Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Similar documents
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Secret Sharing Image Between End Users by using Cryptography Technique

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

International Journal of Advance Research in Computer Science and Management Studies

A Novel Technique in Visual Cryptography

An Overview of Visual Cryptography Schemes for Encryption of Images

Various Visual Secret Sharing Schemes- A Review

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Webpage: Volume 4, Issue VI, June 2016 ISSN

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

Fixed Unmitigated Image Cryptography Schemes

Evaluation of Visual Cryptography Halftoning Algorithms

Visual Secrete Sharing by Diverse Image Media

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A Recursive Threshold Visual Cryptography Scheme

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Visual Cryptography for Face Privacy

A Simple Scheme for Visual Cryptography

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

Secured Bank Authentication using Image Processing and Visual Cryptography

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Survey on Size Invariant Visual Cryptography

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Digital Image Sharing using Encryption Processes

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Dual Visual Cryptography Using the Interference Color of Birefringent Material

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Novel Watermarking Technique Based on Visual Cryptography

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Visual Secret Sharing Based Digital Image Watermarking

Progressive Color Visual Cryptography

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Meta-data based secret image sharing application for different sized biomedical

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Moiré Cryptography. Yvo Desmedt. Tri Van Le. ABSTRACT 1. INTRODUCTION

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Copyright protection scheme for digital images using visual cryptography and sampling methods

A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications

A Survey Paper on Visual Cryptography for Grey Scale Images

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

A Reversible Data Hiding Scheme Based on Prediction Difference

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Secret Image Sharing by Diverse Image Media

A New Compression Method for Encrypted Images

An Implementation of LSB Steganography Using DWT Technique

Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan

Image Compression Supported By Encryption Using Unitary Transform

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

A Novel (2,n) Secret Image Sharing Scheme

Bit-level based secret sharing for image encryption

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

An Integrated Image Steganography System. with Improved Image Quality

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

An Enhanced Least Significant Bit Steganography Technique

A Novel Visual Cryptography Coding System for Jam Resistant Communication

Unlinkability and Redundancy in Anonymous Publication Systems

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Direct Binary Search Based Algorithms for Image Hiding

Watermarking patient data in encrypted medical images

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Robust and Blind Spatial Watermarking in Digital Image

Dynamic Collage Steganography on Images

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Printed Document Watermarking Using Phase Modulation

Enhance Image using Dynamic Histogram and Data Hiding Technique

Hiding Image in Image by Five Modulus Method for Image Steganography

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Passport Authentication Using PNG Image with Data Repair Capability

RGB Intensity Based Variable-Bits Image Steganography

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Analysis of Secure Text Embedding using Steganography

Contrast Enhancement Based Reversible Image Data Hiding

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

A Lossless Image Compression Based On Hierarchical Prediction and Context Adaptive Coding

Transcription:

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology Coimbatore, Tamilnadu, India desiha@gmail.com Vishnu Kumar Kaliappan Department of Computer Science and Engineering, Jansons Institute of Technology Coimbatore, Tamilnadu, India vishnudms@gmail.com Abstract Visual cryptography is a fixed technique which allows visual information to be encrypted using an encoding system and decrypted by an automatic operation that doesn t need a terminal. A visual cryptography strategy (VCS) is a method of secret splitting strategy which converts a secret image into n portions of dual form.vcs is not highly-effective and highlyworth, because of the security issues. Due to various disadvantages of VCS, a popular method called extended visual cryptography strategy (EVCS) was developed, where the portion images are constructed to contain expressive cover images, thereby used for biometric security techniques. In this paper, we have proposed the effective dithering halftone technique for time reduction process on generating the halftone image and also for enlightening the visual quality of the secret image. The resulting strategy has good security and effective processing over the existing extended visual cryptography approach. Keywords- visual cryptography strategy (VCS), extended visual cryptography strategy (EVCS), dithering halftoning technique and secret splitting I. INTRODUCTION Visual cryptography is first presented by Naor and Shamir in 1994, is a secret splitting strategy, based on dual form [1]. The prime secret image is divided into n portions, which doesn t reveal any evidence of the prime secret. The n portions will be dispersed to n participants so that only by contraction all the portions will regenerate the secret image. kn, strategy generates n portions, but it More generally, a ( ) only compels k portions to contract to regenerate the secret image. Particularly, in a ( kn, ) threshold visual cryptography strategy (VCS), any suitable subset of participants should contain at least k participants, where k n. Visual cryptography has protection purpose based on biometrics [2]. The advantage over VCS is that it is simple and not complex and the disadvantages are size expansion of portions and low visual quality of the revealed image. This strategy does not have high quality and effect. The extended visual cryptography strategy (EVCS) which can construct expressive portion images to regenerate the prime secret was intended by Ateniese, Blundo and Stinson [3], where it gives a simple example of (2, 2) EVCS. The fixed VCS that have the same approach structure with the EVCS. In EVCS the portion images that are to be embedded contains expressive cover images. EVCS is similar to the technique of steganography. The purpose of EVCS is to avoid the custom reviews, because the portions of EVCS are communicative images, hence this makes very few chances of suspecting and detecting the portions. In [4] the embedded extended visual cryptography strategy (EEVCS) gives the overall good properties. By comparing the intended strategy with the existing strategies of well-known EVCS, the intended strategy has competitive visual quality. Besides, the EEVCS strategy has more specific advantages over these well-known EVCSs. In order to improve the modest visual quality of the image in [3, 4] an innovative technique named halftone visual cryptography was intended. The halftone process was intended to achieve the visual cryptography via halftoning. The halftone techniques used in [3, 4] gives a progress quality from the existing techniques. In [4] the dithering halftoning technique is used which gives good quality but the drawback is that when the dimension of the dithering matrix is less the halftone processing is slow. The intension of the research outlined in this paper is by enlarging the dimension of the halftone dithering matrix. By doing so the halftoning process timing is reduced. The rest of the paper is organized as follows. Some related works are reviewed in section II. II. RELATED WORK In this section, we give some explanation about VCS and EVCS and their use in our paper. 978-1-4799-685-3/15/$31. 215 IEEE

A. VCS kn VCS is to portion a dual secret image into n portions in [1]. The secret image can be revealed by combining any k portions. A ( kn, ) VCS consist of two collections of a b matrices C and C 1. To portion a white secret pixel chooses the portion matrix C and to portion a black secret pixel chooses the portion C. Then distribute each row of the chosen matrix to The concept of (, ) matrix 1 the corresponding portion as the block of sub-pixels. Example 1: Two basis matrices of (2, 2) VCS are constructed by Naor and Shamir s strategy as follows: advantage of EEVCS is that, it is very secure in hiding the secret portions into the cover images that cannot be easily retrieved by an unauthorized member. In [3] the (2, 2) EVCS there is pixel expansion in the recovered image, this drawback is avoided in [5], Figure. 2 shows the input images for (2, 2) EVCS (a) Cover image 1(b) Cover image 2 (c) Secret image. (a) (b) B 1 = 1 B 1 1= 1 The two portion matrices C and C 1 are constructed from the basis matrices B and B 1 by permuting the columns of B and B 1, respectively. Figure. 1 (a) Secret image; (b) Portion 1; (c) Portion 2; (d) Revealed secret image. (c) Figure 2: An example of (2, 2) EVCS input images (a) Cover image 1 (b) Cover image 2 (c) Secret image (cited in [5]) (d) (a) (e) (b) (c) (d) Figure 1: An example of (2,2) VCS (a) Secret image (b) Portion 1 (c) Portion 2 (d) Recovered secret image (cited in [1]) B. EVCS An Extended Visual Cryptography Strategy (EVCS) is a kind of VCS which consist of expressive images, when compared to the random portions of fixed VCS. EVCS is also treated as a technique of steganography. A construction of EVCS is realized by embedding the secret portions into expressive cover images and we call it as embedded EVCS. When comparing the result of EEVCS result in [4] to some of the well-known EVCSs intended in recent years has a competitive visual quality in the literature. The specific (f) Figure. 3: Shows the Embedded cover images and Recovered secret image of (2, 2) EVCS (d) Embedded Portion 1 image (e) Embedded Portion 2 image (f) Recovered secret image (cited in [5]) The Figure. 3 shows the embedded cover images and recovered secret image (d) Embedded Portion 1 image (e) Embedded Portion 2 image (f) Recovered secret image. The recovered secret image is got by combining (d) and (e) image will regenerate the prime secret image (f). III. SYSTEM ARCHITECTURE The overall system flow chart is shown in Figure. 4 that shows the detailed flow of the whole working of the system intended in step by step. Each processing is explained in detail in the subdivision of A, B and C, respectively. Step 1: Input images like Cover image 1, Cover image 2 and Secret image. Step 2: Convert the secret image to gray secret image. Step 3: Use the converted image for halftone process to get the halftone secret image.

Step 4: The output halftone secret image is used as an input for portion generation. Here, secret portion 1 and portion 2 images are generated. Step 5: The generated portion 1 and portion 2 are embedded into the cover images. The portion 1 is embedded into the cover image 1 and portion 2 into the cover image 2. Step 6: The embedded portion images are fed into the extraction process, where the extraction of portion images from cover images are done. And the extracted portions are combined together to recover the prime secret image. {,..., cd} as the gray-level of a pixel in the prime, the g image. Normally, for an input image I of size p halftoned process will move over each pixel in I. The intended halftoning process moves on each pixel in I as explained in Algorithm 1. 1 2 3 4 5 6 7 8 9 Figure. 5: Shows the patterns of dithering matrix D of ten gray-level,..., 9 (cited in [4]) q Figure. 4: Shows the system flow chart A. Pre-processing In this first phase, we have loaded the input images for halftoning process. The secret image is converted into gray image and the converted image is used for halftone process. In the intended work the pattering dithering halftone technique is used for generating the halftone image. This dithering halftone technique is used to produce halftoned pattern at the position of the pixel x. The dithering matrix c d is denoted as D.The entries, denoted as Dij for i c 1 and i d 1, of the dithering matrix between and cd 1.Note that Algorithm 1: The halftoning process for each pixel x in image I : Input: c d dithering matrix D and a pixel x with g as gray-level in input image I Output: The halftoned pattern at each location of the pixel x For i = to c 1 do For j = to d 1do If g D then print a black pixel at the location (i, j); ij Else print a white pixel at location (i, j); Example 2: Dithering matrix D is shown below. k n Dithering matrix D with ten gray-levels D = 8 6 7 3 4 5 2 1 The above dithering matrix D is taken as example, the patterns of gray-levels,...,9 are shown in Figure. 5.If the gray-levels of all the pixels in the image I are smaller than 4, then the locations corresponding to D, D1, D2, D 11 and D12 are always black even after halftoning, where Dij indicates the ith row and jth column of D. The drawback in [4] is that, as the gray-level decreases the halftoned image produced will become darker. The outcome of the image won t be in good quality. In order to avoid this drawback the patterning halftone is removed and a new enhancement is done here for progress quality as well as for time reduction in halftone process. The enhanced algorithm for dithering halftoning technique is shown in the Algorithm 2.

B. Embedding the generated portions Embedding is the second phase; the secret image generates two or more portions, where EVCS is used for embedding each portion into the expressive cover images. The n portions are given as input, with the corresponding VCS ( C, C ) with pixel expansion m and secret image I. The 1 output produced will be having n embedded portions e, e1,..., en 1. For doing this, divide the portions t m subpixels each. Choose into blocks that contain ( ) m embedding positions in each block in the n covering portions. For each black pixel in I, randomly choose a portion matrix M C1 and for each white pixel in I, randomly choose a portion matrix M C. Embed the m sub pixels of each row of the portion matrix M into the m embedding positions. Hence the pixels in the embedding positions are replaced by the sub pixels of the portion matrix. Figure.6 showed below shows how the portions are embedded into the cover images... Portion 1 Portion 2 n Portions IV. ENHANCED EFFECTIVE DITHERING HALFTONING PROCESS The intended pattering dithering halftone algorithm in [4] is enhanced for its effective processing of time reduction and progress quality of image, as the intended algorithm in [4] is a time consuming process having no progress quality of the image. Algorithm 2: Enhanced Effective Dithering Halftoning Process Input: The dimension of the dithering matrix num is inputted. Output: The elapsed time for various dimensions is measured and a good visual quality halftoned image is generated Step 1: Enter the dimension value num for the dithering matrix as 2, 4, 8 or 16. Step 2: if num ==2 then B = B ; num (, i j ) Else if num ==4 then B = num Else if num ==8 then B = num Else if num ==16 then B = B ; B ; B num ; Else entered a wrong dimension value for the dithering matrix; 1 3 Step 3: Base matrix B = num (, i j ) 2 4 is calculated with the e e 1 en 1 + +..+ = Cover1 Cover 2 n covers Stacking 4 B + B 4 B + B B num = 2 4 B + B 4 B + B different dimension value num. ( num 2)/4 num (,) ( num 2)/4 num (,1) ( num 2)/4 num(1,) ( num 2)/4 num (1,1) Step 4: For i = to c 1 do for Portion 1 Portion 2... Figure.6: Shows the embedding of the generated portions C. Extracting the portions Extraction is the third phase, in order to extract the secret image the only process can be done by stacking the portions that were embedded. At this point, by stacking the embedded portions of the secret image is revealed, the t m subpixels that have not been embedded by the secret subpixels are black and the m subpixels that are embedded by the secret subpixels recover the secret image as the corresponding VCS does. Hence the secret image is recovered through extraction process. For j = to d 1 do If g D then print black pixel at position (i, j); ij Else print white pixel at position (i, j); V. EXPERIMENTAL RESULT The experimental results are shown in Figure. 7 shows the result of the loaded secret image and the converted gray secret image. The Figure. 8 shows the result of the halftoned image using dithering technique. The table I. gives the measurement of the time taken by the halftoning process, where the time reduction happens for various dimension of the dithering matrix. The 2 2 dimension of the dithering matrix

has the highest elapsing time as 33.336686 seconds. The 4 4dimension of the dithering matrix has the elapsing time 5.531581 seconds as less when compared to 2 2 dimension. The 8 8dimension of the dithering matrix has the elapsed time 5.438744 seconds as less when compared to 4 4 and 2 2 dimensions. The 16 16 dimension of the dithering matrix has the elapsed time 5.32152 seconds as less when compared to8 8, 4 4 and 2 2 dimensions. And the Figure. 9 shows the example result for 2 2 dimensions elapsed timing for halftoned image using dithering matrix in the command window. Table I: Measurement of timing for various dimensions Number of Results Dimension of the dithering matrix Elapsed time 1. 2x2 33.336686seconds 2. 4x4 5.531581 seconds 3. 8x8 5.438744 seconds 4. 16x16 5.32152 seconds VI. CONCLUSION In this paper, we have intended EVCS for embedding the random portions into the expressive covering portions. And also we have shown that using the pre-processing of halftone images, we are able to produce halftone image in good quality and also time reduction being done for halftoning process. The halftoning technique used in EVCS gives more advantages over conventional methods. Figure. 7: Experimental Result for input secret image and converted gray secret image Figure. 8: Experimental Result for Halftoned image using Dithering technique REFERENCES [1] M. Naor and A. Shamir, Visual cryptography, in EUROCRYPT 94 Proceedings, Lecture Notes in Computer Science, Springer-Verlag, vol. 95, pp. 1-12, 1995. [2] A. Ross and A. A. Othman, Visual Cryptography for Biometric Privacy, IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 7-81, 211 [3] G.Ateniese, C.Blundo, A.De Santis and D.R.Stinson, Extended Capabilities for Visual Cryptography, Theoretical Computer Science, vol. 25, pp. 143-161, 21. [4] Feng Liu and Chuankun Wu, Senior Members, IEEE, Embedded Extended Visual Cryptography Schemes, IEEE transactions on information forensics and security, vol.6, no. 2, June 211. [5] N.Askari, H.M.Heys, and C.R.Moloney, An Extended Visual Cryptography Scheme without pixel expansion for halftone images, 26th annual IEEE Canadian conference on electrical and computer engineering year 213. [6] Zhi Zhou, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Giovanni Di Crescenzo, Halftoning visual Cryptography, IEEE transaction on image processing, vol. 15, no. 8, august 26 2441 Figure. 9: Example result for 2 2 dimensions elapsed timing for halftoned image using dithering matrix.