Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication

Size: px
Start display at page:

Download "Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication"

Transcription

1 Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Department of Mathematical Sciences Iran University of Science and Technology Narmak, Tehran, Iran Faculty and Research Center of Communication and Information Technology, IHU Tehran, Iran Abstract Information security is one of the most important defensive issues to prevent the attackers' assault to the privacy of organizations' valuable information The secret sharing scheme is an attractive branch of advanced cryptography that has played crucial role in passive defense and it would be employed in protecting important information and documents against dangers like robbery and illegal accesses In this article a scheme based on the method of matrix multiple secret sharing is provided In which the shareholders reveal the artificial image (shadow image) instead of their genuine share to recover the image of secret In other word, each images sharing that has been efficiently and shareholder with having only one portion of secret image can share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images will not be produced in a way that are difficult to identification and control We also could create better speed and security through making change in this scheme by using row and column round in generator function The considered plan is a scheme of multiple secret practically performed with more appropriate speed Key words: Matrix multiplication, secret sharing, divider, multiple secret, artificial images, shadow 494

2 1 Introduction Cryptography has been founded when people was communicating with each other while their enemy could not be aware of the exchanged information So, if breaking the code of encrypted systems for attackers was more difficult and complicated they would have been able to provide the better security for their consumers, it is cleared that such systems have high value The security of a cryptography system has dependent on its key It may be supposed the best way to manage the key is putting it on a safe place where it has protected; but this way is not reliable because an unexpected bad event like intentional or accidental sabotages can lead information to be inaccessible A simple approach to prevent this problem can be storing several copies of key (secret) in different places; however it will reduce the key security Sometime the problem may be easier than occurrence of an unexpected bad event We tend to define precisely which subset of shareholders is able to determine the key and which cannot do that has been considered as a set of subsets, in fact participance subsets in are supposed as shareholders subsets which must be able to calculate the key Also has been called access structure Subsets of that are not able to key recovery has been called forbidden sets In 1979, secret sharing scheme was offered by Shamir and Blakley separately The secret sharing scheme has employed for identified secret information sharing between individuals of a specified group, as none of these people with certain share that is allocated to them, be unable to access the confidential information and the order of access to secret can be possible only through using shares of known sets of people Thus, secret sharing has increased reliability of a cryptography system Karnin and et al in 1983 {3} had introduced perfect secret sharing scheme and then they offered a type of secret sharing scheme based on multiple matrix for better security Naor and Shamir {4, 5} during Eurocrypt conference 1994 had offered a new type of sharing scheme which has been called visual cryptographyin this kind of cryptography, the distributer shares out a secret image on n transparency sheets among n people which subsets of the people would be able to recover the secret image by putting their transparencies on each other Shareholders of a participance subset would be able to recover original image through only storing their shares without any information about cryptography and without cryptography computing; a subset of them cannot obtain any information of secret by putting their transparencies on each other and then they will not be permitted to observe the secret image Hu & Gao in 2008 introduced the secret image sharing scheme which was based on multiple matrix; in order to create a share on secret image and distribute it to each shareholder, shares of new secret should be computed and distributed in each time Threshold images have been produced in most of image sharing schemes like {6, 9, 10, 12, 13 and 14} which their control, identification and distribution were difficult The existing visual secret sharing scheme has limited the number of secret images All mentioned schemes were one time scheme By expanding the number of secret images, a subject on new scheme of secret sharing has been considered for hiding multiple secret images which each shareholder must receive and retain its share in a multiple secret sharing scheme In this scheme, many secrets could have been shared independently and without redistribution In order to recover a secret, a shareholder receives and presents an unreal share obtained from original share in place of its genuine share; recovering a secret has not threatened remaining tools 495

3 (recovery other secrets) which has not recovered yet The article is structured as follows: Definitions and concepts have been brought in part 2 which may be required for some of the secret sharing schemes The multiple secret sharing scheme of Hu Zengfeng & Gao has been explained in part 3; we have introduced our proposal in part 4; an analysis of the reformed proposed scheme in part 5 and finally, conclusion of the article can be seen in part 6 2 Multiple secret sharing scheme A multiple secret shadow sharing scheme is a special multiple secret sharing scheme which basis have been defined through shadow It seems that every access structure of threshold multiple secret sharing can receive a scheme that is similar to Shamir's scheme 11 Cumulative threshold of image sharing scheme in matrix multiplication In 2008 Hu Zengfeng and et al {9} had proposed a compressed image sharing scheme that was based on Karnin scheme In the plan, secret image has been divided into several uncommon square blocks instead of single pixel and each block is considered as a secret matrix This plan could reduce shadow image to secret image on the base of coefficient matrix features and it did not require to permutation in image sharing phase However, the process was belonging to one time secret sharing scheme because the portion of shareholder would be revealed after recovering secret image On the other hand, in order to share another secret image, new secret shares must be computed and distributed again among shareholders 12 Multiple secret images sharing scheme based on matrix multiplication Hu Zengfeng & et al {10} in reforming their proposed scheme at {9} had presented a plan in 2009 which was derived from multiple secret image sharing based on matrix multiplication; in this plan shareholders was storing artificial images rather than their original share at the time of recovering secret images So each shareholder with having only one portion of secret was able to share it with others in many of secret images Unlike other known secret sharing schemes, in this scheme the threshold images which were difficult to be identified and controlled were not produced Their scheme was a plan of efficient and practical multiple secret image sharing scheme The mentioned plan is a secure multiple secret sharing scheme (t, n) that has the following features: 1 It has ability to perform parallel recovery that means it can recover several secrets simultaneously; 2 The intermediate can compute number of distributed secrets dynamically; 3 A scheme which is used several times has been employed in several secret sharing courses without distributing new shares The mentioned scheme of multiple secret images sharing has been derived from a complex scheme, as concealed shares of shareholders would not be revealed at the time of recovering secret image The scheme will emerge only some general information rather than producing shadow images Advantages of this scheme have possessed following characteristics in comparison with other secret sharing schemes: Each shareholder with having only one portion of secret can share it with others in many of secret images On the other hand, each secret portion of any shareholder will not be revealed in recovery phase The present scheme has created shadow images in secret image sharing 496

4 phase that can protect it from problems like distribution images, control and identification In image recovery phase, shareholders cooperating with each others can recover secret image completely through general information and their concealed share 3 Describing Hou Zhengfeng & et al scheme a Initiative phase: In this phase has been considered as a one-way function of two variables Divider (D) has dealt out a number of secret images and a set of matrix on that has been made as a general determiner of shareholders and then divider has supposed - matrix on as general information which they consisted each dimension of matrix In this scheme, every of should have full rank and every of and of must be full rank; here the amount of would be Then, divider has chosen which as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider has shared it as follows 1 in secret image has been shared in several uncommon blocks of with size of and generating image has been chosen which is corresponded with and has similar size of and then would be shared in several uncommon blocks of with size of, 2 Amount of has been calculated and values of in matrix would be changed such as pseudo shadow with size of that the value of and are placed in and 3 The equation of has been considered as following relations: (1-3-3) (2-3-3) Then value of would be computed ( is block of that the value of and are, ) 4 Value of would be computed that is j block of as general image with the amount of that is 5 Relationship between, general image and of generating image has been presented that c Recovering secret image phase: 1 By creating the image of, each shareholder can obtain and compute the value of through presenting image of its shadow and then it would be able to reflect them in a matrix with form of with and 2 With general information of, shareholders can calculate on the base of the following equation: B1, Uj Bn t(mod 251) (3-3-3) In this equation the value of counted as follows: would be (4-3-3) 497

5 The value of is 3 Shareholders cooperating with each other are able to transform to and calculate the value of then all would be combined to create secret image that d Sharing Other image: At the time of sharing or other image, divider must choose generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) 31 Our proposed scheme; Multiple secret images sharing scheme is derived from complicated plan In this paper we have improved the scheme of Hou Zhengfeng and Gao Hanjun [11] with a change in method of making shares of generating image It is cleared that the improved scheme has created better speed and security As it was mentioned the scheme has shown only some of the general information rather than creating threshold images and also concealed portions of shareholders would not be revealed at the time of recovering secret image a Initiative phase: First one-way function of two variables has been considered as a special type of hash function and then would be proposed (in terms of better speed and security in comparison with the presented function in [29] scheme) Divider D must share certain numbers of secret images Divider has made a set of n matrix in as a general determiner of shareholders then supposed - matrix in as general information; each dimension of matrix is Every of has full rank and every of and any of have possessed full rank that After that, the divider has chosen which would be as the concealed share of the corresponding shareholders b Secret image sharing phase: Size of in secret image is that divider D has shared it as follows 1 Secret image has been shared in several uncommon blocks of with size of and then corresponding generator image with similar size of has been computed through function of and in this function 2 By calculating the amount of and then transforming it to matrix, shareholder of pseudo shadow with size of would be created with and The equation of has been established as following relations: And the value of would be computed ( is block of that and ) The equation has been calculated that is j block of general image with the amount of that is Relationship between, general image and of generating image has been presented which c Recovering secret image phase: 498

6 1 By creating the image of, each shareholder can obtain and compute generating function of and then it would be able to put them in a matrix with form of with and the amount of that is If, the row round will be which 2 With general information of, shareholders can calculate and consider the following equation: B1, Uj Bn t(mod 251) The can be calculated as follows: And it may be possible to see input of as the following square matrix They are parameters which are given to shareholders With the value of that is 3 Shareholders cooperating with each other are able to divide to and calculate the value of then all would be stored to reveal secret image with d Sharing another image: At the time of sharing another image, the divider only requires to choose a generator image different from and repeat the secret image sharing phase in subsection (b) Similarly shareholders cooperating with each other can acquire image through repeating the step of recovering secret image that was explained in subsection (c) In row round function, matrix rows have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first row of the row round function Amounts,, and would be placed in the second row of the row round function orderly In the third row of the row round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth row of the row round function 2 Column round function If, the column round will be which 311 Function of is operated as follows: 1 Row round function 499

7 And it may be possible to see input of as the following square matrix In column round function, matrix column have been ordered into quarter round in parallel way with permutation of each row Amounts of,, and respectively have been put in the first column of the column round function Amounts of,, and would be placed in the second column of the column round function orderly In the third column of the column round function, amounts of,, and have been arranged respectively and the amounts of,, and have been put orderly in the fourth column of the column round function If input function of is 16 the output of it will be Defining the relations of proposed function: Cryptography function of is a long chain including three simple operations on 32 bit words: Sum of 32-bit: a b (mod32), a and b all of them are 32-bit 32-bit XOR: axor b, a and b all of them are 32-bit Rotation with 32-bit fixed distance: a b, 32-bit word and a, b bit have shifted towards left It should be mentioned B is fix Above operation can be created and implemented through any circuit The objective of this scheme is to increase speed along with a good security Figure (1-5): Function between x and y in core of function =qarterround We have performed MATLAB programming in scheme 1-5 through an example which reforming the executable scheme has been implemented with high speed and security 4 Security-efficiency analysis The mentioned scheme is multiple secret images sharing scheme Divider (D) needs only to choose new generator image for each secret image and repeat the steps of secret image sharing at the time of different secret images sharing We have employed the one-way hash function of two variables to improve the scheme and we observe that speed and security of the scheme have increased through using function in computation Shareholders require only to combine in pseudo shadow image rather than revealing their secret share (x) Thus, the secret share (x) of each shareholder can be used several times This scheme has been employed effectively in most cases Therefore, the scheme not only can be shared in secret image without creating shadow images and is able to prevent from other problems of multiple secret images sharing schemes; but also the time, memory complexity, consumption time of memory status and implementation plan of the scheme have been considered 500

8 5 Conclusion In this article east t shareholder has recovered multiple secret images and each shareholder keeps only one share In the scheme of Hou Zhengfeng and Gao Hanjun a number of information simultaneously has been created instead of shadow images which includes identification, distribution and control information Accordingly, the multiple secret images sharing scheme is an effective and practical scheme, whereas a new and effective generator function has been employed in our reformed scheme that has caused speed and security improvement Computation time is so complicated 7Reference [1] Shamir A How to share a secret[j] CommunACM, (11): [2] Blakley G R Safeguarding cryptographic keys[c] Proc of AFIPS 1979 National Computer Conference, 1979: [3] EDKarnin,JWGreene,MEHellman On Sharing Secret Systems[J]IEEE Transactions on Information Theory,1983, 29(1):35-41 [4] M Naor, A Shamir Visual cryptography[c] Advances in Cryptology-Eurocrypt 94, 1994:1-12 [5] M Naor, A Shamir Visual cryptography II: Improving the contras via the cover base[c] Lecture Notes in Computer science, SpringerBerlin 1997(1189): [6] CC Thien, JC Lin Secret image sharing[j] Computer&Graphic,2002,26(5): [7] Daniel jbernstein "Salsa 20 specification"department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago, Date: [8] Li Bai A Reliable (k, n) Image Secret Sharing Scheme[C]Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on Sept, 2006:31-36 [9] Li Bai A strong ramp secret sharing scheme using matrix projectionworld of Wireless[C], Mobile and Multimedia NetworksInternational Symposium on , pages:5 pp [10] Hou Zhengfeng, Gao Hanjun A compressible threshold image sharing scheme based on matrix multiplication[j] Geomatics and Information Science of Wuhan University 2008, 33(10): [11] Hou Zhengfeng, Gao Hanjun Multi- secret image sharing based on matrix multiplication,ieee International conference on networks security(2009),vol1,pp [12] Ran-Zan Wang, Chin-Hui Su Secret image sharing with smaller shadow images [J] Pattern Recognition Letters 27 (2006) [13] Chin-Chen Chang, Chia-Chen Lin, Chia- Hsuan Lin, Yi-Hui Chen A novel secret image sharing scheme in color images using small shadow images [J] Information Sciences 178 (2008) [14] Shi Runhua, Zhong Hong, Huang Liusheng, Luo Yonglong A (t,n) Secret Sharing Scheme for Image Encryption [C] 2008 Congress on Image and Singal Processing May 2008:3-6 [15] Chien HY, Jan JK, Tseng YM A practical (t,n) multi-secret sharing scheme[j] IEICE Transactions on Fundamentals 2000, E83- A(12): [16] PANG LJ,WANG YM A new (t,n) multisecret sharing scheme based on Shamir s secret sharing[j] Applied Mathematics andcomputation, 2005,167(2): [17] Yang CC,Chang TY,Hwang MS A (t,n) multi-secret sharing scheme[j] Applied Mathematics and Computation, 2004, 151(2):

Progressive secret image sharing scheme using meaningful shadows

Progressive secret image sharing scheme using meaningful shadows SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:4075 4088 Published online 30 August 2016 in Wiley Online Library (wileyonlinelibrary.com)..1589 RESEARCH ARTICLE Progressive secret

More information

A Novel (2,n) Secret Image Sharing Scheme

A Novel (2,n) Secret Image Sharing Scheme Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet

More information

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB. Visual Cryptography Frederik Vercauteren University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB frederik@cs.bris.ac.uk Frederik Vercauteren 1 University of Bristol 21 November

More information

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

An Overview of Visual Cryptography Schemes for Encryption of Images

An Overview of Visual Cryptography Schemes for Encryption of Images An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim

More information

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Pradeep

More information

Secured Bank Authentication using Image Processing and Visual Cryptography

Secured Bank Authentication using Image Processing and Visual Cryptography Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth 1, G.Padmaja 2, Dr. Syed Khasim 3, Dr. P.V.S.Lakshmi 4, A.Haritha 5 1 Assistant Professor, Department of CSE, PSCMRCET,

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,

More information

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information

More information

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

Various Visual Secret Sharing Schemes- A Review

Various Visual Secret Sharing Schemes- A Review Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse

More information

Evaluation of Visual Cryptography Halftoning Algorithms

Evaluation of Visual Cryptography Halftoning Algorithms Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology

More information

Survey on Size Invariant Visual Cryptography

Survey on Size Invariant Visual Cryptography Survey on Size Invariant Visual Cryptography Biswapati Jana 1,Gargi Hait 2,Shyamal Kumar Mondal 3 1 Assistant Professor, Department of Computer Science, Vidyasagar University, PaschimMedinipur, 2 Student,

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

A Simple Scheme for Visual Cryptography

A Simple Scheme for Visual Cryptography 135 Mihir Das 1, Jayanta Kumar Paul 2, Priya Ranjan Sinha Mahapatra 3, Dept. of Computer Sc. & Engg., University of Kalyani, Kalyani, India, E-mail:das.mihir20@gmail.com 1, E-mail:jayantakumar18@yahoo.co.in

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares Ahmad Zaky 13512076 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi

More information

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY Naoyuki Awano Department of Computer and Information Science, Seikei University, Tokyo, Japan ABSTRACT Using

More information

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Sathiya K 1, Senthamilarasi K 2, Janani G 3, Akila victor 4 1,2,3 B.Tech CSE, VIT University, Vellore-632014. 4 Assistant Professor,

More information

Digital Image Sharing using Encryption Processes

Digital Image Sharing using Encryption Processes Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University

More information

Secret Sharing Image Between End Users by using Cryptography Technique

Secret Sharing Image Between End Users by using Cryptography Technique Secret Sharing Image Between End Users by using Cryptography Technique SRINIVASA RAJESH KUMAR D. M.Tech Scholar Department of CSE, B V C Engineering college, Odalarevu P.MARESWARAMMA Associate Professor

More information

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Least-Significant-Bit

More information

Visual Secret Sharing Based Digital Image Watermarking

Visual Secret Sharing Based Digital Image Watermarking www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,

More information

Coverless Text Information Hiding Method Using the Frequent Words Hash

Coverless Text Information Hiding Method Using the Frequent Words Hash International Journal of Network Security, Vol.19, No.6, PP.1016-1023, Nov. 2017 (DOI: 10.6633/IJNS.201711.19(6).18) 1016 Coverless Text Information Hiding Method Using the Frequent Words Hash Jianjun

More information

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone Surabhi Tiwari MTech Scholar, DC (ECE), TIEIT Bhopal (RGPV), India Neetu Sharma AP, ECE, TIEIT Bhopal (RGPV),

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

Progressive sharing of multiple images with sensitivity-controlled decoding

Progressive sharing of multiple images with sensitivity-controlled decoding Chang et al. EURASIP Journal on Advances in Signal Processing (2015) 2015:11 DOI 10.1186/s13634-015-0196-z RESEARCH Progressive sharing of multiple images with sensitivity-controlled decoding Sheng-Yu

More information

Copyright protection scheme for digital images using visual cryptography and sampling methods

Copyright protection scheme for digital images using visual cryptography and sampling methods 44 7, 077003 July 2005 Copyright protection scheme for digital images using visual cryptography and sampling methods Ching-Sheng Hsu National Central University Department of Information Management P.O.

More information

A Recursive Threshold Visual Cryptography Scheme

A Recursive Threshold Visual Cryptography Scheme A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

Fixed Unmitigated Image Cryptography Schemes

Fixed Unmitigated Image Cryptography Schemes IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

Dual Visual Cryptography Using the Interference Color of Birefringent Material

Dual Visual Cryptography Using the Interference Color of Birefringent Material Journal of Software Engineering and Applications, 2017, 10, 754-763 http://www.scirp.org/journal/jsea ISSN Online: 1945-3124 ISSN Print: 1945-3116 Dual Visual Cryptography Using the Interference Color

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis Pavan Kumar Gupta et al,int.j.comp.tech.appl,vol 3 (1), 17-22 Halftone based Secret Sharing Visual Cryptographic Scheme for Color using Bit Analysis Pavan Kumar Gupta Assistant Professor, YIT, Jaipur.

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

Block Truncation Coding (BTC) Technique for Regions Image Encryption

Block Truncation Coding (BTC) Technique for Regions Image Encryption Block Truncation Coding (BTC) Technique for Regions Image Encryption Shaymaa Abed Yasseen Alkufi 1, Professor Hind Rustum Mohammed 2, Mohammed S. Mechee 3 1,2,3 Faculty of Computer Science & Mathematics,

More information

Image Encryption Based on New One-Dimensional Chaotic Map

Image Encryption Based on New One-Dimensional Chaotic Map Image Encryption Based on New One-Dimensional Chaotic Map N.F.Elabady #1, H.M.Abdalkader *2, M. I. Moussa #3,S. F. Sabbeh #4 # Computer Science Department, Faculty of Computer and Informatics, Benha University,

More information

A Novel Technique in Visual Cryptography

A Novel Technique in Visual Cryptography International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2

More information

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep. 978-1-4673-2451-9/12/$31.00 2012 IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. aesons@kookmin.ac.kr Dong-Guk Han

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Progressive Color Visual Cryptography

Progressive Color Visual Cryptography 1 Progressive Color Visual Cryptography (Final version of the manuscript ID: JEI03158) Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli School of Computing, National University of Singapore Singapore 117543 This

More information

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 Objective: Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1 This Matlab Project is an extension of the basic correlation theory presented in the course. It shows a practical application

More information

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2

More information

REVERSIBLE data hiding, or lossless data hiding, hides

REVERSIBLE data hiding, or lossless data hiding, hides IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,

More information

Colored Image Ciphering with Key Image

Colored Image Ciphering with Key Image EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 5/ August 2016 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Colored Image Ciphering with Key Image ZAINALABIDEEN ABDULLASAMD

More information

Dynamic Collage Steganography on Images

Dynamic Collage Steganography on Images ISSN 2278 0211 (Online) Dynamic Collage Steganography on Images Aswathi P. S. Sreedhi Deleepkumar Maya Mohanan Swathy M. Abstract: Collage steganography, a type of steganographic method, introduced to

More information

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2 RESEARCH ARTICLE Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2 1 M.Tech. Scholar, Raipur Institute of Technology

More information

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 12, NO. 5, May. 2018 2348 Copyright c 2018 KSII Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Peng-Cheng

More information

A New network multiplier using modified high order encoder and optimized hybrid adder in CMOS technology

A New network multiplier using modified high order encoder and optimized hybrid adder in CMOS technology Inf. Sci. Lett. 2, No. 3, 159-164 (2013) 159 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020305 A New network multiplier using modified high order encoder and optimized

More information

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding

Reversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School

More information

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 60 Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique 1 Mr.A.Duraisamy, 2 Mr.M.Sathiyamoorthy,

More information

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation International Journal of Emerging Engineering Research and Technology Volume 2, Issue 8, November 2014, PP 40-44 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Data Security Using Visual Cryptography

More information

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India

More information

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Cheating Prevention in Visual Cryptography using. Steganographic Scheme Cheating Prevention in Visual Cryptography using Steganographic Scheme Biswapati lana Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: biswapatijana@gmail.com)

More information

Solutions to Exercises Chapter 6: Latin squares and SDRs

Solutions to Exercises Chapter 6: Latin squares and SDRs Solutions to Exercises Chapter 6: Latin squares and SDRs 1 Show that the number of n n Latin squares is 1, 2, 12, 576 for n = 1, 2, 3, 4 respectively. (b) Prove that, up to permutations of the rows, columns,

More information

Comparative Histogram Analysis of LSB-based Image Steganography

Comparative Histogram Analysis of LSB-based Image Steganography Comparative Histogram Analysis of LSB-based Image Steganography KI-HYUN JUNG Department of Cyber Security Kyungil University 50 Gamasil-gil, Hayang-eup, Gyeongsan-si, Gyeongbuk 38428 REPUBLIC OF KOREA

More information

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography P.Mohamed Fathimal 1, Dr.P.Arockia Jansi Rani 2 Abstract Visual Cryptography is a cryptographic technique

More information

Visual Secrete Sharing by Diverse Image Media

Visual Secrete Sharing by Diverse Image Media www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11615-11620 Visual Secrete Sharing by Diverse Image Media Aparna Bhosale 1, Jyoti

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING 1 P.Lakshmi, 2 S.Baskari ABSTRACT -- Visual cryptography is a popular solution for image encryption. The encryption

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Image Enhancement using Histogram Equalization and Spatial Filtering

Image Enhancement using Histogram Equalization and Spatial Filtering Image Enhancement using Histogram Equalization and Spatial Filtering Fari Muhammad Abubakar 1 1 Department of Electronics Engineering Tianjin University of Technology and Education (TUTE) Tianjin, P.R.

More information

LSB Encoding. Technical Paper by Mark David Gan

LSB Encoding. Technical Paper by Mark David Gan Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.

More information

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding I.J.Computer Network and Information Security, 2014, 2, 54-60 Published Online January 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2014.02.08 An EVCS for Color Images with Real Size Image

More information

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION Moiré Cryptography Yvo Desmedt Department of Computer Science PO Box 4530, Florida State University Tallahassee, FL 32306, USA, and Royal Holloway College University of London, UK. desmedt@cs.fsu.edu Tri

More information

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image. Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image.   Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2 Fifth International Conference on Fuzzy Systems and Knowledge Discovery n Efficient ethod of License Plate Location in Natural-scene Image Haiqi Huang 1, ing Gu 2,Hongyang Chao 2 1 Department of Computer

More information

Exploring Signature Schemes with Subliminal Channel

Exploring Signature Schemes with Subliminal Channel SCIS 2003 The 2003 Symposium on Cryptography and Information Security Hamamatsu,Japan, Jan.26-29,2003 The Institute of Electronics, Information and Communication Engineers Exploring Signature Schemes with

More information

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE (IJISE) 207, Vol. No. 5, Jan-Jun e-issn: 2454-6402, p-issn: 2454-82X AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE Dr. Rajesh Kumar Pathak, 2 Neha Jain Professor &Director GNCT Greater

More information

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Steganalytic methods for the detection of histogram shifting data-hiding schemes Steganalytic methods for the detection of histogram shifting data-hiding schemes Daniel Lerch and David Megías Universitat Oberta de Catalunya, Spain. ABSTRACT In this paper, some steganalytic techniques

More information

Some Cryptanalysis of the Block Cipher BCMPQ

Some Cryptanalysis of the Block Cipher BCMPQ Some Cryptanalysis of the Block Cipher BCMPQ V. Dimitrova, M. Kostadinoski, Z. Trajcheska, M. Petkovska and D. Buhov Faculty of Computer Science and Engineering Ss. Cyril and Methodius University, Skopje,

More information

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret

More information

A New Representation of Image Through Numbering Pixel Combinations

A New Representation of Image Through Numbering Pixel Combinations A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new

More information

Block Ciphers Security of block ciphers. Symmetric Ciphers

Block Ciphers Security of block ciphers. Symmetric Ciphers Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable

More information

Chapter 4 MASK Encryption: Results with Image Analysis

Chapter 4 MASK Encryption: Results with Image Analysis 95 Chapter 4 MASK Encryption: Results with Image Analysis This chapter discusses the tests conducted and analysis made on MASK encryption, with gray scale and colour images. Statistical analysis including

More information

DURING the past several years, independent component

DURING the past several years, independent component 912 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 4, JULY 1999 Principal Independent Component Analysis Jie Luo, Bo Hu, Xie-Ting Ling, Ruey-Wen Liu Abstract Conventional blind signal separation algorithms

More information

Image Encryption using Pseudo Random Number Generators

Image Encryption using Pseudo Random Number Generators Image Encryption using Pseudo Random Number Generators Arihant Kr. Banthia Postgraduate student (MTech) Deptt. of CSE & IT, MANIT, Bhopal Namita Tiwari Asst. Professor Deptt. of CSE & IT, MANIT, Bhopal

More information

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography using Sudoku Puzzle for Secured Data Transmission Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography

More information