Abstract
In Cryptography the covert image share creation method and multiple image encryption and decryption are used with different algorithms. In this work, Visual Cryptography (VC) is used for the outline of shares that have been generated from the novel image. Red, Green, and Blue pixel shares are one by one formed by the Visual Secret Sharing (VSS) Scheme. It proposed the ECC method for image encryption and decryption using Rubik’s cube image encryption algorithm. The encryption method is by a public key cryptography generator and the decryption method is done by the secret key arbitrarily generators of the ECC method. For humanizing, the performance analysis of Elliptic Curve Cryptography methods, such as the optimization techniques, was used for PSNR, MSE, and the Number of Pixel Changing Rate (NPCR) and (UACI). The outcome explains that the planned algorithm is improved over various other methods compared to the presented methods. The future technique is implemented with Matlab coding.
Disclosure statement
No potential conflict of interest was reported by the authors.
Additional information
Notes on contributors
M. Karolin
M Karolin is currently pursuing PhD in the Department of Computer Science at Alagappa University, Karaikudi, Tamilnadu (India). Previously she obtained MSc and MPhil degrees in computer science from Alagappa University. She is publishing research articles different topics related to image security. She is an expert in the area of visual cryptography, network security, and image processing.
T. Meyyappan
T Meyyappan MSc, MPhil, MBA, PhD, currently professor, Department of Computer Science, Alagappa University, Karaikudi, Tamilnadu, India. He obtained his PhD in computer science in January 2011 and published several research papers in national and international journals and conferences. He has been honored with the Best Citizens of India Award 2012 by the International Publishing House, New Delhi. He developed Software packages for examination, admission processing, and the official website of Alagappa University. His research areas include operational research, digital image processing, fault tolerant computing, network security and data mining. Email: [email protected]