Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Similar documents
Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

A Novel Technique in Visual Cryptography

International Journal of Advance Research in Computer Science and Management Studies

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

Evaluation of Visual Cryptography Halftoning Algorithms

Various Visual Secret Sharing Schemes- A Review

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Secret Sharing Image Between End Users by using Cryptography Technique

An Overview of Visual Cryptography Schemes for Encryption of Images

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Visual Secrete Sharing by Diverse Image Media

Webpage: Volume 4, Issue VI, June 2016 ISSN

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Survey on Size Invariant Visual Cryptography

Digital Image Sharing using Encryption Processes

A Novel Visual Cryptography Coding System for Jam Resistant Communication

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Secured Bank Authentication using Image Processing and Visual Cryptography

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Fixed Unmitigated Image Cryptography Schemes

Chapter 4 MASK Encryption: Results with Image Analysis

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Visual Cryptography for Face Privacy

A Simple Scheme for Visual Cryptography

Meta-data based secret image sharing application for different sized biomedical

A Novel Watermarking Technique Based on Visual Cryptography

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Progressive Color Visual Cryptography

Concealing Data for Secure Transmission and Storage

A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE

Dual Visual Cryptography Using the Interference Color of Birefringent Material

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Survey Paper on Visual Cryptography for Grey Scale Images

Medical Image Encryption and Compression Using Masking Algorithm Technique

Watermarking patient data in encrypted medical images

A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Printed Document Watermarking Using Phase Modulation

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Image Steganography with Cryptography using Multiple Key Patterns

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

A basic guitar is a musical string instrument with six strings. In standard tuning they have the notes E, A, D, G, B and E

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Enhance Image using Dynamic Histogram and Data Hiding Technique

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Design and Implementation of Game Based Security Model to Secure the Information Contents

Secret Image Sharing by Diverse Image Media

Analysis of Secure Text Embedding using Steganography

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Visual Secret Sharing Based Digital Image Watermarking

An Implementation of LSB Steganography Using DWT Technique

Some Cryptanalysis of the Block Cipher BCMPQ

Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE

Copyright protection scheme for digital images using visual cryptography and sampling methods

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

A Recursive Threshold Visual Cryptography Scheme

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2

An Enhanced Least Significant Bit Steganography Technique

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

Steganography using LSB bit Substitution for data hiding

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India. P = [ p

Study of 3D Barcode with Steganography for Data Hiding

A Novel (2,n) Secret Image Sharing Scheme

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Fig 1: Error Diffusion halftoning method

JOINT BINARY CODE COMPRESSION AND ENCRYPTION

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Local prediction based reversible watermarking framework for digital videos

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Colored Digital Image Watermarking using the Wavelet Technique

Transcription:

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR Sathiya K 1, Senthamilarasi K 2, Janani G 3, Akila victor 4 1,2,3 B.Tech CSE, VIT University, Vellore-632014. 4 Assistant Professor, SCSE, VIT University, Vellore-632014. Abstract: The core objective of this paper is to increase the visual quality of the secret image which is obtained after superimposed using XOR operation in the two-half toned shares and to compare the visual cryptographic algorithms. In this paper, for encoding we are using halftone technique. We can obtain the halftone image by applying three algorithms Floyd, Jarvis, Stucki algorithm and reverse halftone image by pixel reversal technique in halftone image. On applying XOR operation to shares, the method is expected to give the good quality of the decoded image. Keywords: halftone, Floyd, Jarvis, Stucki, pixel reversal. 1. INTRODUCTION In cryptography, Encryption is the technique which converts the data into a cipher text that cannot be easily understood by illegal people. Decryption is the method of converting encrypted data into its original. Visual cryptography (VC) is used to hide secrets in images and decrypted by the human visual scheme if the key image matches. It is unfeasible to recover that secret from one of those shares. We can use the techniques for any number of shares. Here we implement it for two shares. It can be used in number of applications like Remote Electronic Voting, Bio metric authentication, Banking Customer Identification, Message Concealment etc value of p. Now consider the superposition of the two shares as shown in the last column of Fig. 1. If a pixel is white, the superposition of the two shares always shows one black and one white sub pixel. If p is black, it yields two black sub pixels. There is a contrast loss in the decoded image. To reduce the contrast loss we applied XOR. For example the input image fig2 (a) converted into halftone image fig2 (c) and reverse halftone image fig2 (d). Secret image pixels fig2 (b) are embedded in share1 fig2 (e) and share2 fig2 (f). When we overlap the shares we get the output as shown in fig2 (g). Figure 1 VC Principle For exemplifying VC, [2] we consider the two out-of-two visual scheme. Here each pixel p of the Secret Image (SI) is encoded into a pair of sub pixels in each of the two shares. If pixel p is white, one of the two rows under the white pixel in Fig1 is selected. If pixel p is black, one of the two rows under the black pixel is selected. The selection is performed by each row has 1/2 probability to be chosen. So, in the selected row the first two pairs of sub pixels are assigned to share 1 and share 2, respectively. An individual share gives no clue as to the Figure 2 Visual Cryptography Examples Volume 2, Issue 2 March April 2013 Page 273

2. Background Figure 7 Pixel Reversal Halftone image and secret information pixels will be in share1 as well as reverse halftone image and secret information pixels will be in share2 as shown in fig3 which is proposed method. Figure 3 Proposed Method On applying error diffusion technique we obtained halftone image. In Error diffusion, error is distributed to neighbouring pixels which have not yet been processed. For selecting the pixel position we are using void and cluster algorithm. [1] For encoding, we are converting the secret pixel p into 2 x 2 matrixes. Each of the two shares, only two pixels represents the secret information pixels. Fig 8 is explained as the position of the secret information pixel (A, B) should be same in both shares. If the pixel value is zero (white), a matrix M is randomly selected from the matrix collection R 1. Figure 4 Floyd s Error Diffusion If the pixel position is one (black), a matrix M is randomly selected from the matrix collection R 2. It can also be found that if p is white, either pixel A is white in two shares or B is white in two shares. Otherwise p is black. Figure 5 Jarvis Error Diffusion Figure 6 Stucki Error Diffusion To get the reverse halftone image, we are applying the pixel reversal in the halftone image. Pixel reversal is a technique which converts the white pixels to black and vice versa. (0 becomes 1 and 1 becomes 0). => Superimpose two halftone cells (a), (b) from R 1 if p=0 or (c), (d) from R 2 if p=1. Figure 8 Pixel Selection Volume 2, Issue 2 March April 2013 Page 274

If we add those two shares, we can decode the secret image. This is the key for decryption. The decoded image is noticeably identified, even though some contrast loss is perceived. When we superimpose the shares with XOR we get the secret image in better visual quality. 3. Results Richa Fruit 3.3Visual Quality Table 3 (VISUAL QUALITY OF DECODE IMAGE) Einstein Text Logo 3.1 Histogram Error Table 1 (SECRET IMAGE VS FINAL IMAGE) 3.4 Time Efficiency Table 4 (TIME EFFICIENCY) 3.2 Error Diffusion Table 2 (INPUT IMAGE VS HALFTONE IMAGE) Volume 2, Issue 2 March April 2013 Page 275

(c) Halftone of Red channel (d) Halftone of Green channel (e) Halftone of Blue channel (f) share1 Figure 9 Time efficiency 4. Conclusion Here, we utilized the error diffusion and pixel reversal method. On applying the error diffusion we get the halftone image and reversing the pixels we get the reverse halftone image. Superimposing the shares we get the secret image, for better quality we are using the XOR operation. In terms of histogram error, among three algorithms give the same result but within the algorithm XOR operation will give the better result. Stucki algorithm gives the better visual quality than other algorithms. While comparing the algorithms, Floyd is little faster and the output of Stucki likely to be clean and sharp. Jarvis algorithm is good at error diffusion so it is slower than Floyd. Each algorithm is best for particular parameter. Based on our requirement, we use specific algorithm. Being a type of secret sharing scheme, visual cryptography can be used in number of applications including access control. Decryption algorithm is not required (Use a human Visual System). So a person who is new to cryptography can also decrypt the message. 5. Extended Work We are applying the same concept for colour images (bmp). Still, we are trying to improve the visual quality. (a) Input image (b) Secret image (g) share2 (h) share3 (i) Halftone image (j) Output image Figure 10 Visual Cryptography for colour images References [1] Zhi Zhou, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Giovanni Di Crescenzo, Halftone Visual Cryptography,vol.15, no.8, August 2006. [2] Sangeetha Devi, E... Enhanced visual secret sharing scheme via half toning technique,2012 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES, 2010. [3] L. A. MacPherson, Grey Level Visual Cryptography for General Access Structures, M.S. thesis, Univ.Waterloo, ON, Canada, 2002. [4] C. Blundo, A. De Santis, and M. Naor, Visual cryptography for grey level images, Inf. Process. Lett. vol. 75, pp. 255 259, 2000. Volume 2, Issue 2 March April 2013 Page 276

[5] G.Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Extended capabilities for visual cryptography, Theoret. Comput. Sci., vol. 250, no. 1 2, pp. 134 161, 2001. [6] M. Naor and A. Shamir, Visual cryptography, Adv. Cryptol.: EUROCRYPT,Lecture Notes Comput. Sci., vol. 950, pp. 1 12, 1995. [7] William Stallings cryptography and network security, 4th Edition. AUTHOR Ms. Sathiya K is currently pursuing her B.Tech degree in Computer Science and Software Engineering. Ms. Senthamilarasi K is currently pursuing her B.Tech degree in Computer Science and Database management. Ms. Janani G is currently pursuing her B.Tech degree in Computer Science and Software Engineering. Ms. Akila victor received her MSc software Engineering Degree in 2008 from Anna University Chennai and is also a university Rank holder and M.E degree in Computer Science and Engineering in 2010 from Anna University Tirunelveli, India. Presently working as an Asst.Prof in VIT University, Vellore. Her areas of interest are Image processing, Cryptography and Software Engineering. She has presented papers in national and international conferences in various fields. Volume 2, Issue 2 March April 2013 Page 277