Visual Cryptography for Medical Images Including Watermarking
Shanmuga Priya. P1, Rengarajan Amirtharajan2
1Shanmuga Priya P, Assistant Professor, Department of ECE, Rajalakshmi Engineering College, Chennai (Tamil Nadu), India.
2Rengarajan Amirtharajan, Professor, School of EEE, SASTRA University, Thanjavur (Tamil Nadu), India.
Manuscript received on 25 November 2019 | Revised Manuscript received on 06 December 2019 | Manuscript Published on 14 December 2019 | PP: 313-316 | Volume-9 Issue-1S November 2019 | Retrieval Number: A10641191S19/2019©BEIESP | DOI: 10.35940/ijitee.A1064.1191S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security has become an indivisible question as Information Technology is ruling the world now. Cryptography is the technique to prove the inconceivable security for the secret data. Visual Cryptography is appropriate for any images, in which k out of n shares are enough to decrypt the clandestine information. It’s a method of isolating the secret among a group of contributors and each contributor get a share of the secret. Here sufficient number of shares is combined to expose the secret. Main applications of Visual Cryptography are Bank customer identification, Biometric security and so on. This paper provides such methods to maintain the privacy of an individual’s medical image and also embrace watermarking in the medical images, which provides copy right to the medical images of the concerned hospitals. Three Visual cryptography schemes are projected for medical image. Steps related to dividing the secret as shares are needed to be very hard to attack. These schemes mainly focused on decryption method, this act as an imperative utensil for getting efficient results.
Keywords: Medical Image, Visual Cryptography, Secret Information, Watermarking, Decryption.
Scope of the Article: Image Security