57
Views
1
CrossRef citations to date
0
Altmetric
Computers and Computing

Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography

ORCID Icon &

References

  • R. Roland van Rijswijk-Deij, K. Hageman, A. Sperotto, and A. Pras, “The performance impact of elliptic curve cryptography on DNSSEC validation,” IEEE/ACM Trans. Networking, Vol. 25, no. 2, pp. 738–50, Apr. 2017.
  • N. Gupta, “Image encryption using elliptic curve cryptography,” Int. J. Knowl. Based Comput. Syst., Vol. 5, no. 2, pp. 25–30, Dec. 2017.
  • A. Dua, and A. Dutta, “A study of applications based on elliptic curve cryptography,” in Proceedings of the Third International Conference on Trends in Electronics and Informatics, Tirunelveli, Oct. 2019, pp. 249–54.
  • J. Saturwar, and D. N. Chaudhari, “Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking,” in Second International Conference on Electrical, Computer and Communication Technologies, Coimbatore, Nov. 2017.
  • M. Karolin, T. Meyyappan, and S. M. Thamarai, “Image encryption and decryption of color images using visual cryptography,” Int. J. Pure. Appl. Math., Vol. 118, no. 8, pp. 277–28, Jan. 2018.
  • V. Purushothaman, and S. Sreedhar, “An improved secret using XOR-based visual cryptography sharing,” in Online International Conference on Green Engineering and Technologies, Coimbatore, May 2017, pp. 1–4.
  • P. Diggavi, and R. N. Kulkarni, “Secret image sharing using 2- Pixel visual cryptography encryption,” Int. J. Recent Technol. Eng., Vol. 8, no. 4, pp. 1612–4, Nov. 2019.
  • A. Abd El-Latif, B. Abd-El-Atty, W. Mazurczyk, C. Fung, and S. E. Venegas- Andraca, “Secure data encryption based on quantum walks for 5G internet of things scenario Ahmed,” IEEE Trans. Netw. Serv. Manage., Vol. 17, no. 1, pp. 118–131, Mar. 2020.
  • M. Karolin, and T. Meyyappan, “Secret multiple share creation with color images using visual cryptography,” in International Conference on Communication and Signal Processing, Chennai, Apr. 2019, pp. 0058–0062.
  • N. Tsafack, et al., “A new chaotic map with dynamic analysis and encryption application in Internet of health things,” IEEE Access, Vol. 4, pp. 137731–44, 2016.
  • A. A. Abd EL-Latifa, B. Abd-El-Attya, E. M. Abou-Nassara, and S. E. Venegas-Andracad, “Controlled alternate quantum walks based privacy preserving healthcare images in Internet of things,” Opt. Laser. Technol., Vol. 124, pp. 1–8, Nov. 2019.
  • X. Chai, X. Fu, Z. Gan, Y. Lu, and Y. Chen, “A color image cryptosystem based on dynamic DNA encryption and chaos,” Signal. Process., Vol. 15, pp. 44–62, Feb. 2019.
  • S. Narayan, “A review on elliptic curve cryptography,” Int. J. Emerg. Technol. Innov. Eng., Vol. 4, pp. 1–7, Dec. 2018.
  • N. Mehibel, and M. Hamadouche, “A new enhancement of elliptic curve digital signature algorithm,” J. Discrete Math. Sci. Cryptogr., Vol. 23, pp. 1–16, Jul. 2019.
  • K. E. Abdullah, and N. H. M. Ali, “Security improvement in elliptic curve cryptography,” Int. J. Adv. Comput. Sci. Appl., Vol. 9, no. 5, pp. 122–31, 2018.
  • M. A. Naji, D. A. Hammood, H. A. Atee, R. S. Jebur, H. A. Rahim, and R. Badlishah Ahmad, “Cryptanalysis cipher text using new modeling: Text Encryption using Elliptic Curve Cryptography,” in The 2nd International Conference on Applied Photonics and Electronics, Iraq, 2019, pp. 020003-1–020003-9.
  • M. Karolin, and T. Meyyappan, “Image encryption and decryption using RSA algorithm with share creation techniques,” Int. J. Eng. Adv. Technol., Vol. 9, no. 2, pp. 2797–800, Dec. 2019.
  • C. H. Suneetha, T. Surendra, and C. H. Neelima, “Implementation of double fold text encryption based on elliptic curve cryptography (ECC) with digital signature,” Int. J. Recent Technol. Eng., Vol. 71, pp. 3840–6, Jan. 2020.
  • S. R. Singh, A. K. Khan, and T. S. Singh, “A Critical Review on Elliptic Curve Cryptography,” in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques, Pune, Mar. 2017, pp. 13–8.
  • X. Yan, S. Wang, A. Ahmed, and A. El-Latif, “Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery,” Multimed. Tools. Appl., Vol. 74, pp. 3231–52, 2013.
  • A. Kumar, and A. Kumar, “A cell array based multibiometric cryptosystem,” IEEE. Access., Vol. 4, pp. 15–25, Feb. 28, 2016.
  • M. Karolin, and T. Meyyappan, “Authentic secret share creation techniques using visual cryptography with public key encryption,” Multimed. Tools. Appl., Vol. 22, pp. 32023–40, Jul. 2021.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.