Cheat Immune visual Cryptography for Secure Transmission of Images
Ranjan Kumar H S1, Sampath Kini2, Akshatha L3, Deeksha B G4

1Ranjan Kumar H S, Department of Computer Science & Engineering, NMAM Institute of Technology, Karkala (Karnataka), India.
2Sampath Kini, Department of Computer Science & Engineering, NMAM Institute of Technology, Karkala (Karnataka), India.
3Akshatha L, Department of Computer Science & Engineering, NMAM Institute of Technology, Mangalore (Karnataka), India.
4Deeksha B G, Department of Computer Science & Engineering, NMAM Institute of Technology, Mangalore (Karnataka), India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 1175-1181 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6597048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Transmission of confidential information securely on insecure communication channel is atmost important. Image encryption is a method which is used to hide the secret image. During the course of transmission over insecure communication network, intruders may alter the encrypted data and may result in changing the visual meaning of the image. In this paper, a novel cheat immune image encryption technique is proposed. If a middle man tries to alter the encrypted data than decryption of an image fails. During encryption, it divides the source image into ‘3’ shares and decrypts by superimposing all the 3 shares. In this technique, secret information or image can be retrieved only if all three shares are in possession. The traditional visual cryptographic scheme suffers from the problem of pixel expansion. In this aspect ratio of an image changes resulting in increasing the width of encrypted image. To overcome this, a novel random grid visual cryptography is proposed. The methodology uses Residue Number System (RNS ) for encryption and utilizes Mixed Radix Representation(MRR) for decryption. RNS and Mixed radix is mainly used in fault tolerance. This is designed so as to avoid cheating during decryption.
Keywords: Encryption, Decryption, Residue Number System, Mixed Radix Representation, Pixel Expansion.

Scope of the Article: Encryption Methods and Tools