SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
205 
Visual Cryptography: Keyless Approach for Image 
Encryption 
Ms. Kirti Mhamunkar 1, Mrs Smita Deshmukh 2 
Information Technology, Mumbai University 
Email: kirtimhamunkar@gmail.com 1 
Abstract- Visual Cryptography is a technique that allows information (images, text, diagrams ) to be encrypted 
using an encoding system that can be decrypted by the eyes. Visual cryptography provides a very powerful and 
secure technique by which one secret can be distributed into two or more shares. When the shares are xeroxed 
onto transparencies and then superimposed exactly together, the original secret can be discovered without 
computer participation. In VC generate random shares such that with minimal computation, the original secret 
image can be recovered from the random shares without any loss of image quality. Intent of this paper is 
dividing the image into random shares to maintain the images secrecy. SDS algorithm is used for image 
encryption without keys. 
. 
Index Terms- Visual cryptography, encryption, decryption, contrast, security, accuracy, computational 
complexity. 
1. INTRODUCTION 
Visual Cryptography is first introduced by Moni Naor 
and Adi Shamir, in 1994. In this show how to split a 
secret message into two components. Both parts are 
necessary to reconstruct and reveal the secret, and the 
possession of either one, alone, is useless in 
determining the secret. 
Visual cryptography is a cryptographic technique 
which allows visual information (e.g. printed text, 
handwritten notes and pictures) to be encrypted in 
such a way that the decryption can be performed by 
the human visual system, without the aid of 
computers. Visual cryptography scheme eliminates 
complex computation problem in decryption process, 
and the secret images can be restored by stacking 
operation. This property makes visual cryptography 
especially useful for the low computation load 
requirement.[1]They demonstrated a visual secret 
sharing scheme, where an image was broken up into n 
shares so that only someone with all n shares could 
decrypt the image, while any n − 1 shares revealed no 
information about the original image. 
Each share was printed on a separate transparency, 
and decryption was performed by overlaying the 
shares. When all n shares were overlaid, the original 
image would appear [3]Visual cryptography encodes 
a secret binary image into n shares of random binary 
patterns. The secret image can be visually decoded by 
superimposing a qualified subset of transparencies, 
but no secret information can be obtained from the 
superposition of a forbidden subset [2] Encryption is 
the first process in which the plain text or readable 
text is converted into cipher text or unreadable text. 
The second process is called decryption process in 
which cipher text or unreadable text us converted into 
plain text or readable text. 
To encrypt data we apply an encryption algorithm 
at the sender end and to reveal the data at the receiving 
end, we apply a decryption algorithm. But we need to 
consider the situation where there is no option to use 
the decryption process. The most notable feature of 
this approach is that it can recover a secret image 
without any computation.[5] 
2 .PROPOSED TECHNIQUE 
Proposed technique is splitting an image into multiple 
shares. The shares so generated reveal no information 
about the original secret image and to retrieve the 
secret image all the shares are required. 
The proposed technique is implemented with the SDS 
algorithm and involves three steps. 
Step 1- (Sieving) the secret image is split into 
primary colors. 
Step 2 (Division) these split images are randomly 
divided. 
Step 3 -(Shuffling) these divided shares are then
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
206 
shuffled each within itself. Finally these shuffled 
shares are combined to generate the desired random 
shares. [4] 
Step 1 (Sieving) : Sieving as the name suggests 
involves filtering the combined RGB components into 
individual R, G and B components The granularity of 
the sieve 
depends the range of values that R/G/B component 
may take individually. To make the process 
computationally 
inexpensive, sieving uses the XOR operator. 
Representation of the Sieving operation 
Division: Having filtered the original image into the 
R, G and B components, the next step involves 
dividing the R, G and B components into z parts/ 
shares each. 
Original Image 
Red Green Blue 
(Ra-Rz) (Ga-Gz) (Ba-Bz) 
Shuffle(Ra-Rz) Shuffle(Ga-Gz) Shuffle(Ba-Bz) 
Random Share A Random Share 2 
Step 2 (Division): Having filtered the original 
image into the R, G and B components, the next step 
involves dividing the R, G and B components into z 
parts/ shares each.[4] 
R =(RA, RB, RC,----------------, RZ) 
G = (GA, GB, GC,----------------, GZ) 
B = (BA, BB, BC,----------------, BZ) 
Step 3 (Shuffling): It involves shuffling the 
elements in the individual shares. The sequence in 
which the elements within the shares are shuffled 
depends on the value of one of the other shares 
generated from the same primary color. 
Algorithm 
1. Sieving 
Input Æ Secret Image 
Sieve(Secret Image) 
Output Æ(R, G, B components) 
2. Division 
n = total number of pixels ( 0 to n-1) 
Ri / Gi / Bi = individual values of the ith pixel in 
the R, G, B components 
z = total number of random shares 
x =number of bits representing each primary color 
max_val = 2x 
Repeat 2 for R, G, B component 
2(a) for i = 0 to (n-2) 
{ for share k = A to (Z-1) 
Rki = Random(0, max_val) 
Aggr_Sumi = ™ Rki 
} 
Rzi =( max_val + Ri – (Aggr_Sumi % max_val)) 
% max_val 
3. Shuffle 
Repeat for RA-Z, GA-Z and BA-Z (all generated 
shares) 
for k = A to Z 
{ Rk-shuffle = Rk 
PtrFirstVac = 1 
PtrLastVac = n-1 
For i = 1 to (n-1) 
{ If (R(k+1)(i-1) is even) 
{ R(k-shuffle) PtrFirstVac = Rki 
PtrFirstVac ++, i++ 
} 
Else 
{ R(A-shuffle) PtrFirstVac = RAi 
i++, PtrLastVac -- 
} } } 
4. Combine 
For k = A to Z 
RSk = (Rk-shuffle XOR Gk-shuffle XOR Bk-shuffle) 
Thus at the end of the above process we have 
Random 
shares (RSA ,RSB ------------------- Rsk). 
In proposed scheme there are no keys involved and 
hence there is no key management. All that is required 
is to transmit one of the random shares on a secret 
channel while transmitting the rest on an unsecure 
channel. This schema is also using when the CMY or 
the subtractive model, the colors are represented by the 
degree of the light reflected by the colored objects. In 
this scheme Cyan (C) Magenta (M) and Yellow (Y) 
pigments are used to produce the desired range of 
colors. For decryption purpose XOR operation is used. 
The decoding step involves use of a weighted 
matrix B generated during the training phase and a 
seed ‘s’ used in the encryption phase, thus handling of
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
207 
these two secret elements raises issues similar to key 
management in an encryption algorithm. 
3. CONCLUSION AND FUTURE SCOPE 
In this paper a new enhanced visual cryptographic 
scheme is introduced, In which s secret image is split 
into multiple random images and with minimum 
computation the original secret image can be retrieved 
back. Key management is not an issue because no 
encryption keys are used, Computation cost is low. 
This is best way keyless approach for image 
encryption. 
Future work for this we can use Compression of 
encrypted shares to reduce bandwidth requirement. 
And also take Size of image Variations in format of 
Input image. 
REFERENCES 
[1] Survey of Visual Cryptography Schemes-nternational 
Journal of Security and Its 
Applications Vol. 4, No. 2, AprilApril,ril, 2010 
[2] Zhi Zhou; Arce, G.R.; Di Crescenzo, G., "Halftone 
visual cryptography," Image Processing, IEEE 
Transactions on , vol.15,no.8, pp.2441,2453, Aug. 
2006. 
[3] Moni Naor and Adi Shamir, ”Visual 
cryptography”, in Proceedings of Advances in 
Cryptology EUROCRYPT 94, LNCS Vol. 950, 
pages 1-12. Springer-Verlag, 1994. 
[4] Siddharth Malik, Anjali Sardana ”A Keyless 
Approach to Image Encryption”2012 International 
Conference on Communication Systems and 
Network Technologies 
[5] Asmita Kapsepatil, S. L. Varma”Analysis on 
Visual Cryptography for Color Image with Error 
Diffusion “(IJEIT) Volume 2, Issue 1, July 2012 
[6] Akerkar, R. A.; Lingras, P. (2008). An Intelligent 
Web: Theory and Practice, 1st edn. Johns and 
Bartlett, Boston. 
[7] Albert, R.; Jeong, H.; Barab´asi, A.-L. (1999): 
Diameter of the world-wide Web. Nature, 401, 
pp. 130–131. 
[8] Berry M. W., Dumais S. T., O’Brien G. W. 
(1995): Using linear algebra for intelligent 
information retrieval, SIAM Review, 37, pp. 573- 
595. 
[9] Bharat, K.; Broder, A. (1998): A technique for 
measuring the relative size and overlap of public 
Web search engines. Computer Networks, 30(1– 
7), pp. 107–117. 
[10]Broder, A.; Kumar, R.; Maghoul, F.; Raghavan, 
P.; Rajagopalan, S.; Stata, R.; Tomkins, A.; 
Wiener, J. (2000): Graph structure in the Web. 
Computer Networks, 33(1–6), pp. 309–320. 
[11]Chakrabarti, S. (2000): Data mining for 
hypertext: A tutorial survey. SIGKDD 
explorations, 1(2), pp. 1–11.

More Related Content

What's hot

Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 
5 1-10
5 1-105 1-10
5 1-10
idescitation
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
AneeshGKumar
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
Debarko De
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
iosrjce
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
ijiert bestjournal
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
Shivam Singh
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Harish Sripathi
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
iaemedu
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
Editor IJMTER
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
IOSR Journals
 

What's hot (17)

Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
5 1-10
5 1-105 1-10
5 1-10
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 

Viewers also liked

Paper id 24201484
Paper id 24201484Paper id 24201484
Paper id 24201484
IJRAT
 
Presentasi agama2
Presentasi agama2Presentasi agama2
Presentasi agama2
Dimas Saputra
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
IJRAT
 
Paper id 252014119
Paper id 252014119Paper id 252014119
Paper id 252014119
IJRAT
 
Paper id 23201429
Paper id 23201429Paper id 23201429
Paper id 23201429
IJRAT
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
IJRAT
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
IJRAT
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126
IJRAT
 
The Ukraine and Me
The Ukraine and MeThe Ukraine and Me
The Ukraine and Me
huckrachael
 
Tác dụng của đông trùng hạ thảo đến cơ thể con người
Tác dụng của đông trùng hạ thảo đến cơ thể con ngườiTác dụng của đông trùng hạ thảo đến cơ thể con người
Tác dụng của đông trùng hạ thảo đến cơ thể con ngườiMẹ Thiên Nhiên
 
Paper id 24201467
Paper id 24201467Paper id 24201467
Paper id 24201467
IJRAT
 
Paper id 29201412
Paper id 29201412Paper id 29201412
Paper id 29201412
IJRAT
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143
IJRAT
 
Cardiologi acr7 (1)
Cardiologi acr7 (1)Cardiologi acr7 (1)
Cardiologi acr7 (1)
John Rodriguez Aguilar
 
Paper id 27201475
Paper id 27201475Paper id 27201475
Paper id 27201475
IJRAT
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
IJRAT
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
IJRAT
 
Paper id 24201494
Paper id 24201494Paper id 24201494
Paper id 24201494
IJRAT
 
Paper id 24201469
Paper id 24201469Paper id 24201469
Paper id 24201469
IJRAT
 
Paper id 21201423
Paper id 21201423Paper id 21201423
Paper id 21201423
IJRAT
 

Viewers also liked (20)

Paper id 24201484
Paper id 24201484Paper id 24201484
Paper id 24201484
 
Presentasi agama2
Presentasi agama2Presentasi agama2
Presentasi agama2
 
Paper id 2520141232
Paper id 2520141232Paper id 2520141232
Paper id 2520141232
 
Paper id 252014119
Paper id 252014119Paper id 252014119
Paper id 252014119
 
Paper id 23201429
Paper id 23201429Paper id 23201429
Paper id 23201429
 
Paper id 25201423
Paper id 25201423Paper id 25201423
Paper id 25201423
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Paper id 212014126
Paper id 212014126Paper id 212014126
Paper id 212014126
 
The Ukraine and Me
The Ukraine and MeThe Ukraine and Me
The Ukraine and Me
 
Tác dụng của đông trùng hạ thảo đến cơ thể con người
Tác dụng của đông trùng hạ thảo đến cơ thể con ngườiTác dụng của đông trùng hạ thảo đến cơ thể con người
Tác dụng của đông trùng hạ thảo đến cơ thể con người
 
Paper id 24201467
Paper id 24201467Paper id 24201467
Paper id 24201467
 
Paper id 29201412
Paper id 29201412Paper id 29201412
Paper id 29201412
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143
 
Cardiologi acr7 (1)
Cardiologi acr7 (1)Cardiologi acr7 (1)
Cardiologi acr7 (1)
 
Paper id 27201475
Paper id 27201475Paper id 27201475
Paper id 27201475
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 
Paper id 24201494
Paper id 24201494Paper id 24201494
Paper id 24201494
 
Paper id 24201469
Paper id 24201469Paper id 24201469
Paper id 24201469
 
Paper id 21201423
Paper id 21201423Paper id 21201423
Paper id 21201423
 

Similar to Paper id 25201475

HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
eSAT Publishing House
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
eSAT Journals
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
IJRAT
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
IRJET Journal
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
Alexander Decker
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
Universitas Pembangunan Panca Budi
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
IJERA Editor
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 

Similar to Paper id 25201475 (20)

HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Paper id 25201475

  • 1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 205 Visual Cryptography: Keyless Approach for Image Encryption Ms. Kirti Mhamunkar 1, Mrs Smita Deshmukh 2 Information Technology, Mumbai University Email: kirtimhamunkar@gmail.com 1 Abstract- Visual Cryptography is a technique that allows information (images, text, diagrams ) to be encrypted using an encoding system that can be decrypted by the eyes. Visual cryptography provides a very powerful and secure technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed exactly together, the original secret can be discovered without computer participation. In VC generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image quality. Intent of this paper is dividing the image into random shares to maintain the images secrecy. SDS algorithm is used for image encryption without keys. . Index Terms- Visual cryptography, encryption, decryption, contrast, security, accuracy, computational complexity. 1. INTRODUCTION Visual Cryptography is first introduced by Moni Naor and Adi Shamir, in 1994. In this show how to split a secret message into two components. Both parts are necessary to reconstruct and reveal the secret, and the possession of either one, alone, is useless in determining the secret. Visual cryptography is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes and pictures) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Visual cryptography scheme eliminates complex computation problem in decryption process, and the secret images can be restored by stacking operation. This property makes visual cryptography especially useful for the low computation load requirement.[1]They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares. When all n shares were overlaid, the original image would appear [3]Visual cryptography encodes a secret binary image into n shares of random binary patterns. The secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset [2] Encryption is the first process in which the plain text or readable text is converted into cipher text or unreadable text. The second process is called decryption process in which cipher text or unreadable text us converted into plain text or readable text. To encrypt data we apply an encryption algorithm at the sender end and to reveal the data at the receiving end, we apply a decryption algorithm. But we need to consider the situation where there is no option to use the decryption process. The most notable feature of this approach is that it can recover a secret image without any computation.[5] 2 .PROPOSED TECHNIQUE Proposed technique is splitting an image into multiple shares. The shares so generated reveal no information about the original secret image and to retrieve the secret image all the shares are required. The proposed technique is implemented with the SDS algorithm and involves three steps. Step 1- (Sieving) the secret image is split into primary colors. Step 2 (Division) these split images are randomly divided. Step 3 -(Shuffling) these divided shares are then
  • 2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 206 shuffled each within itself. Finally these shuffled shares are combined to generate the desired random shares. [4] Step 1 (Sieving) : Sieving as the name suggests involves filtering the combined RGB components into individual R, G and B components The granularity of the sieve depends the range of values that R/G/B component may take individually. To make the process computationally inexpensive, sieving uses the XOR operator. Representation of the Sieving operation Division: Having filtered the original image into the R, G and B components, the next step involves dividing the R, G and B components into z parts/ shares each. Original Image Red Green Blue (Ra-Rz) (Ga-Gz) (Ba-Bz) Shuffle(Ra-Rz) Shuffle(Ga-Gz) Shuffle(Ba-Bz) Random Share A Random Share 2 Step 2 (Division): Having filtered the original image into the R, G and B components, the next step involves dividing the R, G and B components into z parts/ shares each.[4] R =(RA, RB, RC,----------------, RZ) G = (GA, GB, GC,----------------, GZ) B = (BA, BB, BC,----------------, BZ) Step 3 (Shuffling): It involves shuffling the elements in the individual shares. The sequence in which the elements within the shares are shuffled depends on the value of one of the other shares generated from the same primary color. Algorithm 1. Sieving Input Æ Secret Image Sieve(Secret Image) Output Æ(R, G, B components) 2. Division n = total number of pixels ( 0 to n-1) Ri / Gi / Bi = individual values of the ith pixel in the R, G, B components z = total number of random shares x =number of bits representing each primary color max_val = 2x Repeat 2 for R, G, B component 2(a) for i = 0 to (n-2) { for share k = A to (Z-1) Rki = Random(0, max_val) Aggr_Sumi = ™ Rki } Rzi =( max_val + Ri – (Aggr_Sumi % max_val)) % max_val 3. Shuffle Repeat for RA-Z, GA-Z and BA-Z (all generated shares) for k = A to Z { Rk-shuffle = Rk PtrFirstVac = 1 PtrLastVac = n-1 For i = 1 to (n-1) { If (R(k+1)(i-1) is even) { R(k-shuffle) PtrFirstVac = Rki PtrFirstVac ++, i++ } Else { R(A-shuffle) PtrFirstVac = RAi i++, PtrLastVac -- } } } 4. Combine For k = A to Z RSk = (Rk-shuffle XOR Gk-shuffle XOR Bk-shuffle) Thus at the end of the above process we have Random shares (RSA ,RSB ------------------- Rsk). In proposed scheme there are no keys involved and hence there is no key management. All that is required is to transmit one of the random shares on a secret channel while transmitting the rest on an unsecure channel. This schema is also using when the CMY or the subtractive model, the colors are represented by the degree of the light reflected by the colored objects. In this scheme Cyan (C) Magenta (M) and Yellow (Y) pigments are used to produce the desired range of colors. For decryption purpose XOR operation is used. The decoding step involves use of a weighted matrix B generated during the training phase and a seed ‘s’ used in the encryption phase, thus handling of
  • 3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 207 these two secret elements raises issues similar to key management in an encryption algorithm. 3. CONCLUSION AND FUTURE SCOPE In this paper a new enhanced visual cryptographic scheme is introduced, In which s secret image is split into multiple random images and with minimum computation the original secret image can be retrieved back. Key management is not an issue because no encryption keys are used, Computation cost is low. This is best way keyless approach for image encryption. Future work for this we can use Compression of encrypted shares to reduce bandwidth requirement. And also take Size of image Variations in format of Input image. REFERENCES [1] Survey of Visual Cryptography Schemes-nternational Journal of Security and Its Applications Vol. 4, No. 2, AprilApril,ril, 2010 [2] Zhi Zhou; Arce, G.R.; Di Crescenzo, G., "Halftone visual cryptography," Image Processing, IEEE Transactions on , vol.15,no.8, pp.2441,2453, Aug. 2006. [3] Moni Naor and Adi Shamir, ”Visual cryptography”, in Proceedings of Advances in Cryptology EUROCRYPT 94, LNCS Vol. 950, pages 1-12. Springer-Verlag, 1994. [4] Siddharth Malik, Anjali Sardana ”A Keyless Approach to Image Encryption”2012 International Conference on Communication Systems and Network Technologies [5] Asmita Kapsepatil, S. L. Varma”Analysis on Visual Cryptography for Color Image with Error Diffusion “(IJEIT) Volume 2, Issue 1, July 2012 [6] Akerkar, R. A.; Lingras, P. (2008). An Intelligent Web: Theory and Practice, 1st edn. Johns and Bartlett, Boston. [7] Albert, R.; Jeong, H.; Barab´asi, A.-L. (1999): Diameter of the world-wide Web. Nature, 401, pp. 130–131. [8] Berry M. W., Dumais S. T., O’Brien G. W. (1995): Using linear algebra for intelligent information retrieval, SIAM Review, 37, pp. 573- 595. [9] Bharat, K.; Broder, A. (1998): A technique for measuring the relative size and overlap of public Web search engines. Computer Networks, 30(1– 7), pp. 107–117. [10]Broder, A.; Kumar, R.; Maghoul, F.; Raghavan, P.; Rajagopalan, S.; Stata, R.; Tomkins, A.; Wiener, J. (2000): Graph structure in the Web. Computer Networks, 33(1–6), pp. 309–320. [11]Chakrabarti, S. (2000): Data mining for hypertext: A tutorial survey. SIGKDD explorations, 1(2), pp. 1–11.