Enhanced Visual Cryptography Based on Arnold's Cat Map
Abstract
The field of color visual cryptography has experienced significant growth, enabling the secure transmission of color images over the Internet. This innovative methodology partition images into shares, mirroring the principles of Naor and Shamir's approach but tailored specifically for color images. Color visual cryptography (VC) operate by divide color secret images into shares, treat each color pixel individually through the RGB and CMY channels. This study introduces an advanced CVC technique that integrate a chaotic encryption system, significantly enhance security measures. The proposed approach involves extract the channels component and apply a chaotic map to each channel with distinct masks, resulting in the generation of six shares (two for each color channel), subsequently XORing them with a randomly generated key matrix. This process creates new matrices, further enhance security. On the recipient's end, the secret color image is retrieved while maintaining high quality, as evaluated through metrics such as Peak Signal-to-Noise ratio PSNR, Mean Square Error MSE, Correlation Coefficients CC, Number of Pixels Changing Rate NPCR, and Unified Average Change Intensity UACI. Comparative analysis against existing methods demonstrates the superior efficient of this methodology in securely concealing color image secrets. Where the values of each metric were CC =1.0, MSE= 0.0 and PSNR= infinite. While, the best values of NPCR and UACI were 99.65%, 85.62% respectively these for the original channel and associated shares.
References
[2] Khan, H., Shaikh, S., Siddiqui, S., & Baksh, G. (2023). A Systematic Review of Block-chain Technology. International Journal of Computing and Related Technologies, 4(1), 1-12.
[3] A. Z. Liu, L. Logeswaran, S. Sohn, and H. Lee, "A picture is worth a thousand words: Language models plan from pixels," arXiv preprint arXiv:2303.09031, 2023.
[4] A. Gutub, "Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing," CAAI Transactions on Intelligence Technology, vol. 8, no. 2, pp. 440-452, 2023.
[5] B. Kukreja and S. Malik, "Triple Layered Security for Data Hiding Using Steganography and Visual Cryptography," Authorea Preprints, 2024.
[6] Somwanshi, Datta R., and Vikas T. Humbe. "An Optimal (2, 2) Visual Cryptography Schemes For Information Security." First International Conference on Advances in Computer Vision and Artificial Intelligence Technologies (ACVAIT 2022). Atlantis Press, (2023).
[7] John, B. A., Christhu, R., Rajeev, S., & Selva, M. G. (2020). Enhanced semantic visual secret sharing scheme for the secure image communication. Multimedia Tools and Applications, 79(23-24), 17057-17079.
[8] Karolin M, Meyyappan T (2019) Image encryption and decryption using RSA algorithm with share creation techniques. Int J Eng Adv Technol 9(2):2797–2800. https://doi.org/10.35940/ijeat.B4021.129219
[9] D. R. Ibrahim, J. S. Teh, and R. Abdullah, "An overview of visual cryptography techniques," Multimedia Tools and Applications, vol. 80, pp. 31927-31952, 2021.
[10] Karolin, M., & Meyyappan, T. , (20.19), 'Image encryption and decryption using RSA algorithm with share creation techniques'. Int J Eng Adv Tech, 9(2), 2797-2800.
[11] R. Karthik, et al., " "Image security based on rotational visual cryptography."," Springer Nature Singapore, pp. 87-96, 2022.
[12] S. A. Fadhil and A. K Farhan, "Color visual cryptography based on three dimensional chaotic map," Iraqi Journal of Computers, Communications, Control and Systems Engineering, vol. 22, no. 2, pp. 1-12, 2022.
[13] P. Saini, K. Kumar, S. Kashid, and A. Negi, "MEVSS: Modulo Encryption Based Visual Secret Sharing Scheme for Securing Visual Content," in International Conference on Deep Learning, Artificial Intelligence and Robotics, 2022: Springer, pp. 24-35.
[14] Shankar, K., Taniar, D., Yang, E., & Yi, O. (2021). Secure and optimal secret sharing scheme for color images. Mathematics, 9(19), 2360. (2021).
[15] Karolin, M., & Meyyappan, T. (2022), Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography. IETE Journal of Research, 1-8.
[16] Wang, Xiaowei, et al. (2022), "A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption." Security and Communication Networks 2022.1 : 4260804. https://doi.org/10.1155/2022/4260804
[17] M. Bertaccini, Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption. Packt Publishing Ltd, 2022.
[18] Liu, J., Zhang, J., & Yin, S. (2023). Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption. Evolutionary Intelligence, 16(1), 77-87.
[19] Mashkour, M. M., Jawad, L. M., & Sulong, G. (2023). A Secure Data Hiding For H. 264 Video Based on Chaotic Map Methods and RC4 Algorithm. Iraqi Journal of Information and Communication Technology, 6(3), 50-64.
[20] X. Ren and W. Yu, "The novel image encryption scheme based on three-dimentional coupled chaotic system," in Journal of Physics: Conference Series, 2021, vol. 2079, no. 1: IOP Publishing, p. 012027.
[21] S. S. da Silva, "A comparison analysis of using different numerical representations in digital chaotic maps," 2023.
[22] B. Abdulwahid Hameed and E. K. Gbashi, "A review of Chaotic Maps used for Generating Secure Random Keys," in BIO Web of Conferences, 2024, vol. 97: EDP Sciences, p. 00070.
[23] D. He, R. Parthasarathy, H. Li, and Z. Geng, "A Fast Image Encryption Algorithm based on Logistic Mapping and Hyperchaotic Lorenz System for Clear Text Correlation," IEEE Access, 2023.
[24] Fadhil, Meryam Saad, Alaa Kadhim Farhan, and Mohammad Natiq Fadhil. "Designing substitution box based on the 1D logistic map chaotic system." IOP Conference Series: Materials Science and Engineering. Vol. 1076. No. 1. IOP Publishing, 2021.
[25] R. S. Abdulaali and R. K. Jamal, "A comprehensive study and analysis of the chaotic Chua circuit," Iraqi Journal of Science, vol. 63, no. 2, pp. 556-570, 2022.
[26] Z. T. M. Al-Ta'i and S. M. Sadoon, "Securing Privacy: Encrypted Image Retrieval with CNNs and Chaos-Based Visual Cryptography on Cloud Computing," International Journal of Intelligent Engineering & Systems, vol. 16, no. 6, 2023.
[27] C. Li, K. Tan, B. Feng, and J. Lü, "The graph structure of the generalized discrete arnold's cat map," IEEE Transactions on Computers, vol. 71, no. 2, pp. 364-377, 2021.
[28] Mursi, Khalid T., et al. "A fast deep learning method for security vulnerability study of XOR PUFs." Electronics 9.10 (2020): 1715.
[29] Kiran, S., et al. "Development of cryptographic algorithm using bit shifting and Matrix XOR operations." (2022).
Copyright (c) 2025 Hajir Alauldeen Al-Bayati, Dalal N Hamod, Lahieb M Jawad
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.