Primary Color Based Numerous Image Creation in Visual Cryptography with the Help of Grasshopper Algorithm, Artificial Neural Network and Elliptic Curve Cryptography
- 1 Department of Computer Science and Engineering, Brainware University, India
- 2 Department of Computer Application, Eminent College of Management and Technology, India
Abstract
The two primary restrictions of visual cryptography methods, contract, and security are well-known. Visual cryptography is considered secure if no share reveals information about the secure picture and this image is unreachable when shares are combined. Recursion can be used in a visual cryptography method to ensure the integrity of both arguments. Sometimes, the many shares are generated illogically in such a manner that they sometimes reveal the actual image. The model proposed in the paper has been proved beneficial in reducing the computation, noise, or distortion in the recreated image and helps in providing amended contracts. The suggested scheme uses unique pixel patterns to create a contract for the decrypted image. The contract for the recursion visual cryptography scheme is alterable from the white pixel pattern to new pixel patterns. The elliptic curve cryptography approach is used to ensure the privacy and security of the image. This study has taken a four-share mechanism in which each component is divided into four shares for each color segment. The proposed algorithm uses the Grasshopper algorithm to select the bit's positions where the encryption must be done. Neural Networks have been used as a cross validator in the proposed work model. A new fitness function is designed for the Grasshopper algorithm. The proposed algorithm is compared based on Mean Square Error and Peak Signal to Noise Ratio.
DOI: https://doi.org/10.3844/jcssp.2022.322.338
Copyright: © 2022 Surajit Goon, Debdutta Pal and Souvik Dihidar. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 2,278 Views
- 987 Downloads
- 1 Citations
Download
Keywords
- Contract
- Visual Cryptography
- Decryption
- Security
- Recursion
- Elliptic Curve