An Approach of Visual Cryptography Scheme by Cumulative Image Encryption Technique using Image-key Encryption, Bit-Sieved Operation and K-N Secret Sharing Scheme
Anupam Bhakta1, Sandip Maity2, Ramkrishna Das3, Saurabh Dutta4

1Anupam Bhakta, Department of Computer Science, Vidyasagar University, Paschim Medinipur (West Bengal), India.
2Sandip Maity, Department of Computer Science, Vidyasagar University, Paschim Medinipur (West Bengal), India.
3Ramkrishna Das, Department of Computer Applications, Haldia Institute of Technology, Haldia (West Bengal), India.
4Saurabh Dutta, Department of Computer Applications, B.C. Roy Engineering College, Durgapur (West Bengal), India.
Manuscript received on 11 June 2013 | Revised Manuscript received on 17 June 2013 | Manuscript Published on 30 June 2013 | PP: 20-23 | Volume-3 Issue-1, June 2013 | Retrieval Number: A0877063113/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). It is imperceptible to reveal the secret information unless a certain number of shares (k) or more among n number of shares are superimposed. As the decryption process is done by human visual system, secret information can be retrieved by anyone if the person gets at least k number of shares. For this, simple visual cryptography is very in secure. In this current work we have proposed a method where we done the encryption in several level. First we use a variable length image key to encrypt the original image then bit sieve procedure is used on resultant image and lastly we perform K-N secret sharing scheme on the final encrypted image. Decryption is done in reverse level of encryption that means we do K-N secret sharing scheme, bit sieve method and image key decryption respectively. As multiple levels of encryptions are being used thus the security is being increased in great extant.
Keywords: Bit Sieve Operation, Image Key Encryption, K-N Secret Sharing Scheme, Visual Cryptography.

Scope of the Article: Image Security