The Improvement of Flip (2,2) Visual Cryptography Images Using Two Key Images


  • Ratna Dewi Maranatha Christian University
  • Putri Kartika Sari Maranatha Christian University



Flip improvement, Flip Visual Cryptography (FVC), key images


The Flip (2, 2) Visual Cryptography (FVC) is one of the techniques used to encrypt the two secret images into two dual purpose transparencies. The two transparencies can be sent to the objective person. The first secret images can be obtained by stacking the two transparencies and the second secret images can be obtained by stacking the one transparency with the flipping other transparency. Unfortunately, the result decryption processes still have noise and the quality of decrypted secret image is not as same as original secret image. This article proposed the new algorithm to improve the quality of decryption secret image. In this process, the two secret images from decryption process were compared with the two original secret images. The different values of each pixel, which was counted from subtraction of decryption image and original secret images, will be inserted to the two key images. The experimental results of this improvement have a good similarity. The noise in decryption process can be eliminated so the two secret images reconstruction similar to the original secret images.


Plum Analytics

Author Biographies

Ratna Dewi, Maranatha Christian University

Department of Electrical Engineering, Faculty of Engineering

Putri Kartika Sari, Maranatha Christian University

Department of Electrical Engineering, Faculty of Engineering


Chettri, L. (2014). Visual Cryptography scheme based on pixel expansion for black & white image. International Journal of Computer Science and Information Techniques (IJCSIT), 5(3), 4190-4193.

Dhole, A. B., & Janwe N. J. (2013). An implementation of algorithms in Visual Cryptography. International Journal of Scientific and Research Publications, 3(3), 1-5.

Lin, S-J., Chen, S-K., & Lin, J-C., (2010). Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. Journal of Visual Communication & Image Representation, 21, 900-916. doi: 10.1016/j.jvcir.2010.08.006

Naor, M., & Shamir, A. (1995). Visual cryptography. Proc. Advances in Cryptography (EUROCRYPT’94), 950, 1–12.

Sari, P. K. (2015). Visual cryptography for sharing secret images using flip methods (2,2). Retrieved from

Shyu, S. J. (2007). Image encryption by random grids. Journal of Pattern Recognition, 40(3), 1014-1031. doi: 10.1016/j.patcog.2006.02.025

Verma, J., & Khemchandani, D. V. (2012). A Visual Cryptographic Technique to Secure Image Shares. International journal of Engineering Research and Application (IJERA), 2(1), 1121-1125.






Abstract 327  .
PDF downloaded 138  .