Secure Secret Image Sharing Using Histogram Localization Based Block wise Methodology
D.R.Denslin Braja1, V.S.Dharun2, D.R.Denslin Brabin3 

1D. R. Denslin Braja, Department of Information Technology, Noorul Islam University, (Tamil Nadu), India.
2V. S. Dharun, Department of Electronics and Communication Engineering, Immanuel Arasar JJ College of Engineering, (Tamil Nadu), India.
3D. R.Denslin Brabin, Department of Computer Science and Engineering, Madanapalle Institute of  Technology & Science, Andhra Pradesh, India.

Manuscript received on 03 March 2019 | Revised Manuscript received on 08 March 2019 | Manuscript published on 30 July 2019 | PP: 186-191 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1819078219/19©BEIESP | DOI: 10.35940/ijrte.B1819.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Various types of encryption techniques have been used for data security. Complex algorithms are followed for this purpose in most of the methods. Confidentiality is provided by a technique called visual cryptography excluding of any intricate computations and algorithms. In this paper, we put forward an innovative method called Histogram Localization based Blockwise (HLB) approach to solve pixel expansion problem at the same time it will increase the security and visual quality for highly confidential secret image which is in color. According to this method, the secret shares are generated based on the histogram and also the number of black pixels in the corresponding block. The image size of resultant shares is same as in the original secret image. These shares are distributed to participants, and human vision system is used for decryption purpose.
Index Terms: Histogram, Blockwise approach, Visual Cryptography, Secret Sharing.

Scope of the Article: Block Chain-Enabled IoT Device and Data Security and Privacy