A Survey on XOR Based Visual Cryptography and LSB Method for Secured Communication

International Journal of Research and Scientific Innovation (IJRSI) | Volume VI, Issue I, January 2019 | ISSN 2321–2705

A Survey on XOR Based Visual Cryptography and LSB Method for Secured Communication

K.Saranya1, K.Saravanan2

M.E. Student1, Assistant Professor2,
Department of Computer Science and Engineering, JJ College of Engineering and Technology, Trichy, Tamil Nadu, India

Abstract:- Visual cryptography (VC) is used to split an image into two random shares. When they are separately viewed reveals no information about the secret image but can be obtained by super imposing the two shares. k out of n visual cryptography scheme is used to encrypt a single image into n shares. The image can be decoded by using only k or more shares. Many existing visual cryptographic methods uses binary images which doesn’t suits well for many applications. Proposed a model to establish communication between the sender and the receiver. A text is hidden inside the image using LSB method. XOR based multi secret sharing is used to send images from the source to the destination in a secured way. n out of n multi secret sharing scheme is proposed. Transmission of multiple secret shares simultaneously is possible. The secret image can be revealed only when all the n shares are received by the receiver and decrypted.

Keywords- Visual Cryptography (VC), random key generator, XOR-encryption

I. INTRODUCTION

Cryptographic technique is the type of Visual cryptography which permits visual information to be encrypted in such some way that cryptography becomes a mechanical operation that computer is not needed. United Nations agency developed one of the known techniques by Moni Naor and Adi Shamir in 1994. A visible secret sharing scheme, which incontrovertible a image is divided into n shares in order that solely an important person with all n shares might decode the image, while any n − 1 shares unconcealed no information regarding the initial image. Once all n shares were overlaid, the initial image would seem. The square measures will generalizations the fundamental theme as well as k-out-of-n visual cryptography.

Much confidential information like military maps and business identification square measure are transmitted through the web. Whereas victimization secure pictures, problems in security is been taken into thought. As a result, hackers might utilize less secure link over communication network to capture the information. Schemes are developed to deal with the protection issues of secret pictures, numerous image secret sharing.

Related Post