Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication
|
|
- Abigayle Robertson
- 6 years ago
- Views:
Transcription
1 Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Department of Mathematical Sciences Iran University of Science and Technology Narmak, Tehran, Iran Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Abstract Information security is one of the most important defensive issues to prevent the attackers' assault to the privacy of organizations' valuable information The secret sharing scheme is an attractive branch of advanced cryptography that has played crucial role in passive defense and it would be employed in protecting important information and documents against dangers like robbery and illegal accesses In this article a scheme based on the method of matrix multiple secret sharing is provided In which the shareholders reveal the artificial image (shadow image) instead of their genuine share to recover the image of secret In other word, each images sharing that has been efficiently and shareholder with having only one portion of secret image can share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images will not be produced in a way that are difficult to identification and control We also could create better speed and security through making change in this scheme by using row and column round in generator function The considered plan is a scheme of multiple secret practically performed with more appropriate speed Key words: Matrix multiplication, secret sharing, divider, multiple secret, artificial images, shadow 494
2 1 Introduction Cryptography has been founded when people was communicating with each other while their enemy could not be aware of the exchanged information So, if breaking the code of encrypted systems for attackers was more difficult and complicated they would have been able to provide the better security for their consumers, it is cleared that such systems have high value The security of a cryptography system has dependent on its key It may be supposed the best way to manage the key is putting it on a safe place where it has protected; but this way is not reliable because an unexpected bad event like intentional or accidental sabotages can lead information to be inaccessible A simple approach to prevent this problem can be storing several copies of key (secret) in different places; however it will reduce the key security Sometime the problem may be easier than occurrence of an unexpected bad event We tend to define precisely which subset of shareholders is able to determine the key and which cannot do that has been considered as a set of subsets, in fact participance subsets in are supposed as shareholders subsets which must be able to calculate the key Also has been called access structure Subsets of that are not able to key recovery has been called forbidden sets In 1979, secret sharing scheme was offered by Shamir and Blakley separately The secret sharing scheme has employed for identified secret information sharing between individuals of a specified group, as none of these people with certain share that is allocated to them, be unable to access the confidential information and the order of access to secret can be possible only through using shares of known sets of people Thus, secret sharing has increased reliability of a cryptography system Karnin and et al in 1983 {3} had introduced perfect secret sharing scheme and then they offered a type of secret sharing scheme based on multiple matrix for better security Naor and Shamir {4, 5} during Eurocrypt conference 1994 had offered a new type of sharing scheme which has been called visual cryptographyin this kind of cryptography, the distributer shares out a secret image on n transparency sheets among n people which subsets of the people would be able to recover the secret image by putting their transparencies on each other Shareholders of a participance subset would be able to recover original image through only storing their shares without any information about cryptography and without cryptography computing; a subset of them cannot obtain any information of secret by putting their transparencies on each other and then they will not be permitted to observe the secret image Hu & Gao in 2008 introduced the secret image sharing scheme which was based on multiple matrix; in order to create a share on secret image and distribute it to each shareholder, shares of new secret should be computed and distributed in each time Threshold images have been produced in most of image sharing schemes like {6, 9, 10, 12, 13 and 14} which their control, identification and distribution were difficult The existing visual secret sharing scheme has limited the number of secret images All mentioned schemes were one time scheme By expanding the number of secret images, a subject on new scheme of secret sharing has been considered for hiding multiple secret images which each shareholder must receive and retain its share in a multiple secret sharing scheme In this scheme, many secrets could have been shared independently and without redistribution In order to recover a secret, a shareholder receives and presents an unreal share obtained from original share in place of its genuine share; recovering a secret has not threatened remaining tools 495
3 (recovery other secrets) which has not recovered yet The article is structured as follows: Definitions and concepts have been brought in part 2 which may be required for some of the secret sharing schemes The multiple secret sharing scheme of Hu Zengfeng & Gao has been explained in part 3; we have introduced our proposal in part 4; an analysis of the reformed proposed scheme in part 5 and finally, conclusion of the article can be seen in part 6 2 Multiple secret sharing scheme A multiple secret shadow sharing scheme is a special multiple secret sharing scheme which basis have been defined through shadow It seems that every access structure of threshold multiple secret sharing can receive a scheme that is similar to Shamir's scheme 11 Cumulative threshold of image sharing scheme in matrix multiplication In 2008 Hu Zengfeng and et al {9} had proposed a compressed image sharing scheme that was based on Karnin scheme In the plan, secret image has been divided into several uncommon square blocks instead of single pixel and each block is considered as a secret matrix This plan could reduce shadow image to secret image on the base of coefficient matrix features and it did not require to permutation in image sharing phase However, the process was belonging to one time secret sharing scheme because the portion of shareholder would be revealed after recovering secret image On the other hand, in order to share another secret image, new secret shares must be computed and distributed again among shareholders 12 Multiple secret images sharing scheme based on matrix multiplication Hu Zengfeng & et al {10} in reforming their proposed scheme at {9} had presented a plan in 2009 which was derived from multiple secret image sharing based on matrix multiplication; in this plan shareholders was storing artificial images rather than their original share at the time of recovering secret images So each shareholder with having only one portion of secret was able to share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images which were difficult to be identified and controlled were not produced Their scheme was a plan of efficient and practical multiple secret image sharing scheme The mentioned plan is a secure multiple secret sharing scheme (t, n) that has the following features: 1 It has ability to perform parallel recovery that means it can recover several secrets simultaneously; 2 The intermediate can compute number of distributed secrets dynamically; 3 A scheme which is used several times has been employed in several secret sharing courses without distributing new shares The mentioned scheme of multiple secret images sharing has been derived from a complex scheme, as concealed shares of shareholders would not be revealed at the time of recovering secret image The scheme will emerge only some general information rather than producing shadow images Advantages of this scheme have possessed following characteristics in comparison with other secret sharing schemes: Each shareholder with having only one portion of secret can share it with others in many of secret images On the other hand, each secret portion of any shareholder will not be revealed in recovery phase The present scheme has created shadow images in secret image sharing 496
4 phase that can protect it from problems like distribution images, control and identification In image recovery phase, shareholders cooperating with each others can recover secret image completely through general information and their concealed share 3 Describing Hou Zhengfeng & et al scheme a Initiative phase: In this phase has been considered as a one-way function of two variables Divider (D) has dealt out a number of secret images and a set of matrix on that has been made as a general determiner of shareholders and then divider has supposed - matrix on as general information which they consisted each dimension of matrix In this scheme, every of should have full rank and every of and of must be full rank; here the amount of would be Then, divider has chosen which as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider has shared it as follows 1 in secret image has been shared in several uncommon blocks of with size of and generating image has been chosen which is corresponded with and has similar size of and then would be shared in several uncommon blocks of with size of, 2 Amount of has been calculated and values of in matrix would be changed such as pseudo shadow with size of that the value of and are placed in and 3 The equation of has been considered as following relations: (1-3-3) (2-3-3) Then value of would be computed ( is block of that the value of and are, ) 4 Value of would be computed that is j block of as general image with the amount of that is 5 Relationship between, general image and of generating image has been presented that c Recovering secret image phase: 1 By creating the image of, each shareholder can obtain and compute the value of through presenting image of its shadow and then it would be able to reflect them in a matrix with form of with and 2 With general information of, shareholders can calculate on the base of the following equation: B1, Uj Bn t(mod 251) (3-3-3) In this equation the value of counted as follows: would be (4-3-3) 497
5 The value of is 3 Shareholders cooperating with each other are able to transform to and calculate the value of then all would be combined to create secret image that d Sharing Other image: At the time of sharing or other image, divider must choose generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) 31 Our proposed scheme; Multiple secret images sharing scheme is derived from complicated plan In this paper we have improved the scheme of Hou Zhengfeng and Gao Hanjun [11] with a change in method of making shares of generating image It is cleared that the improved scheme has created better speed and security As it was mentioned the scheme has shown only some of the general information rather than creating threshold images and also concealed portions of shareholders would not be revealed at the time of recovering secret image a Initiative phase: First one-way function of two variables has been considered as a special type of hash function and then would be proposed (in terms of better speed and security in comparison with the presented function in [29] scheme) Divider D must share certain numbers of secret images Divider has made a set of n matrix in as a general determiner of shareholders then supposed - matrix in as general information; each dimension of matrix is Every of has full rank and every of and any of have possessed full rank that After that, the divider has chosen which would be as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider D has shared it as follows 1 Secret image has been shared in several uncommon blocks of with size of and then corresponding generator image with similar size of has been computed through function of and in this function 2 By calculating the amount of and then transforming it to matrix, shareholder of pseudo shadow with size of would be created with and The equation of has been established as following relations: And the value of would be computed ( is block of that and ) The equation has been calculated that is j block of general image with the amount of that is Relationship between, general image and of generating image has been presented which c Recovering secret image phase: 498
6 1 By creating the image of, each shareholder can obtain and compute generating function of and then it would be able to put them in a matrix with form of with and the amount of that is If, the row round will be which 2 With general information of, shareholders can calculate and consider the following equation: B1, Uj Bn t(mod 251) The can be calculated as follows: And it may be possible to see input of as the following square matrix They are parameters which are given to shareholders With the value of that is 3 Shareholders cooperating with each other are able to divide to and calculate the value of then all would be stored to reveal secret image with d Sharing another image: At the time of sharing another image, the divider only requires to choose a generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) In row round function, matrix rows have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first row of the row round function Amounts,, and would be placed in the second row of the row round function orderly In the third row of the row round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth row of the row round function 2 Column round function If, the column round will be which 311 Function of is operated as follows: 1 Row round function 499
7 And it may be possible to see input of as the following square matrix In column round function, matrix column have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first column of the column round function Amounts of,, and would be placed in the second column of the column round function orderly In the third column of the column round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth column of the column round function If input function of is 16 the output of it will be Defining the relations of proposed function: Cryptography function of is a long chain including three simple operations on 32 bit words: Sum of 32-bit: a b (mod32), a and b all of them are 32-bit 32-bit XOR: axor b, a and b all of them are 32-bit Rotation with 32-bit fixed distance: a b, 32-bit word and a, b bit have shifted towards left It should be mentioned B is fix Above operation can be created and implemented through any circuit The objective of this scheme is to increase speed along with a good security Figure (1-5): Function between x and y in core of function =qarterround We have performed MATLAB programming in scheme 1-5 through an example which reforming the executable scheme has been implemented with high speed and security 4 Security-efficiency analysis The mentioned scheme is multiple secret images sharing scheme Divider (D) needs only to choose new generator image for each secret image and repeat the steps of secret image sharing at the time of different secret images sharing We have employed the one-way hash function of two variables to improve the scheme and we observe that speed and security of the scheme have increased through using function in computation Shareholders require only to combine in pseudo shadow image rather than revealing their secret share (x) Thus, the secret share (x) of each shareholder can be used several times This scheme has been employed effectively in most cases Therefore, the scheme not only can be shared in secret image without creating shadow images and is able to prevent from other problems of multiple secret images sharing schemes; but also the time, memory complexity, consumption time of memory status and implementation plan of the scheme have been considered 500
8 5 Conclusion In this article east t shareholder has recovered multiple secret images and each shareholder keeps only one share In the scheme of Hou Zhengfeng and Gao Hanjun a number of information simultaneously has been created instead of shadow images which includes identification, distribution and control information Accordingly, the multiple secret images sharing scheme is an effective and practical scheme, whereas a new and effective generator function has been employed in our reformed scheme that has caused speed and security improvement Computation time is so complicated 7Reference [1] Shamir A How to share a secret[j] CommunACM, (11): [2] Blakley G R Safeguarding cryptographic keys[c] Proc of AFIPS 1979 National Computer Conference, 1979: [3] EDKarnin,JWGreene,MEHellman On Sharing Secret Systems[J]IEEE Transactions on Information Theory,1983, 29(1):35-41 [4] M Naor, A Shamir Visual cryptography[c] Advances in Cryptology-Eurocrypt 94, 1994:1-12 [5] M Naor, A Shamir Visual cryptography II: Improving the contras via the cover base[c] Lecture Notes in Computer science, SpringerBerlin 1997(1189): [6] CC Thien, JC Lin Secret image sharing[j] Computer&Graphic,2002,26(5): [7] Daniel jbernstein "Salsa 20 specification"department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago, Date: [8] Li Bai A Reliable (k, n) Image Secret Sharing Scheme[C]Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on Sept, 2006:31-36 [9] Li Bai A strong ramp secret sharing scheme using matrix projectionworld of Wireless[C], Mobile and Multimedia NetworksInternational Symposium on , pages:5 pp [10] Hou Zhengfeng, Gao Hanjun A compressible threshold image sharing scheme based on matrix multiplication[j] Geomatics and Information Science of Wuhan University 2008, 33(10): [11] Hou Zhengfeng, Gao Hanjun Multi- secret image sharing based on matrix multiplication,ieee International conference on networks security(2009),vol1,pp [12] Ran-Zan Wang, Chin-Hui Su Secret image sharing with smaller shadow images [J] Pattern Recognition Letters 27 (2006) [13] Chin-Chen Chang, Chia-Chen Lin, Chia- Hsuan Lin, Yi-Hui Chen A novel secret image sharing scheme in color images using small shadow images [J] Information Sciences 178 (2008) [14] Shi Runhua, Zhong Hong, Huang Liusheng, Luo Yonglong A (t,n) Secret Sharing Scheme for Image Encryption [C] 2008 Congress on Image and Singal Processing May 2008:3-6 [15] Chien HY, Jan JK, Tseng YM A practical (t,n) multi-secret sharing scheme[j] IEICE Transactions on Fundamentals 2000, E83- A(12): [16] PANG LJ,WANG YM A new (t,n) multisecret sharing scheme based on Shamir s secret sharing[j] Applied Mathematics andcomputation, 2005,167(2): [17] Yang CC,Chang TY,Hwang MS A (t,n) multi-secret sharing scheme[j] Applied Mathematics and Computation, 2004, 151(2):
Progressive secret image sharing scheme using meaningful shadows
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:4075 4088 Published online 30 August 2016 in Wiley Online Library (wileyonlinelibrary.com)..1589 RESEARCH ARTICLE Progressive secret
More informationA Novel (2,n) Secret Image Sharing Scheme
Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet
More informationMulti Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering
More informationVISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION
VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationVisual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.
Visual Cryptography Frederik Vercauteren University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB frederik@cs.bris.ac.uk Frederik Vercauteren 1 University of Bristol 21 November
More informationA Cost-Effective Private-Key Cryptosystem for Color Image Encryption
A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of
More informationA STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi
More informationAn Overview of Visual Cryptography Schemes for Encryption of Images
An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim
More informationVisual Cryptography Scheme for Gray Scale Images based on Intensity Division
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Pradeep
More informationSecured Bank Authentication using Image Processing and Visual Cryptography
Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth 1, G.Padmaja 2, Dr. Syed Khasim 3, Dr. P.V.S.Lakshmi 4, A.Haritha 5 1 Assistant Professor, Department of CSE, PSCMRCET,
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationA Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,
More informationAbstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory
The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information
More informationAn Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images
An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH
More informationVarious Visual Secret Sharing Schemes- A Review
Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse
More informationEvaluation of Visual Cryptography Halftoning Algorithms
Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer
More informationMeta-data based secret image sharing application for different sized biomedical
Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy
More informationEnhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing
Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology
More informationSurvey on Size Invariant Visual Cryptography
Survey on Size Invariant Visual Cryptography Biswapati Jana 1,Gargi Hait 2,Shyamal Kumar Mondal 3 1 Assistant Professor, Department of Computer Science, Vidyasagar University, PaschimMedinipur, 2 Student,
More informationCryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationA Simple Scheme for Visual Cryptography
135 Mihir Das 1, Jayanta Kumar Paul 2, Priya Ranjan Sinha Mahapatra 3, Dept. of Computer Sc. & Engg., University of Kalyani, Kalyani, India, E-mail:das.mihir20@gmail.com 1, E-mail:jayantakumar18@yahoo.co.in
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationImplementation of Colored Visual Cryptography for Generating Digital and Physical Shares
Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Ahmad Zaky 13512076 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi
More informationIMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY Naoyuki Awano Department of Computer and Information Science, Seikei University, Tokyo, Japan ABSTRACT Using
More informationPerformance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography
Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationComparison of Visual Cryptographic Algorithms for Quality Images Using XOR
Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Sathiya K 1, Senthamilarasi K 2, Janani G 3, Akila victor 4 1,2,3 B.Tech CSE, VIT University, Vellore-632014. 4 Assistant Professor,
More informationDigital Image Sharing using Encryption Processes
Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University
More informationSecret Sharing Image Between End Users by using Cryptography Technique
Secret Sharing Image Between End Users by using Cryptography Technique SRINIVASA RAJESH KUMAR D. M.Tech Scholar Department of CSE, B V C Engineering college, Odalarevu P.MARESWARAMMA Associate Professor
More informationSunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Least-Significant-Bit
More informationVisual Secret Sharing Based Digital Image Watermarking
www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,
More informationCoverless Text Information Hiding Method Using the Frequent Words Hash
International Journal of Network Security, Vol.19, No.6, PP.1016-1023, Nov. 2017 (DOI: 10.6633/IJNS.201711.19(6).18) 1016 Coverless Text Information Hiding Method Using the Frequent Words Hash Jianjun
More informationDigital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media
1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College
More informationAN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney
26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney
More informationAnalysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone
Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone Surabhi Tiwari MTech Scholar, DC (ECE), TIEIT Bhopal (RGPV), India Neetu Sharma AP, ECE, TIEIT Bhopal (RGPV),
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationInternational Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page
Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology
More informationProgressive sharing of multiple images with sensitivity-controlled decoding
Chang et al. EURASIP Journal on Advances in Signal Processing (2015) 2015:11 DOI 10.1186/s13634-015-0196-z RESEARCH Progressive sharing of multiple images with sensitivity-controlled decoding Sheng-Yu
More informationCopyright protection scheme for digital images using visual cryptography and sampling methods
44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.
More informationA Recursive Threshold Visual Cryptography Scheme
A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationFixed Unmitigated Image Cryptography Schemes
IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,
More informationJournal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10
Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationImplementation and Performance Testing of the SQUASH RFID Authentication Protocol
Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,
More informationDual Visual Cryptography Using the Interference Color of Birefringent Material
Journal of Software Engineering and Applications, 2017, 10, 754-763 http://www.scirp.org/journal/jsea ISSN Online: 1945-3124 ISSN Print: 1945-3116 Dual Visual Cryptography Using the Interference Color
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationData Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform
J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationUnlinkability and Redundancy in Anonymous Publication Systems
Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous
More informationEXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationHalftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis
Pavan Kumar Gupta et al,int.j.comp.tech.appl,vol 3 (1), 17-22 Halftone based Secret Sharing Visual Cryptographic Scheme for Color using Bit Analysis Pavan Kumar Gupta Assistant Professor, YIT, Jaipur.
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationBlock Truncation Coding (BTC) Technique for Regions Image Encryption
Block Truncation Coding (BTC) Technique for Regions Image Encryption Shaymaa Abed Yasseen Alkufi 1, Professor Hind Rustum Mohammed 2, Mohammed S. Mechee 3 1,2,3 Faculty of Computer Science & Mathematics,
More informationImage Encryption Based on New One-Dimensional Chaotic Map
Image Encryption Based on New One-Dimensional Chaotic Map N.F.Elabady #1, H.M.Abdalkader *2, M. I. Moussa #3,S. F. Sabbeh #4 # Computer Science Department, Faculty of Computer and Informatics, Benha University,
More informationA Novel Technique in Visual Cryptography
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2
More informationTransform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.
978-1-4673-2451-9/12/$31.00 2012 IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. aesons@kookmin.ac.kr Dong-Guk Han
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationProgressive Color Visual Cryptography
1 Progressive Color Visual Cryptography (Final version of the manuscript ID: JEI03158) Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli School of Computing, National University of Singapore Singapore 117543 This
More informationIntroduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1
Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationREVERSIBLE data hiding, or lossless data hiding, hides
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,
More informationColored Image Ciphering with Key Image
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 5/ August 2016 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Colored Image Ciphering with Key Image ZAINALABIDEEN ABDULLASAMD
More informationDynamic Collage Steganography on Images
ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to
More informationFour Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2
RESEARCH ARTICLE Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2 1 M.Tech. Scholar, Raipur Institute of Technology
More informationEfficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 12, NO. 5, May. 2018 2348 Copyright c 2018 KSII Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Peng-Cheng
More informationA New network multiplier using modified high order encoder and optimized hybrid adder in CMOS technology
Inf. Sci. Lett. 2, No. 3, 159-164 (2013) 159 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020305 A New network multiplier using modified high order encoder and optimized
More informationReversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School
More informationProtection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 60 Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique 1 Mr.A.Duraisamy, 2 Mr.M.Sathiyamoorthy,
More informationData Security Using Visual Cryptography and Bit Plane Complexity Segmentation
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationCheating Prevention in Visual Cryptography using. Steganographic Scheme
Cheating Prevention in Visual Cryptography using Steganographic Scheme Biswapati lana Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: biswapatijana@gmail.com)
More informationSolutions to Exercises Chapter 6: Latin squares and SDRs
Solutions to Exercises Chapter 6: Latin squares and SDRs 1 Show that the number of n n Latin squares is 1, 2, 12, 576 for n = 1, 2, 3, 4 respectively. (b) Prove that, up to permutations of the rows, columns,
More informationComparative Histogram Analysis of LSB-based Image Steganography
Comparative Histogram Analysis of LSB-based Image Steganography KI-HYUN JUNG Department of Cyber Security Kyungil University 50 Gamasil-gil, Hayang-eup, Gyeongsan-si, Gyeongbuk 38428 REPUBLIC OF KOREA
More informationBidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography
Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography P.Mohamed Fathimal 1, Dr.P.Arockia Jansi Rani 2 Abstract Visual Cryptography is a cryptographic technique
More informationVisual Secrete Sharing by Diverse Image Media
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11615-11620 Visual Secrete Sharing by Diverse Image Media Aparna Bhosale 1, Jyoti
More informationKeywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy
More informationEFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING
EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING 1 P.Lakshmi, 2 S.Baskari ABSTRACT -- Visual cryptography is a popular solution for image encryption. The encryption
More informationJournal of mathematics and computer science 11 (2014),
Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad
More informationImage Enhancement using Histogram Equalization and Spatial Filtering
Image Enhancement using Histogram Equalization and Spatial Filtering Fari Muhammad Abubakar 1 1 Department of Electronics Engineering Tianjin University of Technology and Education (TUTE) Tianjin, P.R.
More informationLSB Encoding. Technical Paper by Mark David Gan
Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.
More informationAn EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding
I.J.Computer Network and Information Security, 2014, 2, 54-60 Published Online January 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.02.08 An EVCS for Color Images with Real Size Image
More informationMoiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION
Moiré Cryptography Yvo Desmedt Department of Computer Science PO Box 4530, Florida State University Tallahassee, FL 32306, USA, and Royal Holloway College University of London, UK. desmedt@cs.fsu.edu Tri
More information中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image. Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2
Fifth International Conference on Fuzzy Systems and Knowledge Discovery n Efficient ethod of License Plate Location in Natural-scene Image Haiqi Huang 1, ing Gu 2,Hongyang Chao 2 1 Department of Computer
More informationExploring Signature Schemes with Subliminal Channel
SCIS 2003 The 2003 Symposium on Cryptography and Information Security Hamamatsu,Japan, Jan.26-29,2003 The Institute of Electronics, Information and Communication Engineers Exploring Signature Schemes with
More informationAN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE
(IJISE) 207, Vol. No. 5, Jan-Jun e-issn: 2454-6402, p-issn: 2454-82X AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE Dr. Rajesh Kumar Pathak, 2 Neha Jain Professor &Director GNCT Greater
More informationSteganalytic methods for the detection of histogram shifting data-hiding schemes
Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques
More informationSome Cryptanalysis of the Block Cipher BCMPQ
Some Cryptanalysis of the Block Cipher BCMPQ V. Dimitrova, M. Kostadinoski, Z. Trajcheska, M. Petkovska and D. Buhov Faculty of Computer Science and Engineering Ss. Cyril and Methodius University, Skopje,
More informationColor PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret
More informationA New Representation of Image Through Numbering Pixel Combinations
A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new
More informationBlock Ciphers Security of block ciphers. Symmetric Ciphers
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable
More informationChapter 4 MASK Encryption: Results with Image Analysis
95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including
More informationDURING the past several years, independent component
912 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 4, JULY 1999 Principal Independent Component Analysis Jie Luo, Bo Hu, Xie-Ting Ling, Ruey-Wen Liu Abstract Conventional blind signal separation algorithms
More informationImage Encryption using Pseudo Random Number Generators
Image Encryption using Pseudo Random Number Generators Arihant Kr. Banthia Postgraduate student (MTech) Deptt. of CSE & IT, MANIT, Bhopal Namita Tiwari Asst. Professor Deptt. of CSE & IT, MANIT, Bhopal
More informationImage Steganography using Sudoku Puzzle for Secured Data Transmission
Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography
More information