A Recursive Threshold Visual Cryptography Scheme

Similar documents
AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Secured Bank Authentication using Image Processing and Visual Cryptography

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Secret Sharing Image Between End Users by using Cryptography Technique

Fixed Unmitigated Image Cryptography Schemes

International Journal of Advance Research in Computer Science and Management Studies

Visual Cryptography. Frederik Vercauteren. University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB.

Webpage: Volume 4, Issue VI, June 2016 ISSN

Steganography using LSB bit Substitution for data hiding

An Overview of Visual Cryptography Schemes for Encryption of Images

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Survey on Size Invariant Visual Cryptography

Digital Image Sharing using Encryption Processes

Various Visual Secret Sharing Schemes- A Review

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Analysis of Secure Text Embedding using Steganography

An Integrated Image Steganography System. with Improved Image Quality

Yale University Department of Computer Science

A Novel Technique in Visual Cryptography

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Implementation of Colored Visual Cryptography for Generating Digital and Physical Shares

Visual Secrete Sharing by Diverse Image Media

An Implementation of LSB Steganography Using DWT Technique

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Transform Domain Technique in Image Steganography for Hiding Secret Information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Lecture5: Lossless Compression Techniques

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

Cheating Prevention in Visual Cryptography using. Steganographic Scheme

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Progressive Color Visual Cryptography

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Visual Secret Sharing Based Digital Image Watermarking

Watermarking System Using LSB

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Copyright protection scheme for digital images using visual cryptography and sampling methods

Printed Document Watermarking Using Phase Modulation

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

A Reversible Data Hiding Scheme Based on Prediction Difference

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Data Representation 1 am/pm Time allowed: 22 minutes

A Simple Scheme for Visual Cryptography

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Dual Visual Cryptography Using the Interference Color of Birefringent Material

Contrast Enhancement Based Reversible Image Data Hiding

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Evaluation of Visual Cryptography Halftoning Algorithms

Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points

A New Image Steganography Depending On Reference & LSB

Passport Authentication Using PNG Image with Data Repair Capability

Five-Card Secure Computations Using Unequal Division Shuffle

Some Cryptanalysis of the Block Cipher BCMPQ

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

A Novel (2,n) Secret Image Sharing Scheme

Random Sequences for Choosing Base States and Rotations in Quantum Cryptography

Enhance Image using Dynamic Histogram and Data Hiding Technique

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

A Novel Visual Cryptography Coding System for Jam Resistant Communication

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

Visual Cryptography for Face Privacy

Commutative reversible data hiding and encryption

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online):

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

Meta-data based secret image sharing application for different sized biomedical

Hiding Image in Image by Five Modulus Method for Image Steganography

Dynamic Collage Steganography on Images

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Progressive sharing of multiple images with sensitivity-controlled decoding

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Keywords Secret data, Host data, DWT, LSB substitution.

A new quad-tree segmented image compression scheme using histogram analysis and pattern matching

An EVCS for Color Images with Real Size Image Recovery and Ideal Contrast Using Bit Plane Encoding

Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain

Digital Watermarking Using Homogeneity in Image

Transcription:

A Recursive Threshold Visual Cryptography cheme Abhishek Parakh and ubhash Kak Department of Computer cience Oklahoma tate University tillwater, OK 74078 Abstract: This paper presents a recursive hiding scheme for out of secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text. Keywords: recursive hiding of secrets, visual cryptography, secret sharing, information efficiency. Introduction Conventional secret sharing schemes [], which have several networking applications, are information theoretically very inefficient. For example, a ( k, n ) secret sharing scheme expands a secret of b bits into n shares each of at least b bits in size. Furthermore, since only k of these shares are needed to recreate the secret, each bit of any share, in a threshold secret sharing schemes, conveys at most / k bits of the secret. If k = n, as in the case of a non-threshold scheme, where all the shares must be brought together to recreate the secret, the information conveyed by each bit of any share is / n bits of the secret. An extension of secret sharing schemes is visual cryptography that aims at splitting images into two or more shares such that when a predetermined number of shares are aligned and stacked together, the secret image is revealed [],[], without the requirement of any computation. However, conventional approaches to visual cryptography also suffer from inefficiency in terms of number of bits of secret conveyed per bit of shares. Recursive hiding of secrets was proposed in [], with applications to both images and text, to increase the efficiency of visual cryptography and to make it possible to incorporate additional secret information that serves as a steganographic channel. The idea involved is recursive hiding of smaller secrets in shares of larger secrets with secret sizes doubling at every step, thereby increasing the information that every bit of share conveys to ( n ) / n bit of secret i.e. nearly 00%. However, the scheme described in [] is a non-threshold scheme where all the shares are needed to recreate the secret. In this paper, we extend the idea of recursive hiding of secrets to out of threshold scheme and apply it to both images and text. Further, the idea can be generalized to a out of n threshold scheme. However we deal with only binary images and regard each pixel as one bit of information, denoting black or white pixel.

The proposed scheme For text represented as a binary sequence, a out of secret sharing scheme can be developed on a comparison based algorithm as follows: we divide the secret bit into pieces p, p, and p such that p = p = p if we wish to encode bit 0, and p p p if we wish to encode bit. It is clear that to satisfy the above conditions we would need at least symbols, say 0, and. Therefore to encode bit 0 we could create pieces p p p as 000,, or. Whereas the candidates to encode bit would be 0 and all possible permutations of it, i.e. 0, 0, 0, 0, and 0. In all, to encode secret bit 0 and secret bit, we have and 6 possibilities, respectively, out of which any one can be chosen to satisfy our requirement based on the secret encoded. Example: If is a 7 bit long message that we wish to encode into shares and the threshold is, then the shares,, and may be created as follows: : 00000000000 : 00000000000 : 000000000 : 00000000000 Viewed as a ternary alphabet, the efficiency of this system is %. If 0, and are encoded using prefix coding as 0, 0, and respectively, then we are effectively mapping each bit of secret into 5 bits of shares and the efficiency is only 7 /(7 5) = / 5, i.e. 0%. The above efficiency can be improved by recursively hiding secrets in the shares of. However, since each bit is mapped into shares, in order to take advantage of the recursive technique, the secrets at each step must increase by a factor of. We can then hide the following secrets,, and in,, and as follows: ecret : 0 : 00 0 0 00 : 000 00 000 0000 hares

: 00000000000 0000000 0000000000 00000000 Table. Recursive hiding of smaller messages in the shares of larger messages Note that at each step we have used the shares of the previous smaller messages to create the shares of larger messages, these smaller shares are denoted in bold. Also, we have distributed the shares at each step so that no player has access to all the shares of the smaller messages and hence, every message remains secure until at least two players come together. This approach is different from that discussed in [], where the shares of smaller messages were all accumulated into one of the larger shares instead of distributing them among all the possible players. As a result, any player having that share which encodes the smaller images could in principle recreate these smaller images without the help of the other player, which in some cases might not be acceptable. Therefore, our new approach seems to be more secure for certain applications. Also seen in table is that using recursive hiding of secrets, we have been able to encode characters of,, and and 7 characters of into shares of alone. As a result the efficiency is ( + 7) /( 7) = 40/8 /. If one considers binary representations of each character then each share now conveys ( + 7) /(5 7) = 8/ 7 / bits. Compared to /5 bits of conventional approaches, this is an almost 40% increase in efficiency. Recursive hiding and threshold visual cryptography The idea described in previous section can be applied to images to develop a recursive out of visual cryptographic scheme. For this purpose we divide each pixel into subpixels as shown in table. Pixel Partition Partition Partition

And all possible permutations of the above three pieces Table. Possible partitions for black and white pixels. As seen in table, when the partitions of white pixel are stacked upon each other one third of the pixel is white and hence appears light gray to human eye. However, the subpixels of the black pixel are so arranged that when shares are stacked together, the resulting pixel is completely dark. Yet another way to create subpixels would be to have only one third of the subpixel colored dark. Therefore, when subpixels of a larger white pixel are stacked upon each other they would appear light gray and the stacking of the subpixels of a black pixel would result in dark gray. However, the human eye can perceives the difference between gray and completely dark pixels better than two different shades of gray itself. Hence our construction of subpixels in table. We observe that the distribution of subpixels also corresponds to the comparison based splitting of secrets in the case of text. However, in this case, each subpixel can simply be represented by bit. Therefore a white subpixel represents a 0 and black subpixel represents a. Their spatial distribution determines the manner in which they are stacked and the color they produce in the final image. As an example to make the working of the proposed scheme clearer, we present in figure the encoding of a x pixel image such that each share of the x image contains shares of a pixel secret image and a x pixel secret image. 4

Figure. Illustration of recursive hiding of secret images in the shares of larger original image using a out of threshold scheme. The subpixels of an original pixel can be represented as a matrix. For example if the original pixel was black then the shares representing it can be written as [00] T, [00] T, and [00] T. ince, these matrices can be stored as a sequence of bits; it implies that there is an expansion by a factor of 9=9 because the original black pixel can be represented as a single bit. If we were not to perform a recursive hiding, we would be creating 9 9=8 bits for each share corresponding to 9 pixels of the original image. However, using recursive hiding we have been able to hide additional 9+ 9=9+7=6 bits of information in those 8 bits, thereby increasing the information conveyed per share of the original image. Higher efficiency could be achieved if we were to number the subpixels as 0,, and and use prefix coding to represent these numbers and store them instead of storing the matrices or pixels. This would only lead to a per bit expansion factor of 5, instead of 9 and the efficiency improvement will be similar to that in the case of text, i.e. an improvement of 40%. Figure shows the application of the proposed scheme to three images, smallest image being a smiley face, next being a water mark and the third and the largest image being that of lena. 5

Original image size 87x87 (scaled here) First secret image size 9x9 econd secret image size 87x9 (scaled here) hare of Original image size 87x87 (scaled here) hare of Original image size 87x87 (scaled here) hare of Original image size 87x87 (scaled here) hare of second secret image size 87x9 (scaled here) hare of second secret image size 87x9 (scaled here) hare of second secret image size 87x9 (scaled here) hare of first secret image size 9x9 hare of first secret image size 9x9 hare of first secret image size 9x9 Figure. Illustration of the process of recursive hiding of secrets in shares of larger original image 6

Regenerated second secret image from shares and size 87x9 (scaled here) Regenerated second secret image from shares and size 87x9 (scaled here) Regenerated second secret image from shares and size 87x9 (scaled here) Regenerated first secret image from shares and size 9x9 Regenerated first secret image from shares and size 9x9 Regenerated first secret image from shares and size 9x9 Figure. Illustration of regeneration of smaller images from the shares hidden inside the shares of the original larger image. Conclusions This paper presents a threshold scheme for recursive hiding of secrets. The construction presented is for a out of scheme; however it can be expanded to a out of n scheme as well. Recursive hiding serves as a steganographic channel that can be used to embed invisible watermarks, convey secret keys or encode authentication information. Further applications of such schemes would be in secure distributed storage of information over a network using secret sharing to enable storage of extra information in the shares, thereby decreasing network load and increasing efficiency. 7

References. Naor,. and A, hamir. 995. Visual Cryptography. Advances in Cryptology-Eurocrypt, 950:-.. Gnanaguruparan,. and Kak,. 00. Recursive Hiding of ecrets in Visual Cryptography. Cryptologia 6: 68-76.. Horng, G., Chen, T. and Tsai D. 006. Cheating in Visual Cryptography. Design, Codes and Cryptography 8:9-6. 4. Prisco, R. and antis, A. 006. Cheating Immune (,n)-threshold Visual ecret haring. LNC 46:6-8. 8