Various Visual Secret Sharing Schemes- A Review

Similar documents
International Journal of Advance Research in Computer Science and Management Studies

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

An Overview of Visual Cryptography Schemes for Encryption of Images

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Secret Sharing Image Between End Users by using Cryptography Technique

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

A Novel Technique in Visual Cryptography

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Evaluation of Visual Cryptography Halftoning Algorithms

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Visual Cryptography Scheme for Color Images Using Half Toning Via Direct Binary Search with Adaptive Search and Swap

Webpage: Volume 4, Issue VI, June 2016 ISSN

Visual Secrete Sharing by Diverse Image Media

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Fixed Unmitigated Image Cryptography Schemes

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

Secured Bank Authentication using Image Processing and Visual Cryptography

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

Bidirectional Serpentine Scan Based Error Diffusion Technique for Color Image Visual Cryptography

Progressive Color Visual Cryptography

An Image Database Security Using Multilayer Multi Share Visual Cryptography

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Comparison of Various Error Diffusion Algorithms Used in Visual Cryptography with Raster Scan and Serpentine Scan

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

A Simple Scheme for Visual Cryptography

A Survey Paper on Visual Cryptography for Grey Scale Images

Bit-level based secret sharing for image encryption

Survey on Size Invariant Visual Cryptography

Copyright protection scheme for digital images using visual cryptography and sampling methods

Lossless Image Watermarking for HDR Images Using Tone Mapping

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

Direct Binary Search Based Algorithms for Image Hiding

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Multilevel Rendering of Document Images

A Comprehensive Investigation of Visual Cryptography and its Role in Secure Communications

Printed Document Watermarking Using Phase Modulation

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Digital Image Sharing using Encryption Processes

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

A Recursive Threshold Visual Cryptography Scheme

Visual Cryptography for Face Privacy

Contrast Enhancement Based Reversible Image Data Hiding

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Enhance Image using Dynamic Histogram and Data Hiding Technique

Half-Tone Watermarking. Multimedia Security

Authentication of grayscale document images using shamir secret sharing scheme.

Dual Visual Cryptography Using the Interference Color of Birefringent Material

An Implementation of LSB Steganography Using DWT Technique

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman, Student Member, IEEE

Study of 3D Barcode with Steganography for Data Hiding

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

Passport Authentication Using PNG Image with Data Repair Capability

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

Local prediction based reversible watermarking framework for digital videos

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE

Visual Secret Sharing Based Digital Image Watermarking

A New Compression Method for Encrypted Images

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015

A Novel Watermarking Technique Based on Visual Cryptography

Encoding Information in Clustered-Dot Halftones

Show-through Watermarking of Duplex Printed Documents

An Improved Fast Color Halftone Image Data Compression Algorithm

Watermarking patient data in encrypted medical images

Reversible Watermarking on Histogram Pixel Based Image Features

Comparison of various Error Diffusion Algorithms Used in Visual Cryptography with Raster scan

REVERSIBLE data hiding, or lossless data hiding, hides

Cluster-Dot Halftoning based on the Error Diffusion with no Directional Characteristic

Chapter 4 MASK Encryption: Results with Image Analysis

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

radial distance r

A Novel (2,n) Secret Image Sharing Scheme

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

DIGITAL halftoning is a technique used by binary display

On Filter Techniques for Generating Blue Noise Mask

A Novel Visual Cryptography Coding System for Jam Resistant Communication

Secret Image Sharing by Diverse Image Media

On Filter Techniques for Generating Blue Noise Mask

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

Medical Image Encryption and Compression Using Masking Algorithm Technique

Printing Devices. Lecture 10. Older Printing Devices. Ink Jet Printer. Thermal-Bubble Ink Jet Printer. Plotter. Dot Matrix Printer

FPGA implementation of DWT for Audio Watermarking Application

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Image Processing for Mechatronics Engineering For senior undergraduate students Academic Year 2017/2018, Winter Semester

Transcription:

Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Abstract Visual cryptography is a new which provides information security by using simple algorithm instead of the complex algorithms. Aim to focuses on the encryption s that are used in each scheme. This allows Visual information (pictures, text, etc) to be encrypted in such a way that their decryption can be performed by the human visual system without lot of computational power. This encrypts a secret image into such that stacking a sufficient number of reveals the secret image. Keywords- Contrast, Shares, Pixels, Secret sharing, stacking I. INTRODUCTION With the coming era of the internet more and more multimedia data are transmitted and exchanged on the network system with rapid speed. In electronic commerce there is a need to solve the problem of ensuring information safety in today s increasingly open network environment. The encryption is a very important field in the present era in which information security is an important issue in communication and storage of, the encrypting technologies of traditional cryptography are used to protect information security. With such technologies, the data become disordered after being encrypted and can then be recovered by a correct key. Without the correct key, the encrypted source content can hardly be detected even though unauthorized persons steal the data. Visual cryptography, an emerging cryptography technology, uses the characteristics of human vision to decrypt encrypted. It needs neither cryptography knowledge nor complex computation. For security concerns, it also ensures that hackers cannot perceive any clues about a secret image from individual cover. Visual Cryptography is a new Cryptography which is used to secure the. this divided the image into parts called and then they are distributed to the participants. The Decryption side just stacking the share gets the image. The basic principles of Visual Cryptography, each pixel of secret image are cryptographically encoded into m black and white subpixel in each share. If secret image pixel is white, this white pixel encode with a set of four subpixel each subpixel has equal probability it contains two of them white and two of them black, thus, the subpixel set gives no clue as the original value of pixel. When a decrypted subpixel has two white and two black pixels indicate that the decoded pixel is a white. On the other hand a decrypted subpixel having four black pixels indicates that the decoded pixel is black. 1

II. RELATED WORK Several new methods for VC have been introduced recently in the literature. Visual cryptography (VC) is a type of secret sharing scheme introduced by Naor and Shamir [1] proposed a k-out-of-n scheme of visual cryptography, a secret image is encoded in to n and distributed amongst n participants, one for each participant. No participant knows the share given to another participant. By stacking the k decode the secret image. Less than k cannot be decoded by secret image Ateniese [2] proposed a more general method for VC scheme based upon general access structure. The access structure is a specification of qualified and forbidden subsets of. The participants in a qualified subset can recover the secret image while the participants of forbidden subset cannot recover secret image. Chang-Chou Lin, Wen-Hsiang Tsai [3] proposed visual cryptography for gray level by dithering s. Instead of using gray sub-pixels directly to constructed, a dithering is used to convert gray level into and a visual cryptography method for is then applied to the resulting dither image. The advantages of this scheme reduce the size of image in ordinary situations. The decoded can reveal most details of original. M. S. Fu and O. C. Au, [4] proposed Joint visual cryptography and watermarking (JVW) algorithm. In this paper use a watermarking for visual cryptography. Both watermarking and visual cryptography involve a hidden secret image. For visual cryptography secret image encoded into, more are required to decode the secret image. For watermarking secret image embedded into watermark image. The (JVW) algorithm has the merits of visual cryptography and watermarking. It embeds the hidden pattern in two high visual share to prevent from hackers. Both must be required to extract the secret image. C. S. Hsu and Y. C. Hou [5] proposed a copyright protection scheme for digital based on visual cryptography and sampling method. This method can register multiple secret without altering the host image and can identify the rightful ownership without resorting to the original image. Nakajima [6] proposed extended visual cryptography for natural constructs meaningful as. This will encode secrets image more securely in to a and also describes the contrast enhancement method to improve the of the output. Zhou et al. [7] used halftoning methods to produce good in VC. In visual cryptography a secret pixel is encoded into an array of Q1 x Q2 sub pixels, is called as cell, in each of the n. By using cells with an appropriate size, visually pleasing can be obtained. Also maintains contrast and security. E. Myodo [8] proposed a method to generate meaningful using threshold arrays. Hou [9] proposed a new approach on visual cryptography for colored. In this paper two s used technology and color decomposition for both gray-level and color visual cryptography. In color decomposition, every color on a color image can be decomposed into three primary colors: C, M, and Y. With the technology, we can transform a gray-level image into a image. This method expand every pixel of a color secret image into a 2 2 block in the sharing 2

and keep two color and two transparent pixels in the block. Wang et. al. [10] produced share by using error diffusion s. This scheme generates more pleasing and diffused errors to neighbor pixels. Jin, D., Yan, and Kankanhalli [11] proposed a new encoding method that transform gray-scale and color into monochrome image without loss of any information. This new encoding scheme allows perfect recovery of the secret grayscale or color image. V. Rijimen [12] presented a 2-out-of-2 VC scheme by applying the idea of color mixture. Stacking two with different colors rises a third mixed color. Koga and Yamamoto [13] used a lattice structure to define the mixing result of arbitrary two colors. It is more desirable to generate meaningful which are less suspicious of encryption. III. PRELIMINARIES In this section, we give a brief description of VC, color models in VC and error diffusion. A. Fundamentals of VC Visual cryptography scheme encrypts a secret message into to be distributed to participants. By stacking the sufficient numbers of reveal the secret image. A black and white (k,n) VC scheme consists of two collections of matrices and, having elements 0 for a black pixel and 1 for a white pixel. To encrypt a white (black) pixel, a user randomly chooses one of the matrices and distributes its rows to the participants. B. Color Models The additive and subtractive color models are widely used to describe the constitutions of colors. In terms of RGB model, each color is mixed with red, green, and blue, which are the three primary colors of light. This model is commonly used for on-screen display. Therefore, RGB model is also called additive model. On the other hand, CMY model is called subtractive model. For CMY model, each color is mixed with cyan, magenta, and yellow, which are the three primary colors of pigments. This model is commonly used for color printing. IV. ENCRYPTIONAND DECRYPTION PROCESS 1. Pre-Processing In Preprocess scan the input image for increase intensity of image, image enhancement and avoid the illumination problems by using threshold method. 2. Halftone Conversion The general printer, such as dot matrix Printers, laser printers, and jet printers, can only control single pixel to be printed (black pixel) or not to be printed (white pixel), instead of displaying the gray level or the color tone of an image directly. As such, the way to represent the gray level of is to use the density of printed dots; Transform the continuous-tone image into a image is called halftoning. The main idea of halftoning is utilize the density of Printed dots to simulate the grey scale of pixels. For human eyes, the denser the dots are, the darker the image and sparser dots are lighter the image. 3. Creation of Shares Visual cryptography encrypts a secret image into ; the are usually presented in transparencies. The basic matrices S0 and S1 are used for generate the. 4. Error diffusion Error diffusion is a neighborhood operation that quantizes the current input pixel and 3

then transfers the quantization error onto future input pixels. The color error diffusion methods reduces the color sets that render the image and chooses the color from sets by which the desires color may be rendered and whose brightness variation is minimal. The Error diffusion is a dispersed dot dither method. In this method for each point in the image find the closest color available and calculate the difference between the value in the image and the color. 5. Stacking of Shares In the decryption process the color image channels are reconstructed by stacking the of channels. The stacking (OR) operation is performed between the, to recover the secret image. 6. Post-processing The stacked results in an image where the some pixels will show the required information. But other pixels are randomly distributed. To avoid this noise, the of post-processing is applied on this image. V. COMPARATIVE ANALYSIS This Part compares the features of some of the visual secret sharing schemes that were analyzed and studied in the literature. The Table.1 depicts the comparison between some of the VSS schemes focusing mainly on their encryption and their advantages and limitation. Techni que k-outof-n scheme Characteris tics A secret image is encoded into n and are distributed into n Advantag es provide security of Limitati ons secret cannot be decoded by any or fewer participants General access Structure Dither Extende d VC for natural void & cluster Color Decom- Position And Halftone Technique participants at least k are required to decode the image. Access structure is a specificatio n of all qualified and forbidden subsets of n This is used to convert gray level image into. it construct meaningful as for threshold array use generated by void & cluster method. Color image decompose into three primary color& the technology transform gray-level image into general access structure is better for pixel expansion This increase in size& of o/p image it suitable for natural The high share & high speed of processing it decrease the pixel expansion & provide better due to representa tion of color of pixel. only qualified decrypt the secret image not forbidden this scheme is not useful for color It generate meaningf ul but its poor It is not useful of color Contras loss on decrypte d loss the informati on due to Process. 4

VI. CONCLUSION This paper does analysis of different visual cryptography scheme and a comparative study has been done. In order to hide the secret information we go for expansion and increasing of the number of, but this affects the resolution. Therefore, an optimum number of are required to hide the secret information. There are different kinds of visual secret sharing s are used. This encrypts a secret image into such that stacking a sufficient number of reveal secret image. REFERENCES [1] M. Naor and A. Shamir, Visual cryptography, in Proc. EUROCRYPT, 1994, pp. 1 12. [2] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, Visual cryptography for general access structures, Inf. Comput., pp. 86 106, 1996. [3] C. C. Lin and W. H. Tsai, Visual cryptography for gray-level by dithering s, Pattern Recognit. Lett., vol. 24, pp. 349 358,2003. [4] M. S. Fu and O. C. Au, Joint visual cryptography and Watermarking, in Proc. IEEE Int Conf. Multimedia Expo, 2004, pp. 975 978. [5] C. S. Hsu and Hou, Copyright protection scheme for digital using visual cryptography and sampling methods, Opt.Eng.vol.44, p.077003, 2005. [6] M. Nakajima and Yamaguchi, Extended VC for natural, J. WSCG, vol. 10, no. 2, 2002. [7] Z. Zhou, G. R. Arce, and G. D. Crescenzo, Halftone visual cryptography, IEEE Trans. Image Process., vol. 18, no. 8, pp. 2441 2453,Aug. 2006. [8] E. Myodo, S. Sakazawa, and Y. Takishima, Visual cryptography based on void-and-cluster halftoning, in Proc. IEEE Int. Conf. Image Process., 2006, pp. 97 100. [9] Y. C. Hou, Visual cryptography for color, Pattern Recognit., vol. 36, pp. 1619 1629, 2003 [10] Z. M. Wang, G. R. Arce, and G. Di Crescenzo, Halftone visual cryptography via error diffusion, IEEE Trans. Inf. Forensics Security, vol. 4 pp 383 396, Sep. 2009. [11] Jin, D., Yan and Kankanhalli, M.S.,Progressive color visual cryptography. J. Electron. Imaging. v14. [12] V. Rijimen and B. Preneel, Efficient color visual encryption for shared colors of benetton, presented at the Proc. Eurocrypto Rump Session, 1996 [Online]. [13] H. Koga and H. Yamamoto, Proposal of a lattice-based visual secret sharing scheme for color and gray-scale, IEICE Trans. Fundamentals, vol. E81-A, no. 6, pp. 1262 1269, Jun. 1998. [14] ] R. A. Ulichney, Dithering with blue noise, Proc. IEEE, vol. 76, no. 1, pp. 56 79, Jan. 1988. [15] R. Lukac and K. N. Plataniotis, Colour image secret sharing, Electron. Lett., vol. 40, no. 9, pp. 529 531, Apr. 2004. [16] C. N. Yang and T. S. Chen, Visual cryptography scheme based on additive color mixing, Pattern Recognit., vol. 41, pp. 3114 3129, 2008. [17] D. L. Lau and G. R. Arce, Modern Digital Halftoning. New York: Marcel Dekker, 2001 [18] D. L. Lau, G. R. Arce, and N. C. Gallagher, Digital halftoning by means of green-noise masks, J. Opt. Soc. Amer. A, vol. 16, no. 7, pp. 1575 1586, Jul. 1999. [19] D. L. Lau, G. R. Arce, and N. C. Gallagher, Digital color halftoning with generalized error diffusion and multichannel green-noise masks, IEEE Trans. Image Process., vol. 9, no. 5, pp. 923 935, 2000. [20] S. J. Shyu, Efficient visual secret sharing scheme for color, Pattern Recognit., vol. 39, no. 5, pp. 866 880, May 2006. 5