Secret Image Sharing using Visual Cryptography Shares with Acknowledgement
Chandra Sekhar Sanaboina1, Srinivasa Rao Odugu2, Girish Vanamadi3

1Chandra Sekhar Sanaboina, Department of Computer Science and Engineering from JNTU-K, Kakinada. 
2Srinivasa Rao Odugu, Department of Computer Science and Engineering from JNTU-K, Kakinada.
3Girish Vanamadi, Department of Computer Science and Engineering from JNTU-K, Kakinada.
Manuscript received on 21 August 2019. | Revised Manuscript received on 02 September 2019. | Manuscript published on 30 September 2019. | PP: 3474-3481 | Volume-8 Issue-11, September 2019. | Retrieval Number: K25620981119/2019©BEIESP | DOI: 10.35940/ijitee.K2562.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Visual Cryptography is an encryption technique in which the secret image is encoded and divided into n meaningless images called shares. The shares look like black and white dots embedded randomly in an image. These shares don’t reveal any information about the original image. Every share was printed on transparent paper and decrypted through the superimposition of shares without any computer decryption algorithm. When all n shares were overlapped, the original picture would appear. A (k, n)-threshold visual cryptography is a technique in which n is the maximum number of shares that are to be generated and k is the minimum number of shares that are required to decrypt the original image. If the insufficient number of shares, which are less than the k value is given to the decryption function, the decryption function will generate the output, which doesn’t reveal any clue to the original image. This paper presents how the Entropy, Mean Square Error (MSE), Peak Signal Noise Ratio (PSNR) values varies with respect to given same image of different sizes.
Keywords: Shares, visual cryptography, visual secret sharing
Scope of the Article: Cryptography and Applied Mathematics.