

  6. Chang C-C, Yu T-X (2002) Sharing a secret gray image in multiple images. Proceedings of the First International Symposium on Cyber Worlds (CW.02)

  7. Chavan PV, Atique M (2012) Design of hierarchical visual cryptography. International Conference on Engineering

  8. Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. J Opt Commun 14(8):552–560

    Google Scholar 

  9. Chen L, Zhao D (2009) Color image encoding in dual fractional Fourier-wavelet domain with random phases. J Opt Commun 282:3433–3438

    Article  Google Scholar 

  10. Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647–658

    Article  Google Scholar 

  11. Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, MHS 1995, pp. 39–43. IEEE, New York

  12. Fang W, Lin J (2006) Progressive viewing and sharing of sensitive images. Pattern Recognition and Image Analysis 16(4):632–636

    Article  MathSciNet  Google Scholar 

  13. Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Secur 78:pp.301–320

  14. Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. Journal of Information Security and Applications 35:119–127

    Article  Google Scholar 

  15. Hou YC, Wei SC, Lin CY (2014) Random-grid-based visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 24(5):733–744

    Article  Google Scholar 

  16. Kalai Selvi R, Kavitha V (2012) Crypto System based Authentication using CSTA in Grid. Int J Comput Appl 48(22)

  17. Kamath M, Parab A, Salyankar A, Dholay S (2012) Extended Visual Cryptography for Color Images Using Coding Tables. International Conference on Communication, Information & Computing Technology (ICCICT), pp. 19–20

  18. Khoirom MS, Laiphrakpam DS, Themrichon T (2018) Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik 168:370–375

    Article  Google Scholar 

  19. Kumar S, Kumar M, Budhiraja R, Das MK, Singh S (2018) A cryptographic model for better information security. Journal of Information Security and Applications 43:123–138

    Article  Google Scholar 

  20. Liu Z, Dai J, Sun X, Liu S (2010) Color image encryption by using the rotation of color vector in Hartley transform domains. Journal on Optical Lasers 48(5)

  21. Liu S, Fujiyoshi M, Kiya H (2011) A Leakage Suppressed Two-level Security Visual Secret Sharing Scheme, Journal on Intelligent Signal Processing and Communication Systems (ISPACS), pp. 7–9

  22. Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik’s cube principle. J Electr Comput Eng:1–14

  23. Lukac R, Plataniotis KN (2004) Colour image secret sharing. IEEE Electronics Letters 40(9)

  24. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf Optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  25. Mohanty M, Gehrmann C, Atrey PK (2014) Avoiding Weak Parameters in Secret Image Sharing. IEEE

  26. Naor M, Shamir A (1995) Visual cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 1–12

  27. Nautiyal I, Sharma M (2014) Encryption using elliptic curve cryptography using java as implementation tool. J Adv Res Comput Sci Softw Eng 4(1):620–625

    Google Scholar 

  28. Padma B, Chandravathi D, Prapoorna Roja P (2010) Encoding and decoding of a message in the Implementation of elliptic curve cryptography using Koblitz’s method. Int J Comput Sci Eng 2(5):1904–1907

    Google Scholar 

  29. Pandey LN, Shukla N (2013) Visual Cryptography Schemes using Compressed Random Shares. Journal of Advance Research in Computer Science and Management Studies 1(4):62–66

    Google Scholar 

  30. Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudo-random permutation substitution scheme for image encryption. Opt Commun 284:4331–4339

    Article  Google Scholar 

  31. Popescu C (2011) A secure e-cash transfer system based on the elliptic curve discrete logarithm problem. Journal on Informatica 3(22):395–409

    MathSciNet  MATH  Google Scholar 

  32. Rijmen V, Preneel B (1996) Efficient color visual encryption for shared colors of Benetton, Eurocrypto’96. Rump Session, Berlin

    Google Scholar 

  33. Roy PK, Mandal D (2013) Oppositional biogeography-based optimization for optimal power flow. Int J Electr Power Energy Syst 53:123–134

    Article  Google Scholar 

  34. Roy PK, Paul C, Sultana S (2014) Oppositional teaching learning based optimization approach for combined heat and power dispatch. Int J Electr Power Energy Syst 57:392–403

    Article  Google Scholar 

  35. Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12–21

    Article  Google Scholar 

  36. Singh P, Raman B, Misra M (2017) A (n, n) Threshold Non-expansible XOR based Visual Cryptography with Unique Meaningful Shares. Signal Processing

  37. Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image Encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137–140

    Google Scholar 

  38. Soni A, Agrawal S (2012) Using genetic algorithm for symmetric key generation in image encryption. Int J Adv Res Comput Eng Technol (IJARCET) 1(10):137–140

    Google Scholar 

  39. Srinivas M, Patnaik LM (1994) Genetic algorithms: a survey. Computer (Long Beach Calif) 27(17–26)

  40. Sujatha K, Shalini Punithavathani D (2018). Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks. Multimed Tools Appl 77(2):1735–1759

  41. Sundararaj V, (2016) An Efficient Threshold Prediction Scheme for Wavelet Based ECG Signal Noise Reduction Using Variable Step Size Firefly Algorithm. International Journal of Intelligent Engineering and Systems 9(3):117–126

  42. Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

  43. Vinu Sundararaj, (2019) Optimal task assignment in mobile cloud computing by queue based Ant-Bee algorithm. Wireless Personal Communications 104(1):173–197

  44. Tao R, Xiang-Yi M, Wang Y (2010) Image encryption with multi orders of fractional Fourier transforms. IEEE Trans Inf Forensics Security 5:734–738

  45. Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34

    Article  MathSciNet  MATH  Google Scholar 

  46. USC-SIPI Image Database. http://sipi.usc.edu/database/database.php

  47. Vinod Kumar Y, Malviya AK, Gupta DL, Satyendra S, Ganesh C (2012) Public key cryptosystem Technique for elliptic curve cryptography with generator g for image encryption. Int J Comput Appl 3(3):298–302

    Google Scholar 

  48. Wang S, Gu K, Ma S, Lin W, Liu X, Gao W Guided image contrast enhancement based on retrieved images in cloud. IEEE Transactions on Multimedia 18(2):219–232

  49. Wu X, Ou D, Dai L, Sun W (2013) XOR-based meaningful visual secret sharing by generalized random grids. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security

  50. Yang X-S (2010b) A new metaheuristic bat-inspired algorithm. In: González JR, Pelta DA, Cruz C, Terrazas G, Krasnogor N (eds) Nature inspired cooperative strategies for optimization (NICSO 2010). Springer Berlin Heidelberg, Berlin, pp 65–74

    Chapter  Google Scholar 

  51. Yi K, Leihong Z, Dawei Z (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64

    Article  Google Scholar 

  52. You X, Li Q, Tao D et al (2014) Local metric learning for exemplar-based object detection. IEEE Transactions on Circuits and Systems for Video Technology 24(8):1265–1276

    Article  Google Scholar 

  53. Youmaran R, Adler A, Miri A (2006) An Improved Visual Cryptography Scheme For Secret Hiding. J Commun:340–343

  54. Zhu Z et al (2015) An adaptive hybrid pattern for noise-robust texture analysis. Pattern Recogn 48(8):2592–2608

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Geetha.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Geetha, P., Jayanthi, V.S. & Jayanthi, A.N. Multiple share creation based visual cryptographic scheme using diffusion method with a combination of chaotic maps for multimedia applications. Multimed Tools Appl 78, 18503–18530 (2019). https://doi.org/10.1007/s11042-019-7163-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7163-x

Keywords

Navigation