International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE A Comparative Study of Bit-Plane Based Visual Cryptography and Blowfish Encryption for Secure Image Protection
ABSTRACT With the rapid expansion of digital communication, protecting sensitive multimedia data has become increasingly important. As images are frequently transmitted over untrusted channels, they face risks of unauthorized access, modification, and manipulation. Among the various image security techniques, Visual Cryptography (VC) and cryptographic algorithms like Blowfish are widely used. VC combined with Bit-Plane Decomposition (BPD) divides a secret image into multiple meaningless shares that individually disclose no information, and reconstruction is achieved through simple stacking or XOR operations. In contrast, Blowfish is a fast and robust symmetric encryption algorithm that secures data using multiple Feistel rounds and complex key-dependent S-boxes. This study provides an in-depth comparative evaluation of these two approaches based on security strength, processing complexity, quality of reconstructed images, pixel expansion, storage overhead, attack resilience, and applicability to real-time systems.
AUTHOR ANIL B. ALDE, VIKAS T. HUMBE School of Technology, S.R.T.M.U.N, Sub-Campus, Peth, Latur, Maharashtra, India
VOLUME 177
DOI DOI: 10.15680/IJIRCCE.2025.1312113
PDF pdf/113_A Comparative Study of Bit-Plane Based Visual Cryptography and Blowfish Encryption for Secure Image Protection.pdf
KEYWORDS
References 1. A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
2. M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology-EUROCRYPT’ 94, Lecture Notes incomputer Science, vol. 950, pp. 1–12, Springer, 1995.
3. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 4th ed., Pearson, 2018.
4. X. Zhang and W. Chen, “Analysis of bit-plane leakage in visual cryptography schemes,” IEEE Signal Processing Letters, vol. 22, no. 9, pp. 1433–1437, Sept. 2015.
5. P. S. Raviraj and K. S. Babu, “A modified visual cryptography scheme based on bit-plane decomposition,” Int. J. Comput. Appl., vol. 113, no. 4, pp. 1–6, Mar. 2015.
6. B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish),” in Fast Software Encryption, LNCS 809, Springer, 1994, pp. 191–204.
7. S. M. Yen and J. J. Huang, “A high secure image encryption algorithm based on Blowfish,” Int. J. Network Security, vol. 15, no. 1, pp. 17–28, Jan. 2013.
8. M. Hassan, “Modern evaluation of Blowfish cipher for multimedia encryption,” Multimedia Tools and Applications, vol. 81, no. 4, pp. 13411–13434, Feb. 2022.
9. A. Al-Saffar and H. Tao, “A hybrid Blowfish and visual cryptography mechanism for secure medica image transmission,” Journal of King Saud University – Computer and Information Sciences, vol. 34, no. 9, pp. 5030–5041, Sept. 2022.
10. M. Kharrazi, H. T. Sencar, and N. Memon, “Chromatic visual cryptography,” IEEE Trans Image Process., vol. 16, no. 1, pp. 140–148, Jan. 2007.
11. Y. Liu, J. Zhou, and Y. Mao, “Entropy-enhanced visual cryptography with optimized share generation,” IEEE Transactions on Image Processing, vol. 30, pp. 572–586, Jan. 2021.
12. S. R. Kodati and V. Potlapalli, “Pixel-expansion reduction and quality improvement in (2,2) visual cryptography,” IEEE Access, vol. 8, pp. 216025–216036, 2020.
13. C. Wu and L. Lee, “A novel approach to image encryption based on bit-plane slicing and chaotic maps,” J. Vis. Commun. Image Represent., vol. 49, pp. 340–350, Dec. 2017.
14. T. Nguyen, P. Huynh, and L. Tran, “A hybrid visual cryptography and encryption scheme for secure image sharing,” IEEE Access, vol. 9, pp. 115233–115245, 2021.
15. A. Sharma, “Visual cryptography trends and developments for cloud security,” IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 450–462, Mar.–Apr. 2023.
16. B. Patel and S. Kumar, “Deep learning–guided visual cryptography for high-fidelity reconstruction,” Signal Processing, vol. 210, Article 108030, Jan. 2024.
17. L. Chen, “Bit-plane leakage analysis and countermeasures in visual cryptography systems,” IEEE Signal Processing Letters, vol. 28, pp. 753–757, May 2021.
18. M. Hassan and A. Rahman, “Performance assessment of classical and modern image ciphers using NPCR and UACI metrics,” Multimedia Tools and Applications, vol. 82, no. 27, pp. 27185–27214, July 2023.
19. S. Verma and D. Jain, “NPCR–UACI performance evaluation of image ciphers for secure communication,” Electronics, vol. 13, no. 4, Article 576, Feb. 2024.
image
Copyright © IJIRCCE 2020.All right reserved