A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography

A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography

Ram Chandra Barik, Suvamoy Changder, Sitanshu Sekhar Sahu
Copyright: © 2019 |Volume: 6 |Issue: 1 |Pages: 25
ISSN: 2334-4598|EISSN: 2334-4601|EISBN13: 9781522568445|DOI: 10.4018/IJRSDA.2019010102
Cite Article Cite Article

MLA

Barik, Ram Chandra, et al. "A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography." IJRSDA vol.6, no.1 2019: pp.18-42. http://doi.org/10.4018/IJRSDA.2019010102

APA

Barik, R. C., Changder, S., & Sahu, S. S. (2019). A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography. International Journal of Rough Sets and Data Analysis (IJRSDA), 6(1), 18-42. http://doi.org/10.4018/IJRSDA.2019010102

Chicago

Barik, Ram Chandra, Suvamoy Changder, and Sitanshu Sekhar Sahu. "A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography," International Journal of Rough Sets and Data Analysis (IJRSDA) 6, no.1: 18-42. http://doi.org/10.4018/IJRSDA.2019010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mapping of image-based object textures to ASCII characters can be a new modification towards visual cryptography. Naor and Shamir proposed a new dimension of Information security as visual cryptography which is a secret sharing scheme among N number of participants with pixel expansion. Later on, many researchers extended the visual secret sharing scheme with no expansion of pixel regions in binary and color images. By stacking k shares the secret can be decoded using normal vision. In this paper the authors have proposed a modification towards visual cryptography by converting the message in the form of printable ASCII character-based numerical encoding patterns in a binary host image. The encoding of the message is represented as ASCII numeric and a texture of those numeric are arranged to form a binary host image. Then, N numbers of shares are built up but after stacking all the shares the decoding of the message is achieved by converting ASCII numeric to the secret.