SlideShare a Scribd company logo
1 of 4
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03, Issue: 01 June 2014, Pages: 97-100
ISSN: 2278-2397
97
Visual Secret Sharing for Secure Biometric
Authentication using Steganography
A B Rajendra1
, H S Sheshadri2
1
Research Scholar, PES College of Engineering, Mandya, Karnataka, India
2
Professor &Dean (Research), E & C Department, PES College of Engineering, Mandya, Karnataka, India
Email: rajendraab@hotmail.com, hssheshadri@hotmail.com
Abstract- Visual secret sharing (VSS) is a kind of encryption,
where secret image can be decoded directly by the human
visual system without any computation for decryption. Secret
image is reconstructed by simply stacking the shares together.
Steganography using visual secret sharing (SVSS) is an
improved version of visual secret sharing where it embeds the
random patterns into meaningful images. One of the
applications of SVSS is to avoid the custom inspections,
because the shares of SVSS are meaningful images, hence
there are fewer chances for the shares to be suspected and
detected. The disadvantage of VSS is that the interceptors are
able to identify that the secret image has been encrypted.
Therefore we propose a method so that it is difficult for the
interceptors to know about the presence of the shares. In this
Paper, The secret image is encrypted by the corresponding
VSS, and then we embed its shares into the covering shares.
Keywords-component;Visual secret sharing (VSS),
Steganography using visual secret sharing SVSS, Visual
cryptography (VC)
I. INTRODUCTION
Secret sharing is to divide the information into pieces, so that
qualified subsets of these shares can be used to recover the secret.
Intruders need to get access to several shares to retrieve the
complete information. Similarly, they need to destroy several
shares to destroy the whole information. The concept of secret
sharing was independently introduced by Shamir [1]. An example
of such a scheme is a k-out-of-n threshold secret sharing in which
there are n participants holding their shares of the secret and
every k (k ≤ n) participants can collectively recreate the secret
while any k-1 participants cannot get any information about the
secret.
The need for secret sharing arises if the storage system is not
reliable and secure. Secret sharing is also useful if the owner of
the secret does not trust any single person [2-4]. Visual secret
sharing is one such method which implements secret sharing for
images [5]. This technique was introduced by the Naor and
Shamir in 1994.Visual Secret Sharing is a field of cryptography
in which a secret image is encrypted into n shares such that
stacking a sufficient number of shares reveals the secret image[6].
In VSS the shares generated contains only black and white pixels
which make it to difficult to gain any information about the secret
image by viewing only one share.The secret image is revealed
only by stacking sufficient number of shares. There are different
types of visual secret sharing schemes, like 2-out-of-n, n-out-of-n
and k-out-of-n.In n-out-of-n scheme n shares will be generated
from the original image and in order to decrypt the secret image
all n shares are needed to be stacked[7-10]. In this paper,when
we refer to a corresponding VSS of an SVSS, we mean a VSS
that have the same access structure with the SVSS. Generally, an
SVSS takes a secret image and 2 original share images as inputs
and n outputs.There have been many SVSSs proposed in the
literature. Visual secret sharing & biometrics methods have their
own drawbacks. By using the Visual Cryptography for biometric
authentication technique avoids data theft [11-12].
This paper is organized as follows. Section II introduces the
fundamental principles of VSS, based on which our method is
proposed. Section III explains about proposed SVSS.Section IV
shows our proposed method of steganography using VSS.
Finally, conclusions are drawn in section V.
II. VISUAL SECRET SHARING SCHEMES
Basic Model
Consider a set Y = {1, 2 . . .n} be a set of elements called
participants. By applying set theory concept we have 2Y
as the
collection subsets of Y.
Let ΓQ⊆ 2Y
and ΓF⊆ 2Y
, where ΓQ ∩ ΓF = θ and ΓQ U ΓF = 2Y
,
members of ΓQ are called qualified sets and members of ΓF are
called forbidden sets. The pair (ΓQ, ΓF) is called the access
structure of the scheme.
ΓO can be defined as all minimal qualified sets:
ΓO = {A∈ ΓQ:A1 ∉ ΓQ for all A1
⊂A}
ΓQ can be considered as the closure of ΓO. ΓO is termed a basis,
from which a strong access structure can be derived.
Considering the image, it will consist of a collection of black
and white pixels. Each pixel appears in nshares, one for each
transparency or participant. Each share is a collection of m
black and white sub-pixels. The overall structure of the
scheme can be described by an n x m (No. of shares x No. of
subpixels).Boolean matrix S = [S ij], where Sij= 1 if and only if
the jth
subpixel in the ith
share is black.
Sij= 0 if and only if the jth
subpixel in the ith
share is white.
Following the above terminology, let (ΓQ, ΓF) be an access
structures on a set of nparticipants. A (ΓQ , ΓF, α)- VSS
with the relative difference α and set of thresholds 1≤ k ≤ m
is realized using the two n x m basis matrices SW and Sbif the
following condition holds[14]:
1. If X = { i1, i2, ………ip } ∈ ΓQ , then the “or” V of rows i1,
i2, ……ip of Swsatisfies H(V) ≤ k - α.m, whereas, for Sb it results
that H(V) ≥ k.
2. If X = { i1, i2, ………ip } ∈ ΓF , then the two p x m matrices
obtained by restricting Swand Sb to rows i1,i2, ………ip are
identical up to a column permutation.The first condition is
called contrast and the second condition is called security. The
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03, Issue: 01 June 2014, Pages: 97-100
ISSN: 2278-2397
98
collections Cw and Cb are obtained by permuting the columns of
the basis matrices SW and Sb in all possible ways. The
important parameters of the scheme are:
1. m, the number of sub pixels in a share.i.e blowing
factor (pixel expansion). This represents the loss in
resolution from the original image to the shared one.
The m is computed using the equation:
m = 2n-1
(1)
2. α, the relative difference, it determines how well the original
image is recognizable.The α to be large as possible. The
relative difference α is calculated using the equation:
α = | n b- nw| / m (2)
wherenband nwrepresents the number of black sub pixels
generated from the black and white pixels in the original image.
3. β, the contrast. The value β is to be as large as possible. The
contrast β is computed using the equation:
β = α.m (3)
The minimum contrast that is required to ensure that the black
and white areas will be distinguishable if β ≥ 1.
Encryption of shares
In order to generate the shares in the 2-out-of-2 scheme.
Considering the following Fig. 1 we can generate the basis matrix
Basis Matrices Consruction.
The basis matrices are given as:
Sw = [
0 1
0 1
] and Sb = [
0 1
1 0
]
In general if we have Y= {1, 2} as set of number of participants,
then for a creating the basis matrices Sw and Sb we have to apply
the odd and even cardinality concept of set theory. For Swwe will
consider the even cardinality and we will get ESw = {Ө, {1, 2}}
and for Sb we have the odd cardinality OSb = {{1}, {2}}. In order
to encode the black and white pixels, we have collection matrices
which are given as:
Cw = {Matrices obtained by performing permutation on the
columns of[
0 1
0 1
]}
Cb = {Matrices obtained by performing permutation on the
columns of [
0 1
1 0
] }
So finally we have,
Cw = { [
0 1
0 1
] and [
1 0
1 0
]}
Cb = { [
0 1
1 0
] and [
1 0
0 1
]}
Now to share a white pixel, randomly select one of the
matrices in Cw, and to share a black pixel, randomly select one
of the matrices in Cb. The first row of the chosen matrix is used
for share S1 and the second for share S2.
Decryption of shares
Fig 2(a) Original image
Fig 2(b) Share 1
Fig 2(c) Share 2
Fig 2(d) Decrypted image
VSS Scheme:
The Fig. 2 shows the stacking of the shares. Fig 2(a) shows the
original image, Fig 2(b) and Fig 2(c) are the shares generated
from the original image. Fig 2(d) shows the decrypted image after
stacking the two shares. From the Fig 2(d) Decrypted Image.
III. STEGANOGRAPY USING VISUAL
CRYPOGRAPHY
Generating covering shares using Halftoning
In order to deal with the gray-scale images, the halftoning
technique was introduced into the visual secret sharing. The
halftoning technique (or dithering technique) is used to convert
the gray-scale image into the binary image. This technique has
been extensively used in printing applications which has been
proved to be very effective. Once we have the binary image, the
SVSS can be applied directly.
The halftoning process is to map the gray-scale pixels from the
original image into the patterns with certain percentage of black
pixels. The halftoned image is a binary image. However, in order
to store the binary images one needs a large amount of memory.
A more efficient way is by using the dithering matrix. The
dithering matrix is a integer matrix, denoted as D. The entries,
denoted as Di,j of the dithering matrix are integers which stand
for the gray-levels in the dithering matrix.We take n gray-scale
original share images, denoted as I1,I2,…….,In , as the inputs, and
output n binary meaningful shares s1,s2,…..,sn, where the stacking
results of the qualified shares are all black images, i.e., the
information of the original share images are all covered.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03, Issue: 01 June 2014, Pages: 97-100
ISSN: 2278-2397
99
Generating Embedding transparencies in to covering shares
Suppose the size of each covering share is p*q. We first divide
each covering share into (pq)/t blocks with each block containing
t subpixels, where t>=m . In case pq is not a multiple of t, then
some simple padding can be applied. We choose m positions in
each t subpixels to embed the m subpixels of m. In this project,
we call the chosen m positions that are used to embed the secret
information the embedding positions. In order to correctly decode
the secret image only by stacking the shares, the embedding
positions of all the covering shares should be the same. At this
point, by stacking the embedded shares, the (t-m) subpixels that
have not been embedded by secret subpixels are always black,
and the m subpixels that are embedded by the secret subpixels
recover the secret image as the corresponding VSS does. Hence
the secret image appears.
IV. PROPOSED METHOD
Results
Fig3 (a) Original Image
Fig3 (b) Encrypted Shares using VSS
Fig (c) Covering shares
Fig (d) Shares (obtained from VSS) are embedded into the Covering images
(Halftone Images)
Fig3 (e) Decrypted Image using SVSS
Streganography using VSS:
Analysis of the results
Original image, Fig 3(b) shows encrypted shares using VSS, Fig
3(c) shows meaning full images used as covering shares, Fig 3(d)
shows haftoned Images of fig 3(c) which are embedded with Fig
3(b) and Fig 3(d) shows decrypted Image using.Meaningfull
shares are trasmitted instead of dotted black and white shares in
SVSS .
Compared to Fig.2 the shares and decrypted image size are same
as original image size and XOR operation is used to recover the
secret image instead of OR operation.
Algorithm of the Proposed Method Encryption
Load the image
Create M0 ,M1
for each pixel p in SI:
{
if (p is black)
r = a random permutation of the columns of M1
else
r = a random permutation of the columns of M0
for each participant i:
{
where pixels j if (ri, j = =1)
subpixel=black
else
subpixel= white. }
}
Generating covering shares
Dithering matrix D of size (c*d)
for i=0 to c-1 do&
for j=0 to d-1 do
if g<=Dij
then print black pixel at position(i,j)
else
print white pixel at position (i,j)
Embedding
Step 1: Divide the covering shares into blocks thatcontain t sub
pixels each.
Step 2: Choose m embedding positions in each block in the n
covering shares.
Step 3: For each black pixel in SI, randomly choose a share
matrix M1 ε C1.
Step 4: For each white pixel in secret image, randomly choose
another matrix M0 ε C0
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 03, Issue: 01 June 2014, Pages: 97-100
ISSN: 2278-2397
100
Step 5: Embed the m sub pixels of each row of the share matrix
M into the m embedding positions chosen in Step 2
Decryption
Load the Shares.
if (share file==Null)
print (“No file”)
else if (Image==Null)
print (“Image not present”)
else
{
Set the dimensions combine the shares
}
Architecture of the proposed method
Architecture of the proposed method
V. CONCLUSION
In this paper ,we presented a new approach where the input is the
secret image to be shared and the output is n shares to be shared
among n participants. These shares are random black and white
patterns which reveal no information about the original secret
image. Secret image is covered with n meaningful images and
output are n covering shares. These shares are binary images.The
shares (obtained from VSS) are embedded into the meaningful
images to obtain covering shares. To get back the secret images at
least k-out-of-nshares are stacked one upon the other.Construction
of SVSS which was realized by embedding the random shares
into the meaningful covering shares. The shares of the proposed
scheme are meaningful images and the stacking of a qualified
subset of shares will recover the secret image visually. SVSS
technique can be used for secure iris authentication , face
privacy,etc.
REFERENCES
[1] M.Naor & A.Shamir, “Visual secret sharing”, Proc.Advances in
Cryptology EUROCRYPT ’94, LNCS, Springer-Verlag, pp.1-12,1995.
[2] Stinson, “Visual secret sharing and threshold schemes”, Potentials, IEEE,
Vol. 18 Issue: 1, pp. 13 -16, 1999.
[3] A B Rajendra & H S Sheshadri, “Enhanced visual secret sharing for
graphical password authentication” Proc. SPIE 8768, International
Conference on Graphic and Image Processing , 876835,
doi:10.1117/12.2010934,2012.
[4] Rajendra Basavegowda & Sheshadri Seenappa, “Electronic Medical
Report Security Using Visual Secret Sharing Scheme”, Proc. of the
IEEE International Conference on Computer Modelling and Simulation,
Cambridge, UK, pp.78-83.2013.
[5] S.Droste, “New results on visual secret sharing” in Proc. CRYPTO’96,
vol. 1109, pp. 401–415, Springer-Verlag Berlin LNCS.1996.
[6] G.Ateniese, C. Blundo, A. De Santis and D.R.Stinson,“Extended
capabilities for visual secret sharing,” ACM Theoretical Computer. Sci.,
vol. 250, no. 1–2, pp. 143–161, 2001.
[7] M. Nakajima and Y. Yamaguchi, “Extended visual secret sharing for
natural images,” in Proc. WSCG Conf.2002pp. 303–412, 2002.
[8] Rajendra A B, Sheshadri H S , “Visual Cryptography in Internet Voting
System”, Proc. of the IEEE International Conference on Innovative
Computing Technology, London, UK, pp.60-64,2013.
[9] Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual
cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–
2453, Aug. 2006.
[10] R A Basavegowda, S H Seenappa,”Secret Code Authentication Using
Enhanced Visual Cryptography”, Emerging Research in Electronics,
Computer Science and Technology, LN EE248, Springer book chapter,
pp 69-76.2014.
[11] Thomas Monoth, Babu Anto P (2010), “Tamperproof Transmission of
Fingerprints Using VisualCryptography Schemes”, Elsevier science
direct, Procedia Computer Science 2, pp 143–148.
[12]Rajendra A B & Sheshadri H S , “A new approach to analyze visual
secret sharing schemes for biometric authentication” International
Journal in Foundations of Computer Science & Technology (IJFCST),
Vol. 3,No.6, pp 53-60.November 2013

More Related Content

Similar to Visual Secret Sharing for Secure Biometric Authentication

HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesIJERA Editor
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1patisa
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes AmAl C
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
 
A novel (k,n) secret sharing scheme from
A novel (k,n) secret sharing scheme fromA novel (k,n) secret sharing scheme from
A novel (k,n) secret sharing scheme fromIJNSA Journal
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107IJRAT
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET Journal
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 

Similar to Visual Secret Sharing for Secure Biometric Authentication (20)

HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
A novel (k,n) secret sharing scheme from
A novel (k,n) secret sharing scheme fromA novel (k,n) secret sharing scheme from
A novel (k,n) secret sharing scheme from
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 

More from MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 

More from MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Visual Secret Sharing for Secure Biometric Authentication

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03, Issue: 01 June 2014, Pages: 97-100 ISSN: 2278-2397 97 Visual Secret Sharing for Secure Biometric Authentication using Steganography A B Rajendra1 , H S Sheshadri2 1 Research Scholar, PES College of Engineering, Mandya, Karnataka, India 2 Professor &Dean (Research), E & C Department, PES College of Engineering, Mandya, Karnataka, India Email: rajendraab@hotmail.com, hssheshadri@hotmail.com Abstract- Visual secret sharing (VSS) is a kind of encryption, where secret image can be decoded directly by the human visual system without any computation for decryption. Secret image is reconstructed by simply stacking the shares together. Steganography using visual secret sharing (SVSS) is an improved version of visual secret sharing where it embeds the random patterns into meaningful images. One of the applications of SVSS is to avoid the custom inspections, because the shares of SVSS are meaningful images, hence there are fewer chances for the shares to be suspected and detected. The disadvantage of VSS is that the interceptors are able to identify that the secret image has been encrypted. Therefore we propose a method so that it is difficult for the interceptors to know about the presence of the shares. In this Paper, The secret image is encrypted by the corresponding VSS, and then we embed its shares into the covering shares. Keywords-component;Visual secret sharing (VSS), Steganography using visual secret sharing SVSS, Visual cryptography (VC) I. INTRODUCTION Secret sharing is to divide the information into pieces, so that qualified subsets of these shares can be used to recover the secret. Intruders need to get access to several shares to retrieve the complete information. Similarly, they need to destroy several shares to destroy the whole information. The concept of secret sharing was independently introduced by Shamir [1]. An example of such a scheme is a k-out-of-n threshold secret sharing in which there are n participants holding their shares of the secret and every k (k ≤ n) participants can collectively recreate the secret while any k-1 participants cannot get any information about the secret. The need for secret sharing arises if the storage system is not reliable and secure. Secret sharing is also useful if the owner of the secret does not trust any single person [2-4]. Visual secret sharing is one such method which implements secret sharing for images [5]. This technique was introduced by the Naor and Shamir in 1994.Visual Secret Sharing is a field of cryptography in which a secret image is encrypted into n shares such that stacking a sufficient number of shares reveals the secret image[6]. In VSS the shares generated contains only black and white pixels which make it to difficult to gain any information about the secret image by viewing only one share.The secret image is revealed only by stacking sufficient number of shares. There are different types of visual secret sharing schemes, like 2-out-of-n, n-out-of-n and k-out-of-n.In n-out-of-n scheme n shares will be generated from the original image and in order to decrypt the secret image all n shares are needed to be stacked[7-10]. In this paper,when we refer to a corresponding VSS of an SVSS, we mean a VSS that have the same access structure with the SVSS. Generally, an SVSS takes a secret image and 2 original share images as inputs and n outputs.There have been many SVSSs proposed in the literature. Visual secret sharing & biometrics methods have their own drawbacks. By using the Visual Cryptography for biometric authentication technique avoids data theft [11-12]. This paper is organized as follows. Section II introduces the fundamental principles of VSS, based on which our method is proposed. Section III explains about proposed SVSS.Section IV shows our proposed method of steganography using VSS. Finally, conclusions are drawn in section V. II. VISUAL SECRET SHARING SCHEMES Basic Model Consider a set Y = {1, 2 . . .n} be a set of elements called participants. By applying set theory concept we have 2Y as the collection subsets of Y. Let ΓQ⊆ 2Y and ΓF⊆ 2Y , where ΓQ ∩ ΓF = θ and ΓQ U ΓF = 2Y , members of ΓQ are called qualified sets and members of ΓF are called forbidden sets. The pair (ΓQ, ΓF) is called the access structure of the scheme. ΓO can be defined as all minimal qualified sets: ΓO = {A∈ ΓQ:A1 ∉ ΓQ for all A1 ⊂A} ΓQ can be considered as the closure of ΓO. ΓO is termed a basis, from which a strong access structure can be derived. Considering the image, it will consist of a collection of black and white pixels. Each pixel appears in nshares, one for each transparency or participant. Each share is a collection of m black and white sub-pixels. The overall structure of the scheme can be described by an n x m (No. of shares x No. of subpixels).Boolean matrix S = [S ij], where Sij= 1 if and only if the jth subpixel in the ith share is black. Sij= 0 if and only if the jth subpixel in the ith share is white. Following the above terminology, let (ΓQ, ΓF) be an access structures on a set of nparticipants. A (ΓQ , ΓF, α)- VSS with the relative difference α and set of thresholds 1≤ k ≤ m is realized using the two n x m basis matrices SW and Sbif the following condition holds[14]: 1. If X = { i1, i2, ………ip } ∈ ΓQ , then the “or” V of rows i1, i2, ……ip of Swsatisfies H(V) ≤ k - α.m, whereas, for Sb it results that H(V) ≥ k. 2. If X = { i1, i2, ………ip } ∈ ΓF , then the two p x m matrices obtained by restricting Swand Sb to rows i1,i2, ………ip are identical up to a column permutation.The first condition is called contrast and the second condition is called security. The
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03, Issue: 01 June 2014, Pages: 97-100 ISSN: 2278-2397 98 collections Cw and Cb are obtained by permuting the columns of the basis matrices SW and Sb in all possible ways. The important parameters of the scheme are: 1. m, the number of sub pixels in a share.i.e blowing factor (pixel expansion). This represents the loss in resolution from the original image to the shared one. The m is computed using the equation: m = 2n-1 (1) 2. α, the relative difference, it determines how well the original image is recognizable.The α to be large as possible. The relative difference α is calculated using the equation: α = | n b- nw| / m (2) wherenband nwrepresents the number of black sub pixels generated from the black and white pixels in the original image. 3. β, the contrast. The value β is to be as large as possible. The contrast β is computed using the equation: β = α.m (3) The minimum contrast that is required to ensure that the black and white areas will be distinguishable if β ≥ 1. Encryption of shares In order to generate the shares in the 2-out-of-2 scheme. Considering the following Fig. 1 we can generate the basis matrix Basis Matrices Consruction. The basis matrices are given as: Sw = [ 0 1 0 1 ] and Sb = [ 0 1 1 0 ] In general if we have Y= {1, 2} as set of number of participants, then for a creating the basis matrices Sw and Sb we have to apply the odd and even cardinality concept of set theory. For Swwe will consider the even cardinality and we will get ESw = {Ө, {1, 2}} and for Sb we have the odd cardinality OSb = {{1}, {2}}. In order to encode the black and white pixels, we have collection matrices which are given as: Cw = {Matrices obtained by performing permutation on the columns of[ 0 1 0 1 ]} Cb = {Matrices obtained by performing permutation on the columns of [ 0 1 1 0 ] } So finally we have, Cw = { [ 0 1 0 1 ] and [ 1 0 1 0 ]} Cb = { [ 0 1 1 0 ] and [ 1 0 0 1 ]} Now to share a white pixel, randomly select one of the matrices in Cw, and to share a black pixel, randomly select one of the matrices in Cb. The first row of the chosen matrix is used for share S1 and the second for share S2. Decryption of shares Fig 2(a) Original image Fig 2(b) Share 1 Fig 2(c) Share 2 Fig 2(d) Decrypted image VSS Scheme: The Fig. 2 shows the stacking of the shares. Fig 2(a) shows the original image, Fig 2(b) and Fig 2(c) are the shares generated from the original image. Fig 2(d) shows the decrypted image after stacking the two shares. From the Fig 2(d) Decrypted Image. III. STEGANOGRAPY USING VISUAL CRYPOGRAPHY Generating covering shares using Halftoning In order to deal with the gray-scale images, the halftoning technique was introduced into the visual secret sharing. The halftoning technique (or dithering technique) is used to convert the gray-scale image into the binary image. This technique has been extensively used in printing applications which has been proved to be very effective. Once we have the binary image, the SVSS can be applied directly. The halftoning process is to map the gray-scale pixels from the original image into the patterns with certain percentage of black pixels. The halftoned image is a binary image. However, in order to store the binary images one needs a large amount of memory. A more efficient way is by using the dithering matrix. The dithering matrix is a integer matrix, denoted as D. The entries, denoted as Di,j of the dithering matrix are integers which stand for the gray-levels in the dithering matrix.We take n gray-scale original share images, denoted as I1,I2,…….,In , as the inputs, and output n binary meaningful shares s1,s2,…..,sn, where the stacking results of the qualified shares are all black images, i.e., the information of the original share images are all covered.
  • 3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03, Issue: 01 June 2014, Pages: 97-100 ISSN: 2278-2397 99 Generating Embedding transparencies in to covering shares Suppose the size of each covering share is p*q. We first divide each covering share into (pq)/t blocks with each block containing t subpixels, where t>=m . In case pq is not a multiple of t, then some simple padding can be applied. We choose m positions in each t subpixels to embed the m subpixels of m. In this project, we call the chosen m positions that are used to embed the secret information the embedding positions. In order to correctly decode the secret image only by stacking the shares, the embedding positions of all the covering shares should be the same. At this point, by stacking the embedded shares, the (t-m) subpixels that have not been embedded by secret subpixels are always black, and the m subpixels that are embedded by the secret subpixels recover the secret image as the corresponding VSS does. Hence the secret image appears. IV. PROPOSED METHOD Results Fig3 (a) Original Image Fig3 (b) Encrypted Shares using VSS Fig (c) Covering shares Fig (d) Shares (obtained from VSS) are embedded into the Covering images (Halftone Images) Fig3 (e) Decrypted Image using SVSS Streganography using VSS: Analysis of the results Original image, Fig 3(b) shows encrypted shares using VSS, Fig 3(c) shows meaning full images used as covering shares, Fig 3(d) shows haftoned Images of fig 3(c) which are embedded with Fig 3(b) and Fig 3(d) shows decrypted Image using.Meaningfull shares are trasmitted instead of dotted black and white shares in SVSS . Compared to Fig.2 the shares and decrypted image size are same as original image size and XOR operation is used to recover the secret image instead of OR operation. Algorithm of the Proposed Method Encryption Load the image Create M0 ,M1 for each pixel p in SI: { if (p is black) r = a random permutation of the columns of M1 else r = a random permutation of the columns of M0 for each participant i: { where pixels j if (ri, j = =1) subpixel=black else subpixel= white. } } Generating covering shares Dithering matrix D of size (c*d) for i=0 to c-1 do& for j=0 to d-1 do if g<=Dij then print black pixel at position(i,j) else print white pixel at position (i,j) Embedding Step 1: Divide the covering shares into blocks thatcontain t sub pixels each. Step 2: Choose m embedding positions in each block in the n covering shares. Step 3: For each black pixel in SI, randomly choose a share matrix M1 ε C1. Step 4: For each white pixel in secret image, randomly choose another matrix M0 ε C0
  • 4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 03, Issue: 01 June 2014, Pages: 97-100 ISSN: 2278-2397 100 Step 5: Embed the m sub pixels of each row of the share matrix M into the m embedding positions chosen in Step 2 Decryption Load the Shares. if (share file==Null) print (“No file”) else if (Image==Null) print (“Image not present”) else { Set the dimensions combine the shares } Architecture of the proposed method Architecture of the proposed method V. CONCLUSION In this paper ,we presented a new approach where the input is the secret image to be shared and the output is n shares to be shared among n participants. These shares are random black and white patterns which reveal no information about the original secret image. Secret image is covered with n meaningful images and output are n covering shares. These shares are binary images.The shares (obtained from VSS) are embedded into the meaningful images to obtain covering shares. To get back the secret images at least k-out-of-nshares are stacked one upon the other.Construction of SVSS which was realized by embedding the random shares into the meaningful covering shares. The shares of the proposed scheme are meaningful images and the stacking of a qualified subset of shares will recover the secret image visually. SVSS technique can be used for secure iris authentication , face privacy,etc. REFERENCES [1] M.Naor & A.Shamir, “Visual secret sharing”, Proc.Advances in Cryptology EUROCRYPT ’94, LNCS, Springer-Verlag, pp.1-12,1995. [2] Stinson, “Visual secret sharing and threshold schemes”, Potentials, IEEE, Vol. 18 Issue: 1, pp. 13 -16, 1999. [3] A B Rajendra & H S Sheshadri, “Enhanced visual secret sharing for graphical password authentication” Proc. SPIE 8768, International Conference on Graphic and Image Processing , 876835, doi:10.1117/12.2010934,2012. [4] Rajendra Basavegowda & Sheshadri Seenappa, “Electronic Medical Report Security Using Visual Secret Sharing Scheme”, Proc. of the IEEE International Conference on Computer Modelling and Simulation, Cambridge, UK, pp.78-83.2013. [5] S.Droste, “New results on visual secret sharing” in Proc. CRYPTO’96, vol. 1109, pp. 401–415, Springer-Verlag Berlin LNCS.1996. [6] G.Ateniese, C. Blundo, A. De Santis and D.R.Stinson,“Extended capabilities for visual secret sharing,” ACM Theoretical Computer. Sci., vol. 250, no. 1–2, pp. 143–161, 2001. [7] M. Nakajima and Y. Yamaguchi, “Extended visual secret sharing for natural images,” in Proc. WSCG Conf.2002pp. 303–412, 2002. [8] Rajendra A B, Sheshadri H S , “Visual Cryptography in Internet Voting System”, Proc. of the IEEE International Conference on Innovative Computing Technology, London, UK, pp.60-64,2013. [9] Z. Zhou, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography,” IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441– 2453, Aug. 2006. [10] R A Basavegowda, S H Seenappa,”Secret Code Authentication Using Enhanced Visual Cryptography”, Emerging Research in Electronics, Computer Science and Technology, LN EE248, Springer book chapter, pp 69-76.2014. [11] Thomas Monoth, Babu Anto P (2010), “Tamperproof Transmission of Fingerprints Using VisualCryptography Schemes”, Elsevier science direct, Procedia Computer Science 2, pp 143–148. [12]Rajendra A B & Sheshadri H S , “A new approach to analyze visual secret sharing schemes for biometric authentication” International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3,No.6, pp 53-60.November 2013