The document describes an image recognition-based automatic decryption method for text encrypted using visual cryptography. It proposes a system that can decrypt text encrypted by visual cryptography on digital devices like smartphones or tablets by taking a picture of the encrypted image. It also proposes a novel method for automatically recognizing the encrypted portions in the captured image using rendering filters from computer graphics to achieve a high recognition rate with low cost. Experimental results showed the proposed method achieved a high recognition rate at a low computational cost.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
Keyless approach of separable hiding data into encrypted imageprjpublications
This document summarizes a research paper that proposes a keyless approach to separately hiding data in an encrypted image. The approach uses Sieving, Division and Shuffling (SDS) algorithms to encrypt an original image, generating random shares. It then compresses the least significant bits of the encrypted image to create space for additional data. At the receiver end, the encrypted image and data are decrypted separately without keys. The SDS algorithms sieve an input image into RGB components, randomly divide each component into shares, and shuffle the shares. This encrypts the image. Data is then embedded in the encrypted image before transmission. At the receiver end, the inverse process extracts both the decrypted image and data.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Steganography using visual cryptography: ReportAparna Nk
This document is a seminar report submitted by Aparna N K to the University of Kerala in partial fulfillment of the requirements for a Master of Computer Applications degree. The report discusses steganography using a genetic algorithm along with visual cryptography for wireless network applications. It provides background on steganography, cryptography, genetic algorithms, the LSB steganography algorithm, and describes a proposed system that uses LSB embedding combined with genetic algorithm pixel modification and visual cryptography to hide secret messages in images for secure transmission. The performance of the proposed system is analyzed based on metrics like mean squared error and peak signal-to-noise ratio.
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
This document proposes a new encryption technique that combines visual cryptography and steganography for added security layers. A secret text message is first hidden in a cover image using steganography. The stego image is then sliced into shares using visual cryptography and transmitted over an open system. At the receiver end, the shares are stacked to reconstruct the cover image containing the hidden message, which can then be extracted using steganography. The technique aims to address issues like pixel expansion and memory requirements of previous methods by using unexpanded shares. It provides a less complex encryption/decryption system compared to other approaches.
This document summarizes research on visual cryptography for securing black and white images. It discusses how visual cryptography works by breaking up a secret image into shares such that stacking the shares reveals the secret image to the human visual system without computation. The document also outlines Naor and Shamir's original (2,2) visual cryptography scheme and discusses extensions to the scheme including supporting multiple secrets and improving image quality and size. Finally, it notes that visual cryptography provides robust security for images while eliminating the need for computers during decryption.
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
Folder Security Using Graphical Password Authentication Schemepaperpublications3
Abstract: Now a day most of the user are facing problem for providing the security to the folder, so that it will not be accesses by the unauthorized user. Taking in action all these problems I have designed a model which will provide a best security to your folders using graphical password authentication model. Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Pass Points, and evaluated it with human users. Beginning around 1999, a multitude of graphical based password scheme which have been proposed as alternative to text based password scheme, motivated by the promise of improved password memorability and thus usability. This paper presents a detailed evaluation of the Pass Points and pattern matching password scheme which provides high level of security and provides security to your folder.
Keyless approach of separable hiding data into encrypted imageprjpublications
This document summarizes a research paper that proposes a keyless approach to separately hiding data in an encrypted image. The approach uses Sieving, Division and Shuffling (SDS) algorithms to encrypt an original image, generating random shares. It then compresses the least significant bits of the encrypted image to create space for additional data. At the receiver end, the encrypted image and data are decrypted separately without keys. The SDS algorithms sieve an input image into RGB components, randomly divide each component into shares, and shuffle the shares. This encrypts the image. Data is then embedded in the encrypted image before transmission. At the receiver end, the inverse process extracts both the decrypted image and data.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Steganography using visual cryptography: ReportAparna Nk
This document is a seminar report submitted by Aparna N K to the University of Kerala in partial fulfillment of the requirements for a Master of Computer Applications degree. The report discusses steganography using a genetic algorithm along with visual cryptography for wireless network applications. It provides background on steganography, cryptography, genetic algorithms, the LSB steganography algorithm, and describes a proposed system that uses LSB embedding combined with genetic algorithm pixel modification and visual cryptography to hide secret messages in images for secure transmission. The performance of the proposed system is analyzed based on metrics like mean squared error and peak signal-to-noise ratio.
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
This document proposes a new encryption technique that combines visual cryptography and steganography for added security layers. A secret text message is first hidden in a cover image using steganography. The stego image is then sliced into shares using visual cryptography and transmitted over an open system. At the receiver end, the shares are stacked to reconstruct the cover image containing the hidden message, which can then be extracted using steganography. The technique aims to address issues like pixel expansion and memory requirements of previous methods by using unexpanded shares. It provides a less complex encryption/decryption system compared to other approaches.
This document summarizes research on visual cryptography for securing black and white images. It discusses how visual cryptography works by breaking up a secret image into shares such that stacking the shares reveals the secret image to the human visual system without computation. The document also outlines Naor and Shamir's original (2,2) visual cryptography scheme and discusses extensions to the scheme including supporting multiple secrets and improving image quality and size. Finally, it notes that visual cryptography provides robust security for images while eliminating the need for computers during decryption.
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
The Cryptographic Schemes for Secret ImagesIJERA Editor
Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
This document discusses a randomized LSB hiding approach for nested digital image watermarking. It proposes encrypting one watermark image using Blowfish before embedding it into another watermark image using randomized LSB hiding. This nested watermark is then encrypted again using Blowfish before being embedded into the cover image for increased security. Randomized LSB hiding is used for embedding as it has lower complexity and is more robust than direct LSB hiding. The approach aims to improve security and embedding capacity for copyright protection of digital images.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
This document discusses using elliptic curve cryptography to improve data security in cloud computing. It begins with an abstract that introduces cloud computing and data security as major issues. Then, it provides background on cryptography and classifications of cryptographic algorithms like symmetric, asymmetric, and hash functions. The document also discusses security issues in cloud computing like data isolation, secure data transfer, secure interfaces and access control. It proposes using elliptic curve cryptography to address these issues and provide confidentiality, integrity and authentication for data in the cloud. Overall, the document examines how cryptography can enhance security for data stored in cloud computing environments.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
This document summarizes a research paper that proposes a new graphical password approach for cloud access and data verification. The paper introduces issues with current password authentication schemes for cloud access. It then proposes a new graphical password technique for cloud authentication as well as a technique for verifying the integrity of user data stored on the cloud. The paper discusses the methodology of the proposed system through registration, login, and verification processes. It also reviews related literature and discusses objectives and conclusions. The proposed system aims to only allow authentic users to access the cloud through a secure login process and allow users to check correctness of their cloud data.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A new online payment system is proposed that uses steganography and visual cryptography to protect customer information and prevent identity theft during online shopping. The system embeds a customer's authentication password into an image using text-based steganography. The image is then split into two shares using visual secret sharing so that only combining the shares reveals the full image. One share is kept by the customer and one by a certified authority. During a transaction, the shares are combined by the authority to recover the password and authenticate the customer, allowing funds to be transferred without revealing sensitive details to merchants.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Designing an efficient image encryption then-compression system via predictio...LeMeniz Infotech
The document proposes a new image encryption-then-compression system that aims to efficiently compress encrypted images while maintaining a high level of security. It suggests encrypting images in the prediction error domain and using context-adaptive arithmetic coding to compress the encrypted data, resulting in only a negligible loss in compression efficiency compared to compressing the original images. This approach improves upon existing systems that induce significant penalties on compression performance when encrypting images prior to compression.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Providing Secure Cloud for College Campusvivatechijri
In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Encryption and Authentication using Visual Cryptography in the TS...AM Publications,India
In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
This document proposes enhancing social network security through smart credentials. It discusses how current social networks have weak authentication that allows identity cloning attacks. The document then presents using discrete wavelet transform for data hiding and watermarking uploaded images to help prevent clone attacks. It provides block diagrams of the proposed transmitter and receiver systems. When a user uploads an image, it would be watermarked with their credentials. This allows detecting if another user tries to use the same image to create a fake profile. Overall, the proposed system aims to provide more secure authentication and prevent clone attacks on social networks.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
The Cryptographic Schemes for Secret ImagesIJERA Editor
Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
This document discusses a randomized LSB hiding approach for nested digital image watermarking. It proposes encrypting one watermark image using Blowfish before embedding it into another watermark image using randomized LSB hiding. This nested watermark is then encrypted again using Blowfish before being embedded into the cover image for increased security. Randomized LSB hiding is used for embedding as it has lower complexity and is more robust than direct LSB hiding. The approach aims to improve security and embedding capacity for copyright protection of digital images.
This document summarizes a research paper that proposes a technique for secure authentication of bank customers using image processing, improved steganography, and visual cryptography. The technique encodes a customer's password using steganography to hide it in an image. The image is then divided into shares, with one share stored by the bank and one by the customer. During transactions, the customer presents their share which is combined with the bank's share to reconstruct the original image and extract the hidden password for authentication. The proposed method aims to improve imperceptibility compared to previous steganography methods by utilizing more surrounding pixels when hiding information to reduce image distortion.
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
This document discusses using elliptic curve cryptography to improve data security in cloud computing. It begins with an abstract that introduces cloud computing and data security as major issues. Then, it provides background on cryptography and classifications of cryptographic algorithms like symmetric, asymmetric, and hash functions. The document also discusses security issues in cloud computing like data isolation, secure data transfer, secure interfaces and access control. It proposes using elliptic curve cryptography to address these issues and provide confidentiality, integrity and authentication for data in the cloud. Overall, the document examines how cryptography can enhance security for data stored in cloud computing environments.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
This document summarizes a research paper that proposes a new graphical password approach for cloud access and data verification. The paper introduces issues with current password authentication schemes for cloud access. It then proposes a new graphical password technique for cloud authentication as well as a technique for verifying the integrity of user data stored on the cloud. The paper discusses the methodology of the proposed system through registration, login, and verification processes. It also reviews related literature and discusses objectives and conclusions. The proposed system aims to only allow authentic users to access the cloud through a secure login process and allow users to check correctness of their cloud data.
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A new online payment system is proposed that uses steganography and visual cryptography to protect customer information and prevent identity theft during online shopping. The system embeds a customer's authentication password into an image using text-based steganography. The image is then split into two shares using visual secret sharing so that only combining the shares reveals the full image. One share is kept by the customer and one by a certified authority. During a transaction, the shares are combined by the authority to recover the password and authenticate the customer, allowing funds to be transferred without revealing sensitive details to merchants.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Designing an efficient image encryption then-compression system via predictio...LeMeniz Infotech
The document proposes a new image encryption-then-compression system that aims to efficiently compress encrypted images while maintaining a high level of security. It suggests encrypting images in the prediction error domain and using context-adaptive arithmetic coding to compress the encrypted data, resulting in only a negligible loss in compression efficiency compared to compressing the original images. This approach improves upon existing systems that induce significant penalties on compression performance when encrypting images prior to compression.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Providing Secure Cloud for College Campusvivatechijri
In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Encryption and Authentication using Visual Cryptography in the TS...AM Publications,India
In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
This document proposes enhancing social network security through smart credentials. It discusses how current social networks have weak authentication that allows identity cloning attacks. The document then presents using discrete wavelet transform for data hiding and watermarking uploaded images to help prevent clone attacks. It provides block diagrams of the proposed transmitter and receiver systems. When a user uploads an image, it would be watermarked with their credentials. This allows detecting if another user tries to use the same image to create a fake profile. Overall, the proposed system aims to provide more secure authentication and prevent clone attacks on social networks.
A detailed review on Video SteganographyIRJET Journal
This document provides a summary of previous research on video steganography. It discusses several papers that proposed different techniques for video steganography, including using a binary attention mechanism to hide information in video frames, dual-channel embedding to make the hidden data robust against video transcoding, and using a convolutional neural network model called VStegNET. It also summarizes research on hiding encrypted data within video files and using techniques like genetic algorithms and AES encryption for steganography. Overall, the document reviews a variety of approaches that have been developed for video steganography and hiding secret information in video content.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
Extended Visual Cryptography Using WatermarkingShivam Singh
Basically watermarking is used as a secret information to share, which is added with strong encryption and decryption technique using visual cryptography
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Visual Cryptography Industrial Training ReportMohit Kumar
A visual cryptography scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and computation devices. An extended visual cryptography scheme (EVCS) is a kind of VCS which consists of meaningful shares (compared to the random shares of traditional VCS).
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
This document reviews techniques for encrypting and decrypting messages via image slicing. It begins with an introduction on the importance of securing data transmitted over unsecured channels. It then summarizes several existing studies on steganography and cryptography techniques. The document proposes a hybrid approach using AES cryptography, LSB steganography, and image slicing/stitching for encrypting messages and ensuring their authentic transmission. It presents block diagrams of the sender and receiver sides and compares the proposed approach to existing systems. Limitations and opportunities for future work are also discussed.
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
This document presents a proposed system for confidential login and encrypted data storage using visual cryptography and steganography. The key aspects are:
1. A visual cryptography scheme is used to generate image CAPTCHAs for user login verification, aiming to prevent phishing attacks.
2. A steganography technique embeds encrypted user data into video files by breaking the data into chunks and hiding chunks in the least significant bits of different video frames, making the hidden data imperceptible.
3. Algorithms like scene change detection, split algorithm, and least significant bit are utilized in the steganography process.
The proposed system aims to provide stronger security and privacy for user login and data storage compared to
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
This document proposes a hybrid information security system that combines compression, cryptography, and image steganography to improve data security and capacity when transmitting data over the internet. The system uses discrete wavelet transform for image compression, advanced encryption standard for encryption, and least significant bit steganography for data hiding. Experimental results showed that the proposed combination of techniques maintains stego-image quality, improves system performance, and increases the size of secret data that can be transmitted compared to using each technique individually.
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
This document proposes a system for secure image transcoding using chaotic algorithm encryption. The system encrypts images using a chaotic key-based algorithm (CKBA) before transcoding. It involves applying the discrete cosine transform, CKBA encryption, quantization, and entropy encoding like Huffman coding. A transcoder block then converts the data to a lower bit rate format while maintaining security. At the receiver, the inverse processes are applied to reconstruct the image. The system aims to provide efficient content delivery with end-to-end security for multimedia applications like mobile web browsing.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
Here are the key points about security enhancements for IEEE 802.11 wireless LANs through Wired Equivalent Privacy (WEP) protocol:
- WEP was the original security protocol for 802.11 wireless networks. It aimed to provide a level of security comparable to that of a wired network.
- WEP uses RC4 stream cipher for confidentiality. A pre-shared key (PSK) is used by both the client and access point to encrypt packets.
- The main weaknesses of WEP are: small key size (40-bit or 104-bit), use of static keys, no key management. This makes it vulnerable to eavesdropping and traffic injection attacks.
- To address
1) The document proposes using spread spectrum image steganography (SSIS) to securely store data in the cloud by hiding data within digital images. SSIS spreads a message across a digital image as low-power noise to make the hidden data imperceptible.
2) When a user uploads data to the cloud, SSIS software would encrypt the data multiple times within an image. Even if hackers access the encrypted image, they cannot decrypt the data without knowing how many times the user encrypted it.
3) This provides double security by encrypting data within an image format and ensuring hackers cannot decrypt without the encryption key information known only to the authorized user.
Similar to IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY (20)
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Zener Diode and its V-I Characteristics and Applications
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY
1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
DOI: 10.5121/ijcsea.2017.7401 1
IMAGE RECOGNITION-BASED AUTOMATIC
DECRYPTION METHOD FOR TEXT ENCRYPTED
USING VISUAL CRYPTOGRAPHY
Naoyuki Awano
Department of Computer and Information Science, Seikei University, Tokyo, Japan
ABSTRACT
Using passwords only has rapidly become a security risk. Another approach to security is visual
cryptography (VC), which divides paper documents into several encrypted papers managed by multiple
people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our
work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we
propose a method for automatically recognizing encrypted portions using images captured by a digital
device's camera. Our system has several advantages, including no actual text in communication and
enabling users to use different passwords or secret questions at each use. Furthermore, our method is
implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at
encrypted portions. We conducted experiments regarding recognition accuracy and performance and
obtained results showing that our proposed method was able to achieve a high recognition rate at a low
cost.
KEYWORDS
Image Recognition, Decryption, Digital Device, Visual Cryptography
1. INTRODUCTION
In the last ten years, an increased number of services become available via the Internet; thus,
Internet security techniques have rapidly gained significance. Many Web services require user
authentication, with the most common method for personal authentication being the use of
passwords due to their simple structure requiring users only retain a string of characters.
More recently, using only passwords has become increasingly risky in terms of security, because
serious damage can be caused by password leaks. However, password authentication is very
convenient; therefore, security improvements have typically assumed the continued use of
passwords. Given the increase in security breaches, it has become crucial to combine multiple
security techniques, including the use of secure sockets layer (SSL), the incorporation of secret
questions and one-time passwords, and requiring passwords to contain a variety of character types
(e.g., uppercase, lowercase, numerals, and punctuation).
Considering the scenario, when the Web was in its infancy, Naor and Shamir proposed a security
technique for paper documents known as visual cryptography (VC) [1], which is illustrated in
Figure 1. For encryption, the VC method divides a document into several encrypted documents,
whereas for decryption, the original document can be extracted by stacking all or several original
documents in any order. As a feature, the information can be only understood visually. The VC
method does have some disadvantages, including the requirement of a dedicated device for
printing to sufficiently transparent paper, the need for proper management of these separate
papers, and the burden of exactly stacking these papers. Nonetheless, a key feature is that the
original information cannot be decrypted by only one person, even if some encrypted documents
are lost or leaked; in other words, all or several separate pieces are required to reconstruct the
originally encrypted visual information.
2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
2
As a means of taking advantage of these features, Kato and Imai proposed a VC method for
personal authentication [2]. Here the system and one of its users preliminarily prepare a shared
image in which random patterns are placed. This shared image, which the user retains, serves as a
dedicated common-key image. First, the system creates a message that is converted to an image
and then encrypts it using the common-key image. Next, the system sends this encrypted image to
the user. Finally, the user stacks the encrypted image on the dedicated common-key image to and
decrypts and reads the original message. Note that the above flow is merely conceptual and is yet
to be attempted in practice.
Therefore, in this paper, we discuss the details of the above system for personal authentication
using VC on digital devices; we consider its feasibility and system requirements. Since various
digital devices (e.g., smartphones, tablets, and laptops) are used often in lieu of paper, our
proposed method instead focuses on them, decrypting text by taking pictures of the encrypted
images.
In particular, for the first time according to our knowledge, we consider a simple means of
decrypting text, a means of representing large amounts of text in an image, a means of displaying
that image, and a means of determining what the optimal resolution should be. Furthermore, as a
simple means of decrypting text, we also propose a novel method for automatically recognizing
encrypted portions using captured images from a digital device's camera. To recognize only
encrypted portions with a high recognition rate, our proposed method combines rendering filters
that have been proposed for three-dimensional (3D) point clouds in computer graphics.
Furthermore, we also propose dedicated image correction to enhance the ability to understand the
hidden text.
Using above methods, a different password or secret question can be used every time; moreover,
there is no actual text included in the communication, except for user input. In addition, when the
user might be inputting a password or answer to a secret question or both, nobody else is able to
see what the user is responding. We expect our proposed method to be implemented on wearable
glasses-like devices on which it will be able to decrypt text simply by looking at the set of
encrypted images.
Figure 1. Illustrating visual cryptography (VC) in which information is encrypted by dividing the original
into multiple encrypted pieces.
In addition to this introductory section, in Section 2, we describe conventional VC, including the
basic method adopted in this paper. In Section 3, we introduce an implementable system and
consider its system requirements. Next, in Section 4, we describe our automatic recognition
method for encrypted images from captured images in actual system. In Section 5, we
demonstrate recognition rates, the practicality of our system, and the processing times. Finally,
we draw our conclusions in Section 6.
3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
3
2. VISUAL CRYPTOGRAPHY (VC)
Protecting personal information and preventing it from being leaked or shared with unauthorized
users have become increasingly important in this day and age; however, it is impossible to
entirely prevent information leakage with 100% accuracy with current technology. Consequently,
we require techniques that can prevent unauthorized users from reading protected information
even if a portion of such information is leaked or stolen. One such technique, a secret-sharing
scheme called the k-out-of-n threshold scheme, was proposed by Shamir [3]. In this decades-old
scheme, information to be encrypted is divided into n encrypted pieces to be held by n people.
The information can be decrypted from the full collection of k pieces, but it cannot be decrypted
from only k-1 pieces.
By extending the above method, Naor and Shamir proposed VC, an approach that can visually
decrypt encrypted information without the use of machines [1]. This method is intended for paper
documents, such as the example shown in Figure 1. Since the method can be decrypted without
the use of machines, it is available in such situations such as power failures.
The method [1], which is used in our paper, is explained below for the case of k=n=2. As shown
in Figure 2, each pixel in an input binary image is first divided into two 2×2 blocks consisting of
two white (i.e., transparent) pixels and two black pixels. When an input pixel is white, the blocks
are arranged such that several transparent pixels remain when two blocks are stacked. Conversely,
when an input pixel is black, the blocks are arranged such that all pixels are black when two
blocks are stacked. Each block consists of several patterns, called “shares”, as shown in Figure 3.
Consequently, in the decryption step, we can read the information visually from the differences in
the density of the black pixels; however, there are inherent constraints, such as the need to print
on sufficiently transparent paper, to stack the papers exactly for accurate comprehension, and to
retain many papers.
Many studies have since focused on VC, with nearly all such studies investigating binary images
[4, 5], but several studies have extended the method to grayscale images through the use of
halftoning [6, 7, 8, 9, 10]. There have also been studies that have extended its application to color
images by applying the color model [11, 12, 13]. Furthermore, methods have been proposed in
which the stacking of two different natural images, such as a landscape and an animal, results in a
completely different image to be understood [14, 15]. Finally, there have also been proposals to
expand VC to watermarking [16, 17] or personal authentication [2].
(a) (b)
Figure 2. Encryption and decryption schemes for (a) white pixels and (b) black pixels.
Figure 3. Shares.
4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
4
3. SCHEME AND SYSTEM REQUIREMENTS
For systems that require passwords, it has become increasingly essential to use multiple security
techniques, including SSL, secret questions, one-time passwords, and similar methods. In this
section, we consider a system using VC on digital devices, describing our scheme and its system
requirements. We make use of a two-out-of-two threshold scheme, which is the most basic of
methods.
3.1. SYSTEM SUMMARY
The overall system flow of a general personal authentication system using digital devices, a
concept proposed by Kato and Imai [2], is shown in Figure 4. This flow here is almost the same
as that of a general common-key cryptosystem. The only prerequisite is to generate and share a
common-key image composed of random shares in advance, with example shares shown in
Figure 3 above. In the system, a user first sends a request, such as a user ID to the system. Next,
the system generates text, for example a one-time password, as an image, and then encrypts this
image using the pre-generated common-key image. The encrypted image is then sent to the user,
and then the user stacks it exactly with the common-key image to decrypt the text. Finally, the
user authenticates himself or herself using the given password or by following the given
instructions. This approach enables the use of a different password or set of instructions every
time. Further, there is no text in the communication save for the user input.
Figure 4. A system flow of a general-purpose personal authentication system [2].
Since the above system has only been proposed conceptually, detailed specifications have not yet
been studied. For specific examples, we note the simple method of decrypting long text in an
image, the method of displaying encrypted images, and the method for determining optimal
resolutions. In this paper, we discuss the above three focus areas for achieving the specified
requirements. In Section 3.2, we present a simple method of decryption that uses this system.
Next, in Section 3.3, we describe a method for displaying text, and then in Section 3.4, we
describe the necessary resolutions of the encrypted and common-key images.
3.2. DECRYPTION METHOD
For decryption, users are required to stack encrypted and common-key images exactly when
using VC. Consequently, users would immediately benefit from the ability to decrypt images via
automated means of stacking. One method that we propose in this paper is a method for
decrypting text using a digital device's camera by taking a picture of the encrypted image, thus the
method is expected to be usable on a smartphone or tablet, similar to Quick Response (QR)
5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
5
codes, as shown in Figure 5. Furthermore, we expect our approach will be adaptable to decrypting
text by simply looking at an encrypted image through wearable glasses-like devices.
Figure 5. A potential example of decryption using a digital device.
3.3. ENCRYPTED IMAGE DISPLAY METHOD
As noted above, many VC methods have been proposed; however, since the purpose of our study
is to read text from images, we note that using only binary images is sufficient. Therefore, in this
paper, we use the method of Naor and Shamir for binary images [1].
Moreover, encrypted images cannot be displayed accurately if their resolution is higher than the
given screen resolution. Consequently, the resolution of the encrypted image has certain
limitations. In general, the longer and more complex a password is, the better, but it is difficult to
represent such a password or text in a low-resolution image.
Therefore, an image represents each letter as a square, and the system displays one letter at
regular time intervals. In addition, considering that the same letter is displayed in a row, blank
images are displayed between the letters, as shown in Figure 6. This display method has no
limitation and can use longer and more complex passwords or text.
Figure 6. Illustrating our method for displaying text (from left to right).
3.4. RESOLUTION OF COMMON-KEY AND ENCRYPTED IMAGES
To be automatically decrypted, the target region of the encrypted image captured by a camera
must be automatically recognized. In general, a letter can be accurately represented in a display if
the encrypted image has a high-enough resolution; however, if the resolution is excessively high,
such as beyond that of the captured image, the encrypted image cannot be accurately represented
in the captured image.
In contrast, it becomes straightforward to represent an encrypted image in a captured image if the
encrypted image has relatively low resolution. In addition, we can expect to achieve high
recognition even if the camera moves, but, a letter cannot be represented in an image with
excessively low resolution. Accordingly, this suggests that we can achieve high recognition if we
know the lowest resolution at which we can read a letter.
Typical characters used as parts of passwords or text are shown in Table 1. These 94 characters
were tested for their readability. To simplify the problem, monospaced fonts were used in our
experimentation. In addition, we selected two monospaced fonts, thus totaling 188 characters,
namely Inconsolata and Courier New, for further experimentation. A character was placed in the
center of a square image, with the top and bottom margins relative to the tops and bottoms of all
characters of the font set to 5%.
6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
6
Table 1. Characters assumed to be used in passwords and text.
Figure 7 shows examples of exactly stacked and decrypted results corresponding to each font.
Since Courier New is thinner than Inconsolata, we observe that Courier New required a higher
resolution to represent each character. From the results observed using all characters, we
experimentally determined that all characters could be represented using resolution 100×100.
Therefore, this resolution was used henceforth as the optimal resolution of all encrypted and
common-key images.
(a) Inconsolata
(b) Courier New
Figure 7. Decryption results for various resolutions.
4. RECOGNITION OF ENCRYPTED IMAGE FOR DECRYPTION
Recognition based simply by taking a picture of an encrypted image enables automatic
decryption. To simplify processing, an input captured image is converted into an 8-bit grayscale
image in advance. Then, a dedicated binarization process is applied to the input image to detect
the target region of the encrypted image. Next, a rectangle is extracted from the binary image
with its corners extracted. After that, the encrypted image is extracted and corrected to improve
decryption accuracy. Finally, superimposed onto the common-key image, the image is projected
onto the input captured image.
4.1. BINARIZATION OF AN ENCRYPTED IMAGE
Since the encrypted image consists of shares shown in Figure 3, only that part of the input image
appears as a mass of noise. Therefore, that part is recognized as the encrypted image in this study.
For binarization, each pixel in the input image refers to the neighboring N×N pixels, thus we find
maximum pixel value maxL and the minimum pixel value minL . For our proposed method, we
experimentally determined that N=10. Next, new pixel value )(' pI is calculated as
7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
7
Widely varying parts of neighboring pixel values are converted to black using the above
equations, as exemplified in Figure 8. Furthermore, a large black part is extracted as an encrypted
image, as described in the next section.
(a) (b)
Figure 8. Binarization of various input images with (a) the input images and (b) the resulting
binarizations.
When photographs are taken at close range, some white pixels might remain in a black region, as
shown in Figure 9(a), because the encrypted image is represented using a high resolution. In such
cases, morphological dilation and erosion are generally applied, and inner white pixels are filled;
however, this also has the effect of merging with the noise, as shown on the left-hand side in
Figure 9(b). Given this, recognition accuracy tends to drop if there is noise around any black
regions.
Consequently, in our proposed method, we apply rendering filters for 3D point clouds, as
proposed by Dobrev et al. [18]. More specifically, 3D point clouds are acquired by a 3D scanner
and consist only of points. Because a point cloud has no surface, many background pixels remain
in the object region when it is rendered. Dobrev et al. proposed conditional dilation filters that fill
background pixels. Those filters can dilate object pixels while maintaining the silhouette of the
shape. As the state of the image after our proposed binarization process is applied is similar, we
apply our proposed method to the binary image assuming that black pixels are the object region
and white pixels are the background. Applying this method can indeed yield good results, as
shown in Figure 9(c).
(a)
(b) (c)
Figure 9. Dilation using filters showing (a) results of binarization, (b) dilation and erosion, and (c) results
of the method by Dobrev et al. [18]
8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
8
4.2. CORNER DETECTION OF AN ENCRYPTED IMAGE
In this section, we extract a large black region as an encrypted image under several conditions,
and then the corner points on the large black region for projection transformation. In this paper,
we apply a hierarchical contour detection [19] technique to the binary image created in the
previous section. Subsequently, the encrypted image is a region satisfying all of the conditions
below.
CONDITION 1. STRUCTURE OF CONTOURS
The encrypted image is a large black region. Since the target region has no white pixels, by
the previous section, the regions that have no other contour on the inside are regarded as the
encrypted image.
CONDITION 2. DEGREE OF SQUARE
The encrypted image is a black rectangle on a binary image. The degree of square Q is
calculated as
where A is the area of the interior, and L is the length of the contour. In our proposed method, we
set a threshold Tq such that rectangles whose Q is greater than Tq are regarded as the encrypted
image. For our proposed method, we experimentally determined Tq=0.9.
CONDITION 3. RESOLUTION
If the interior resolution of the rectangle is insufficient, it cannot be decrypted even if it is
superimposed onto the common-key image. For example, when the resolution of the
common-key image is 100×100, regions with more than 400 pixels on the contour are
regarded as the encrypted image.
If multiple regions are regarded as the encrypted image, then the region with maximum area A is
determined as the encrypted image. Subsequently, the four most distant vertices on the contour
are extracted as the corner vertices for projection transformation. Formally, pixels on the contour
are denoted by },...,2,1|{ nipP i == , and the four corner vertices 41 cc − are calculated as follows:
4.3. GENERAL FORMAT, PAGE LAYOUT AND MARGINS
Using extracted corner vertices, the common-key image is projected onto the captured image.
Though it appears that decryption is complete, the accuracy of the decryption is often low and the
character is difficult to discern in practice, because extracted vertices can be out of alignment in
several pixels as a result, for example, of camera motion. Furthermore, when a binary image is
superimposed onto a grayscale image, only the binary portion stands out as a result of the contrast.
In our proposed method, we apply image correction to improve decryption accuracy, as depicted
in Figure 10. First, the target region of the encrypted image is projected onto a square image using
9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
9
bilinear interpolation. Second, the square image is downsampled to an image with a resolution
matching the common-key image and simultaneously binarized. More specifically, the square
image is a grayscale image, as shown on the left-hand side of Figure 11. Therefore, each pixel of
the image is projected onto an image depicted as white lines in the figure. Since each 2×2 block
has two black pixels and two white pixels, as shown in Figure 3, pixels inside the bold square line
of Figure 11 should also become similar.
Accordingly, pixels inside the white lines are averaged, then downsampled to an image matching
the resolution of the common-key image. Furthermore, with 2×2 pixels in a block, two darker
pixels are converted to black, white the others are converted to white. Finally, the image is
superimposed onto the common-key image, and then projected onto the input image.
Figure 10. Decryption with image correction.
Figure 11. Downsampling and binarization.
5. VALIDATION OF METHODS
We implemented our recognition method to verify its effectiveness. In this section, we discuss the
results of the decryption, the accuracy of the decryption, and the calculation costs. Images of all
experiments were captured with 1080p resolution (i.e., 1920×1080).
5.1. RESULTS OF DECRYPTION
Figure 12 shows an example result of successful decryption. An encrypted image exists in the
right-hand side of the captured image, as shown in Figure 12(a), and when the common-key
10. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
10
image is superimposed onto the captured image, the encrypted is recognized and decrypted, as
shown in Figure 12(b). Not only does this confirm a successful decryption, it also confirms that
our proposed method can achieve automatic decryption. As another experiment, we conducted the
experiment in a place which there is no encrypted image; results here showed a false recognition
rate of 0.2% per minute, which is not a problem, because our method cannot decrypt a message
unless an encrypted image is actually provided.
Figure 13 shows sample results with and without image correction (i.e., Figure 13(b) and 13(a),
respectively), thereby confirming that results of decryption are indeed improved by our image
correction method to extent that image correction is required to detect and understand given
characters.
(a) (b)
Figure 12. Example of actual image results using our method, showing (a) an input image with a
hidden message and (b) the resulting image after automatic detection and decryption.
(a) (b)
Figure 13. Illustrating our image correction method both (a) without applying the correction method and
(b) with the correction method applied.
5.2. DECRYPTION ACCURACY
Figure 14 illustrates our experimental setting in which an encrypted image was set at 10×10 cm
with a camera set in front of the image. The following two conditions were then tested: (1) with
the camera set to the same height as the center of the image; and (2) with the point of gaze always
at the center of the image.
11. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
11
Figure 14. Experimental settings.
For our experimentation, the camera first captured an image from a distance of 50 cm. Then,
accuracy was calculated using normalized cross correlation (NCC), which is a measure of the
similarity of two images that is primarily used for pattern matching. It is calculated as
where D is an image resulting from decryption with image correction and T is the image from
decryption with 100% accuracy. NCC produces a value between 0.0 and 1.0, with 1.0
representing the highest level of accuracy. In our study, we took photographs for a span of one
minute, the measured accuracy being the mean NCC of all frames. We used this approach since
the NCC of one frame might have a high value even if the NCC of the previous frame had a low
value.
Next, we moved the camera 10 cm and captured the image again until the encrypted image could
not be recognized. Similarly, mean NCC values were calculated. This same procedure was also
conducted from 30 and 45 degree angles, as depicted in Figure 14.
Figure 15 shows the resulting graphs for all accuracies. Naturally, all the accuracies gradually
decreased with greater photographing distances. The graphs break off since the encrypted image
is not recognized under the conditions described in section 4.2. However, in particular, we do not
know the criteria for inherently good NCC values for reading characters, thus to determine these
criteria, Figure 16 shows average images of 100 decrypted images with the same NCC values. As
can be seen from these images, we confirm that a character can be read if the NCC is greater than
or equal to 0.7. Therefore, Figure 15 shows our proposed recognition method to be effective when
the photographing distance is less than approximately 100 cm.
12. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
12
Figure 15. Normalized cross correlation (NCC) measures at each shooting distance.
Figure 16. Average images of 100 decrypted images at varying NCC values.
5.3. COMPUTATIONAL COST
To determine computational costs, we implemented our proposed method on a Surface Pro 3 and
measured computation time. Overall computation time per flow from image capture to decryption
was 30.7 ms. In addition, the time required for image capture was as much as 50% of the overall
processing time. In other words, our proposed method consumed only approximately 15 ms, thus
we confirmed that computational cost of our proposed recognition method is very low.
5.4. DISCUSSION
The system described in section 3.1 above is a common-key cryptosystem. Such a system faces
the problem of spoofing when the common key is stolen or leaked. However, since the common
key is an image composed of a random pattern, updating the common key is easy when it is stolen
or leaked. This has also been mentioned by Kato and Imai [2]. In addition, anyone around cannot
see what the user is doing because the question itself is encrypted; that is, the user might be
inputting a password or answering secret questions or both.
In practice, current systems employing a one-time password or secret question are very simple.
For example, a one-time password is sent to a user in an e-mail, and the user inputs the password
and is authenticated. In this way, it is possible to authenticate a user on only one device. In
contrast, our proposed method requires two devices, a display, and a camera. Therefore, it can be
used in such situations as online banking and other Web services on a personal computer. In
addition, since the calculation cost is low, our proposed method can be implemented on various
digital devices. Automatically recognizing an encrypted image, our proposed method can be
easily used, similar to the ease of use experienced with a QR code. In the near future, we expect
our technique to be implemented on wearable glasses-like devices, with text being decryptable
simply by looking at the encrypted image.
For security, using our method, it is still possible to use a different password or a secret question
every time, but with the added benefit of having no text in the given communication save for user
input. In addition, we confirmed that users needed to take photographs at a distance of less than
13. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
13
100 cm to accurately read the hidden characters. In other words, there is no security threat from
people who are more than 100 cm away from the display.
6. CONCLUSIONS
In this paper, we presented a decryption method for text encrypted with VC using digital devices.
We explained our decryption system, discussed how to display text, and determined the optimal
resolution of an image for our system. In addition, for user convenience, we proposed an
automatic recognition method for the target region of an encrypted image. Our system displays
only one character of text at regular time intervals. In addition, we determined that the minimal
resolution for recognizing a character was 100×100; thus, systems can encrypt longer text, such
as one-time passwords or secret questions.
Our proposed recognition method also included dedicated binarization. Using this, only the target
region of the encrypted image can be recognized. In addition, to improve decryption accuracy, the
extracted region was corrected using feature of shares of VC.
Our experimental results showed that our proposed method achieved a sufficiently high level of
automatic recognition accuracy. In addition, we confirmed that users must take photographs
within 100 cm to accurately recognize characters. Furthermore, as computational cost is low, we
expect our system to be easily implemented on various devices, including wearable devices,
which is part of our future work.
Overall, a common-key cryptosystem must be provided with a means of ensuring that the
common-key image is not stolen. Further, in the future, we plan to build our proposed system,
then develop and evaluate various real-world applications.
REFERENCES
[1] Naor, M., Shamir, A., (1994) “Visual cryptography”, Advances in Cryptology-EUROCRYPT'94,
LNCS950, pp.1-12.
[2] Kato, T., Imai, H., (1996) “An Extended Construction Method of Visual Secret Sharing Scheme”,
IEICE Transactions on Fundamentals, Vol.J79-A, No.8, pp.1344-1351. (in Japanese)
[3] Shamir, A., (1979) “How to share a secret”, Communications of the ACM, Vol.22, No.11, pp.612-
613.
[4] Weng, IC., Chen, TH., (2017) “A Novel Weighted Visual Cryptography Scheme with High Visual
Quality”, International Journal of Network Security, Vol.19, No.6, pp.922-928.
[5] Shaikh, R., Siddh, S., Ravekar, T., Sugaokar, S., (2016) “Visual Cryptography Survey”, International
Journal of Computer Applications, Vol.134, No.2, pp.10-12.
[6] Blundo, C., Santis, A. D., Naor, M., (2000) “Visual cryptography for grey level images”, Information
Processing Letters, Vol.75, No.6, pp. 255-259.
[7] Dharwadkar, N. V., Amberker, B. B., Joshi, S. R., (2009) “Visual Cryptography for Gray-Level
Image using Adaptive Order Dither Technique”, Journal of Applied Computer Science &
Mathematics, Vol.3, No.6, pp.60-65.
[8] Iwamoto, M., Yamamoto, H., (2002) “The optimal n-out-of-n visual secret sharing scheme for gray-
scale images”, IEICE Transactions on Fundamentals, Vol.E85-A, No.10, pp.2223-2247.
[9] Lin, C. C., Tsai, W. H., (2003) “Visual cryptography for gray-level images by dithering techniques”,
Pattern Recognition Letters, Vol.24, No.1-3, pp. 349-358.
[10] Su, PC., Tsai, TF., Chien, YC., (2017) “Visual secret sharing in halftone images by multi-scale error
diffusion”, Multimedia Tools and Applications, pp.1-28.
[11] Hou, Y. C., (2003) “Visual Cryptography for Color Images”, Pattern Recognition, Vol. 36, No.7,
pp.1619-1629.
14. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 7, No. 3/4, August 2017
14
[12] Koga, H., Yamamoto, H., (1998) “Proposal of a Lattice-Based Visual Secret Sharing Scheme for
Color and Gray-Scale Images”, IEICE Transactions on Fundamentals, Vol.E81-A, No.6, pp.1262-
1269.
[13] Patil, S., Rao, J., (2012) “Extended Visual Cryptography for Color Shares using Random Number
Generators”, International Journal of Advanced Research in Computer and Communication
Engineering, Vol.1, No.6, pp.399-410.
[14] Cimato, S., Yang, C. N., (2011) “Visual Cryptography and Secret Image Sharing”, Digital Imaging
and Computer Vision, CRC Press, pp.95-126.
[15] Nakajima, M., Yamaguchi, Y., (2002) “Extended Visual Cryptography for Natural Images”,
International Conferences in Central Europe on Computer Graphics, Visualization and Computer
Vision, Vo.10, No.2, pp.303-310.
[16] Wang, C. C., Tai, S. C., Yu, C. S., (2000) “Repeating Image Watermarking Technique by the Visual
Cryptography”, IEICE Transactions on Fundamentals, Vol.E83-A, No.8, pp.1589-1598.
[17] Cimato, S., Yang, JC. N., Wu, C. C., (2014) “Visual Cryptography Based Watermarking”,
Transactions on Data Hiding and Multimedia Security, Vol.9, pp.91-109.
[18] Dobrev, P., Rosenthal, P., Linsen, L., (2010) “An Image-space Approach to Interactive Point Cloud
Rendering Including Shadows and Transparency”, Computer Graphics and Geometry, Vol.12, No.3,
pp.2-25.
[19] Suzuki, S., (1985) “Topological Structural Analysis of Digitized Binary Images by Border
Following”, Computer Vision, Graphics, and Image Processing, Vol.30, No.1, pp.32-46.
AUTHOR
Naoyuki Awano Received The BIS, MIS, And DIS Degrees From Osaka Institute Of
Technology, Osaka, Japan, In 2007, 2009, And 2012, Respectively. He Was A Research
Associate At Osaka Institute Of Technology In 2009-2013. Since 2013, He Has Been An
Assistant Professor At Seikei University. His Research Interests Are In The Areas Of Image
Processing And Computer Graphics.