A Novel Technique in Visual Cryptography

Similar documents
International Journal of Advance Research in Computer Science and Management Studies

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Various Visual Secret Sharing Schemes- A Review

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

An Overview of Visual Cryptography Schemes for Encryption of Images

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

Secret Sharing Image Between End Users by using Cryptography Technique

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Survey on Size Invariant Visual Cryptography

Visual Secrete Sharing by Diverse Image Media

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

Webpage: Volume 4, Issue VI, June 2016 ISSN

A Simple Scheme for Visual Cryptography

Secured Bank Authentication using Image Processing and Visual Cryptography

Evaluation of Visual Cryptography Halftoning Algorithms

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Visual Cryptography for Face Privacy

Fixed Unmitigated Image Cryptography Schemes

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

Meta-data based secret image sharing application for different sized biomedical

A Recursive Threshold Visual Cryptography Scheme

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

Progressive Color Visual Cryptography

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Dual Visual Cryptography Using the Interference Color of Birefringent Material

Analysis of Secure Text Embedding using Steganography

A Survey Paper on Visual Cryptography for Grey Scale Images

Printed Document Watermarking Using Phase Modulation

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE

A Novel (2,n) Secret Image Sharing Scheme

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

A Novel Watermarking Technique Based on Visual Cryptography

Digital Image Sharing using Encryption Processes

Watermarking patient data in encrypted medical images

A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Copyright protection scheme for digital images using visual cryptography and sampling methods

An Implementation of LSB Steganography Using DWT Technique

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Secret Image Sharing by Diverse Image Media

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Visual Secret Sharing Based Digital Image Watermarking

A Reversible Data Hiding Scheme Based on Prediction Difference

A Novel Visual Cryptography Coding System for Jam Resistant Communication

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Authentication of grayscale document images using shamir secret sharing scheme.

ISSN: [Khan* et al., 7(8): August, 2018] Impact Factor: 5.164

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

Passport Authentication Using PNG Image with Data Repair Capability

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Effective and Secure Method of Color Image Steganography

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

An Enhanced Least Significant Bit Steganography Technique

An Integrated Image Steganography System. with Improved Image Quality

Concealing Data for Secure Transmission and Storage

Local prediction based reversible watermarking framework for digital videos

Hiding Image in Image by Five Modulus Method for Image Steganography

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Contrast Enhancement Based Reversible Image Data Hiding

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

A Secure Image Encryption Algorithm Based on Hill Cipher System

Square Pixels to Hexagonal Pixel Structure Representation Technique. Mullana, Ambala, Haryana, India. Mullana, Ambala, Haryana, India

Enhance Image using Dynamic Histogram and Data Hiding Technique

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

A New Compression Method for Encrypted Images

Enhanced DCT Interpolation for better 2D Image Up-sampling

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Bit-level based secret sharing for image encryption

Some Cryptanalysis of the Block Cipher BCMPQ

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION

Transcription:

International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2 Working as Assistant Professor in, Holy Mary Institute of Technology and Science, Keesara, Affiliated to JNTU-Hyderabad, T.S, India Abstract: At the present time, in commercial, military and medical fields, the protections of susceptible information are most important concern. To resolve the reliability problems for secret images, a visual cryptography scheme is a good choice. Visual cryptography is a very protected and exclusive method to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image.unlike raditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and with out facility of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.in this paper we represent we represtnes the novel tachnique to hide secret information pixel into cover image with providing more visual quality of cover images compare to other technique. Keywords: Secret image sharing, cryptography,visual quality of image,pixel expansion I. INTRODUCTION 1994, Naor and Shamir [1] introduced a very interesting and simple cryptographic method called visual cryptography to protect secrets (Naor and Shamir, 1995). Basically, visual cryptography has two significant features. The first aspect is its perfect concealment, and the second feature is its decryption method which requires neither complex decryption algorithms nor the aid of computers. It uses only human visual system to identify the secret from the stacked image of some approved shares[2]. Therefore, visual cryptography is an incredibly approach to keep secrets while computers or other decryption devices are not available. (2, 2) visual cryptography scheme can be used to discuss fundamental visual cryptography.senders create two layers. Basically pixel expansion may be 2, 4, 8 etc[3]. we have taken pixel expansion 2. That means one pixel of our original image is replaced by 2 pixels in share image. If the pixel is white the sender takes any row from the last two rows of Figure 1.2 randomly and if the pixel is black, the sender takes any row from the first two rows of Figure 1.2 randomly. By overlapping the two shares as shown in the last row of figure 1.2 randomly. Fig.1.1-Construction of (2,2) VCS Scheme www.ijeijournal.com Page 57

. For example, in below for encryption bvm.bmp as taken as input secret image. Instead of sending secret image we send two encrypted images and for decryption we just superimpose two images, we will get result [3]. All thought we will not get clear image but we can visually visualize the content. ` Fig 1.2 Example of (2,2) VCS scheme[3] Visual cryptography is a method for fulfilling secret sharing activities in the environments with insufficient computing power [3]. Secure image sharing techniques overcome the traditional cryptographic approach, providing new solutions for the development of new and secure imaging applications. The important parameters of this scheme are a) Pixel expansion m, which refers to the number of pixels in a share used to encrypt a pixel of the secret image. This implies loss of resolution in the reconstructed image[6]. b) Contrast α, which is the relative difference between black and white pixels in the reconstructed image. This implies the quality of the reconstructed image[6]. The basic model of visual cryptography proposed by Naor and Shamir [1] accepts binary image I as secret image, which is divided into n number of shares. Each pixel of image I is represented by m sub pixels in each of the n shared images. The resulting structure of each shared image is described by Boolean matrix S Where S=[Sij] an [n x m] matrix Sij=1 if the j th sub pixel in the i th share is black Sij=0 if the j th sub pixel in the i th share is white When the shares are stacked together secret image can be seen but the size is increased by m times[6]. The grey level of each pixel in the reconstructed image is proportional to the hamming weight H(V) of the OR ed Vector V, where vector V is the stacked sub pixels for each original pixel[4]. II. HALFTONE VISUAL CRYPTOGRAPHY: Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo [4] proposed halftone visual cryptography. Halftone VC is built upon the basis matrices and collections available in conventional VC. In particular, in halftone VC a secret binary pixel p is encoded into an array of Q1 x Q2 subpixels referred to as a halftone cell, in each of n the shares[4]. The pixel expansion in halftone VC is thus Q1Q2. Generally, a square halftone cell obtained when,q1=q2 leads to undistorted reconstructed images and.by using halftone cells with an appropriate size, visually pleasing halftone shares can be obtained [4]. As shown in below figure 2.1, we can make three phase of this.in phase one we are converting our secret image into share of image by appling VC technique.in second phase we take one cover image which is grayscale image,convert into binary image by appling Error Diffusion method[5]. In third Phase we are hiding our secret share image pixel into cover image. www.ijeijournal.com Page 58

Fig 2.1 flow of halftone visual cryptography III. PROPOSED TECHNIQUE In the Basic technique when we are going to hide secret pixel into hafttone cell then, there are 2 pixel of the every halftone cell of cover image are change[5]. The reason is that we replacing cover image pixel with secret share image pixel.so the quality of secret cover image is distordes, to overcome this problem we are use a novel technique. Table 3 Overview of new technique. Table 3 overview of proposed technique As shown in above table 3, suppose we want to hide secret pixels as shown in first row into 4 halftonn cell size of cover image.here we are hiding our secret share pixels in to 1 and 3 number location of every halftone cell of cover image. As a result in every halftone cell pixels number 1 and 3 willl be replaced.to overcome this, we are findind secret image pixel pair in halftone cell and mark that pair location as a secret share image pixels locations. As a result, we are hiding share images pixels into cover image pixels www.ijeijournal.com Page 59

with out distoring cover image pixels.so quality of cover image pixel will be increased. IV. RESULT As shown in below table 4, we have taken different bmp images which are our cover images then on cover images,we are hiding secret share images with basic method and our new method. As we can see proposed technique results provide better visual quality. V. COMPARISION Peak-Signal-to-Noise Ratio, which is the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. PSNR expressed in terms of logarithmic decibel scale which is an approximation to human perception of reconstruction quality. Higher PSNR generally indicates that the reconstruction is of higher quality. Here, in table 5, we are finding PSNR between original image and after hiding secret image into cover image. We compare PSNR between our method and basic method. As we can see our porposed method gives better PSNR. \ Table 5: comparison between basic method and our porosed method VI. CONCLUSION In this paper introduction of visual cryptography is provided. This paper does gives antoher technique to hiding secret share images into cover image in halftone visual cryptography.as result says that by appling our proposed technique we can get better visual quality of cover images. www.ijeijournal.com Page 60

REFERENCES [1]. Moni Naor and Adi Shamir, Visual Cryptography, advances in cryptology Euro crypt, pp 1-12, 1995. [2]. J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572{3581,2008. [3]. Prashant B swadas, Samip Patel,Dhruti Darji, A comparatively study of visual cryptography., IJRET vol-3 [4]. Z. Zhou, G. R. Arce, and G. D.Crescenzo, Halftone visual cryptography, IEEE Trans. Image Process.,vol. 18, no. 8, pp. 2441 2453,Aug. 2006. [5]. Z. M. Wang, G. R. Arce, and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Security, vol. 4 pp 383 396, Sep.2009. [6]. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual cryptography for general access structures, Inf. Comput., vol. 129, no. 2, pp. 86 106, Sep. 1996. www.ijeijournal.com Page 61