A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images
Main Article Content
Abstract
Visual encryption technology becomes the latest research area in which a lot of scopes persist. Presently such a particular cryptosystem procedure is now used by numerous other countries around the world for the private transmission of formal records, financial documents, content visuals, digital voting, and so on. Visualization Cryptographic algorithms one of the protected methods of transferring pictures online. The main benefit of image encryption has been that it disguises peripheral vision with encrypt data secret data with no computation usually needed. In this work a hybrid visual cryptography method using a sigmoid function (HVMSF) for enhancing the security in gray images. HVMSF strategy utilizes a chaos framework to scramble pixel values as well as blocks while using the Modified Arnold Cat Map method (MACM) as well as the Henon Map method (HMM). The methodology includes a confusion procedure wherein the location of each image pixel is shuffled by utilizing MACM. The shuffling of image pixel leads to the creation of a subset pixel which will be protected for transmitting. This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images. The experimental outcomes precisely show that the suggested strategy can further give additional effectiveness to ensure the protection of transmitting information out over previous techniques.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
X. Yan, F. Liu, W. Q. Yan, G. Yang, and Y. Lu, ‘Weighted visual cryptographic scheme with improved image quality, Multimed. Tools Appl., vol. 79, no. 29–30, pp. 21345–21360, 2020. [CrossRef]
P. Anghelescu, I.-M. Ionescu, and M. B. Bodea, ‘Design and implementation of a visual cryptography application’, in 2020 12th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2020. [CrossRef]
X. Yan, F. Liu, W. Q. Yan, and Y. Lu, ‘Applying visual cryptography to enhance text captchas’, Mathematics, vol. 8, no. 3, p. 332, 2020. [CrossRef]
Y.-W. Ti, S.-K. Chen, and W.-C. Wu, ‘A new visual cryptography-based QR code system for medication administration’, Mob. Inf. Syst., vol. 2020, pp. 1–10, 2020. [CrossRef]
R. Maurya, A. K. Kannojiya, and B. Rajitha, ‘An extended visual cryptography technique for medical image security, in 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), 2020. [CrossRef]
Kumar and A. Jain, ‘A review on various implemented techniques for visual cryptography’, Int. J. Comput. Appl., vol. 155, no. 5, pp. 27–32, 2016. [CrossRef]
S. Dutta, A. Adhikari, and S. Ruj, ‘Maximal contrast color visual secret sharing schemes, Des. Codes Cryptogr., vol. 87, no. 7, pp. 1699–1711, 2019. [CrossRef]
Y. Wang, Y. Li, and X.-N. Lu, ‘Evaluation criteria for visual cryptography schemes via neural networks, in 2020 International Conference on Cyberworlds (CW), 2020. [CrossRef]
M. Melkemi and K. Hammoudi, ‘Voronoi-based image representation applied to binary visual cryptography’, Signal Process. Image Commun., vol. 87, no. 115913, p. 115913, 2020. [CrossRef]
Adhikari, ‘Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images’, Des. Codes Cryptogr., vol. 73, no. 3, pp. 865–895, 2014. [CrossRef]
H. Koga and T. Ishihara, ‘A general method for construction of (t, n)-threshold visual secret sharing schemes for color images’, Des. Codes Cryptogr., vol. 61, no. 2, pp. 223–249, 2011. [CrossRef]
S. Kukreja, G. Kasana, and S. S. Kasana, ‘Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors’, Vis. Comput., 2020. [CrossRef]
P. Li, J. Ma, and Q. Ma, ‘(t, k, n) XOR-based visual cryptography scheme with essential shadows’, J. Vis. Commun. Image Represent., vol. 72, no. 102911, p. 102911, 2020. [CrossRef]
X. Wu and C.-N. Yang, ‘Probabilistic color visual cryptography schemes for black and white secret images’, J. Vis. Commun. Image Represent., vol. 70, no. 102793, p. 102793, 2020. [CrossRef]
K. Gupta, S. K. Sadana, and B. Gupta, ‘Geospatial data preprocessing and visualization for the logistics industry’, J. Discrete Math. Sci. Cryptogr., vol. 23, no. 1, pp. 57–64, 2020. [CrossRef]
M. E. VizcarraMelgar and M. C. Q. Farias, ‘A (2,2) XOR-based visual cryptography scheme without pixel expansion’, J. Vis. Commun. Image Represent., vol. 63, no. 102592, p. 102592, 2019. [CrossRef]
X. Wu, D. Chen, C.-N. Yang, and Y.-Y. Yang, ‘A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image’, J. Vis. Commun. Image Represent., vol. 59, pp. 550–562, 2019. [CrossRef]
C.-N. Yang, F.-H. Wu, and S.-L. Peng, ‘Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph’, J. Vis. Commun. Image Represent. vol. 55, pp. 660–676, 2018. [CrossRef]
S. Sridhar and G. F. Sudha, ‘Two in One Image Secret Sharing Scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations’, J. Vis. Commun. Image Represent., vol. 74, no. 102996, p. 102996, 2021. [CrossRef]
X. Wu and C.-N. Yang, ‘A combination of color-black-and-white visual cryptography and polynomial based secret image sharing’, J. Vis. Commun. Image Represent., vol. 61, pp. 74–84, 2019. [CrossRef]
N. Ren, L. Fan, and Z. Zhang, ‘Sensorless PMSM control with sliding mode observer-based on sigmoid function’, J. Electr. Eng. Technol., 2021.
Y. Zhang, X. Luo, J. Wang, Y. Guo, and F. Liu, ‘Image robust adaptive steganography adapted to lossy channels in open social networks’, Inf. Sci. (NY), vol. 564, pp. 306–326, 2021. [CrossRef]
L. Zhu, X. Luo, C. Yang, Y. Zhang, and F. Liu, ‘Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography’, Signal Processing, vol. 183, no. 108015, p. 108015, 2021. [CrossRef]
T. Qiao, S. Wang, X. Luo, and Z. Zhu, ‘Robust steganography resisting JPEG compression by improving the selection of cover element’, Signal Processing, vol. 183, no. 108048, p. 108048, 2021. [CrossRef]
K. Sahu, G. Swain, M. Sahu, and J. Hemalatha, ‘Multi-directional block-based PVD and modulus function image steganography to avoid FOBP and IEP’, J. Inf. Security. Appl., vol. 58, no. 102808, p. 102808, 2021. [CrossRef]
G. Gambhir and J. K. Mandal, ‘Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map’, Innov. Syst. Softw. Eng., 2021. [CrossRef]
S. Dash, Kalinga Institute of Industrial Technology, M. Das, D. Behera, Kalinga Institute of Industrial Technology, and Silicon Institute of Technology, ‘An improved dual steganography model using multi-pass encryption and quotient value differencing’, Int. j. intell. eng. syst., vol. 14, no. 2, pp. 262–270, 2021. [CrossRef]