SlideShare a Scribd company logo
HYBRID APPROACH FOR (K, N) SECRET SHARING IN VISUAL CRYPTOGRAPHY
School of Computer Science and Engineering
Vellore Institute of Technology, Vellore-Tamil Nadu -632014
Allu Supraja-17MCI0013
M-Tech CSE(IS) 2017-2019
allu.supraja2017@vitstudent.ac.in
INTRODUCTION:
• Visual cryptography (VC) is an emerging area used for data hiding, authentication,
multimedia security and transmission of data.
• Recent research shows many applications uses visual cryptography concept in
authentication, secure transaction, secret sharing of information.
LITERATURE SURVEY
• Vinita malik et al (2016) [1] have proposed a des (data encryption standard) algorithm for shaded
visual cryptography.
• Ch. Rupa et al(2016)[2] have proposed another recommendation that is keyed visual cryptographic
scheme (KVCS) to decrease the assault by programmer.
• Asha bhadran r (2015) [3] have displayed a visual cryptography procedure for shading pictures get
encoded due to created share.
• M. Karolinet et al (2015) [4] have proposed a technique for pictures with 256 hues which are
changed over to 16 standard RGB hues design.
• Kashmira S. Gulhaneet et al (2016), [5] the image is partitioned into parts known as offers and
after that these offers are dispersed to the members.
• Nidhal khdhair, abbadiet et al (2016) [6] have recommended another technique for picture
encryption in light.
• K. Kanagalakshmet et al (2016) [7] have proposed a technique that depends on blowfish
calculation with prevalent highlights.
• Naor & shamir (1994) [8] have proposed the fundamental topic of visual cryptography inside
which the key picture is part into 2 shares.
• Manika sharmaet al (2013) [9] have proposed a cryptographic system for shading pictures where
we are utilizing shading mistake dissemination with xor activity.
EXAMPLE USING PIXELS:
COMPARITIVE STUDY
ALGORITHM METHOD ADVANTAGES DISADVANTAGE
Watermark method based on
Visual cryptography
• Difficult to detect or
recover from marked
image illegally
• The weakness of this
method is different
verification information
for different marked
images
(K,N)-threshold visual
cryptography scheme
• Data loss prevention and
security in recovering
image.
• If the dimensions of the
image is high difficult to
analyze.
Extended colour visual
cryptography for black and
white secret image
• Satisfy security, contrast,
and cover image
conditions.
• (k, n)-CBW-VCS are all
perfect black.
• Non-perfect black VC
cannot be determined
Concept of VC and image
processing in banking
• Secure transactions
• authentication
• Only works on black and
white images.
CHANG’S EMBEDDING • Less noisy • (2,N) colored images can’t
OBJECTIVE
• The existing system include lot of research on visual cryptography technique.
• The concepts like EVCT (extended visual cryptography technique), halftoning, CTVCS (color
transfer visual cryptography scheme), (k, n) secret sharing.
• The implementation of visual cryptography concept include mainly number of secret images,
pixel expansion, image format and types of share generated.
VISUAL CRYPTOGRAPHY NOTATIONS
• (1) k- threshold
• (2) n- group size
• (3) m-pixel expansion
• (4) α-relative contrast
• (5) h(v)-hamming weight
• (6) c0-collection of n*m Boolean matrices for shares of white pixel
• (7) c1-collection of n*m Boolean matrices for shares of black pixel
• (8) d-number in [1,m]
• (9) v- or’ed K rows
ALGORITHM FOR IMPLEMENTATION
• Visual cryptography by naor and shamir for monochrome images
• KN sharing scheme for colored images
• SHA-512 algorithm
• AES-256 bit algorithm
Tools:
• MATLAB 2018 or later
FLOWCHART FOR IMPLEMENTATION
METHODOLOGY:
CONS OF EXISTING SYSTEM
• Low level of security
• No key based security
• Random noise generation in shares
• Transparency
• Possibility of attack in shares
PROS ON ANALYSIS OF HYBRID APPROACH
• Enhanced security
• Robustness
• No transparency
• Key based approach for each individual share
RESULTS AND ANALYSIS
• The below figure shows result when AES algorithm is used to generate the (k, n) secret sharing
scheme to make data more secure.
QUANTITATIVE RESULTS
Fig: Psnr Vs K For Normal Image Fig: Psnr Vs K For 10*10 Image
Show Variation In Psnr When Ran
10 Times
Fig 7: Psnr Vs K For 100*100
Image Variation In Psnr When Ran
10 Times
APPLICATIONS OF VISUAL CRYPTOGRAPHY
• Watermarking
• Secure banking communication
• Defense system
• Anti-phishing system
CONCLUSION
• Visual cryptography scheme place vital role in rapid growth technology while implementing any
type of application. This can be considered as one of major security concern to prevent
unauthorized access and all possible attacks.
• The above work implemented on the basis of security measure. This results in reduction of
random-noise generated between shares, secret sharing in a secured medium, and increase
transparency also robustness.
• The hybrid mechanism of two level approach is to enhance the security and makes the visual
cryptography more robust to prevent attacks.
FUTURE SCOPE
Every parameter of visual cryptography is kept minded and implemented, so that we can use this
approach in real time applications like distributed system, networks, banking and so on. Data
security is concentrated majorly in recent research works further we can implement for multimedia
security like audio and video.
REFERENCES
[1] a. Pandey and S. Som, “applications and usage of visual cryptography: A review,” 2016 5th int.
Conf. Reliab. Infocom technol. Optim. ICRITO 2016 trends futur. Dir., Pp. 375–381, 2016.
[2] b. Symposium, “AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET
HIDING R . youmaran , A . adler , A . miri school of information technology and engineering (
SITE ), university of ottawa , ontario , canada,” pp. 340–343, 2006.
[3] c. N. Yang, T. C. Tung, F. H. Wu, and Z. Zhou, “color transfer visual cryptography with perfect
security,” meas. J. Int. Meas. Confed., Vol. 95, pp. 480–493, 2017.
[4] s. Dixit, D. K. Jain, and A. Saxena, “an approach for secret sharing using randomized visual
secret sharing,” proc. - 2014 4th int. Conf. Commun. Syst. Netw. Technol. CSNT 2014, pp. 847–850,
2014.
[5] c. Vyas and M. Lunagaria, “a review on methods for image authentication and visual
cryptography in digital image,” IEEE int. Conf. Comput. Intell. Comput. Res., 2014.
1a34gvddskjjjfjij
Visual cryptography for hybrid approach

More Related Content

What's hot

IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
AmAl C
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
Nikita Kasar
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
IAEME Publication
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
2510stk
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
IJERA Editor
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
acijjournal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
ijiert bestjournal
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
eSAT Publishing House
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Rajesh Kumar
 
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
Edge AI and Vision Alliance
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
 
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Paris Women in Machine Learning and Data Science
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
IAEME Publication
 
An Efficient encryption using Data compression towards Steganography,introduc...
An Efficient encryption using Data compression towards Steganography,introduc...An Efficient encryption using Data compression towards Steganography,introduc...
An Efficient encryption using Data compression towards Steganography,introduc...
prashantdahake
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 

What's hot (20)

IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
 
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
An Efficient encryption using Data compression towards Steganography,introduc...
An Efficient encryption using Data compression towards Steganography,introduc...An Efficient encryption using Data compression towards Steganography,introduc...
An Efficient encryption using Data compression towards Steganography,introduc...
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 

Similar to Visual cryptography for hybrid approach

R04405103106
R04405103106R04405103106
R04405103106
IJERA Editor
 
cse final year project of image encryption
cse final year project of image encryptioncse final year project of image encryption
cse final year project of image encryption
mnbharath2002
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
IJERA Editor
 
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
IRJET Journal
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
IJEECSIAES
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
nooriasukmaningtyas
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
IAEME Publication
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
IJARIIT
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
IRJET Journal
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
IJECEIAES
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 

Similar to Visual cryptography for hybrid approach (20)

R04405103106
R04405103106R04405103106
R04405103106
 
cse final year project of image encryption
cse final year project of image encryptioncse final year project of image encryption
cse final year project of image encryption
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
 
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 

Visual cryptography for hybrid approach

  • 1. HYBRID APPROACH FOR (K, N) SECRET SHARING IN VISUAL CRYPTOGRAPHY School of Computer Science and Engineering Vellore Institute of Technology, Vellore-Tamil Nadu -632014 Allu Supraja-17MCI0013 M-Tech CSE(IS) 2017-2019 allu.supraja2017@vitstudent.ac.in
  • 2. INTRODUCTION: • Visual cryptography (VC) is an emerging area used for data hiding, authentication, multimedia security and transmission of data. • Recent research shows many applications uses visual cryptography concept in authentication, secure transaction, secret sharing of information.
  • 3. LITERATURE SURVEY • Vinita malik et al (2016) [1] have proposed a des (data encryption standard) algorithm for shaded visual cryptography. • Ch. Rupa et al(2016)[2] have proposed another recommendation that is keyed visual cryptographic scheme (KVCS) to decrease the assault by programmer. • Asha bhadran r (2015) [3] have displayed a visual cryptography procedure for shading pictures get encoded due to created share. • M. Karolinet et al (2015) [4] have proposed a technique for pictures with 256 hues which are changed over to 16 standard RGB hues design.
  • 4. • Kashmira S. Gulhaneet et al (2016), [5] the image is partitioned into parts known as offers and after that these offers are dispersed to the members. • Nidhal khdhair, abbadiet et al (2016) [6] have recommended another technique for picture encryption in light. • K. Kanagalakshmet et al (2016) [7] have proposed a technique that depends on blowfish calculation with prevalent highlights. • Naor & shamir (1994) [8] have proposed the fundamental topic of visual cryptography inside which the key picture is part into 2 shares. • Manika sharmaet al (2013) [9] have proposed a cryptographic system for shading pictures where we are utilizing shading mistake dissemination with xor activity.
  • 6. COMPARITIVE STUDY ALGORITHM METHOD ADVANTAGES DISADVANTAGE Watermark method based on Visual cryptography • Difficult to detect or recover from marked image illegally • The weakness of this method is different verification information for different marked images (K,N)-threshold visual cryptography scheme • Data loss prevention and security in recovering image. • If the dimensions of the image is high difficult to analyze. Extended colour visual cryptography for black and white secret image • Satisfy security, contrast, and cover image conditions. • (k, n)-CBW-VCS are all perfect black. • Non-perfect black VC cannot be determined Concept of VC and image processing in banking • Secure transactions • authentication • Only works on black and white images. CHANG’S EMBEDDING • Less noisy • (2,N) colored images can’t
  • 7. OBJECTIVE • The existing system include lot of research on visual cryptography technique. • The concepts like EVCT (extended visual cryptography technique), halftoning, CTVCS (color transfer visual cryptography scheme), (k, n) secret sharing. • The implementation of visual cryptography concept include mainly number of secret images, pixel expansion, image format and types of share generated.
  • 8. VISUAL CRYPTOGRAPHY NOTATIONS • (1) k- threshold • (2) n- group size • (3) m-pixel expansion • (4) α-relative contrast • (5) h(v)-hamming weight • (6) c0-collection of n*m Boolean matrices for shares of white pixel • (7) c1-collection of n*m Boolean matrices for shares of black pixel • (8) d-number in [1,m] • (9) v- or’ed K rows
  • 9. ALGORITHM FOR IMPLEMENTATION • Visual cryptography by naor and shamir for monochrome images • KN sharing scheme for colored images • SHA-512 algorithm • AES-256 bit algorithm Tools: • MATLAB 2018 or later
  • 11. CONS OF EXISTING SYSTEM • Low level of security • No key based security • Random noise generation in shares • Transparency • Possibility of attack in shares
  • 12. PROS ON ANALYSIS OF HYBRID APPROACH • Enhanced security • Robustness • No transparency • Key based approach for each individual share
  • 13. RESULTS AND ANALYSIS • The below figure shows result when AES algorithm is used to generate the (k, n) secret sharing scheme to make data more secure.
  • 14. QUANTITATIVE RESULTS Fig: Psnr Vs K For Normal Image Fig: Psnr Vs K For 10*10 Image Show Variation In Psnr When Ran 10 Times Fig 7: Psnr Vs K For 100*100 Image Variation In Psnr When Ran 10 Times
  • 15. APPLICATIONS OF VISUAL CRYPTOGRAPHY • Watermarking • Secure banking communication • Defense system • Anti-phishing system
  • 16. CONCLUSION • Visual cryptography scheme place vital role in rapid growth technology while implementing any type of application. This can be considered as one of major security concern to prevent unauthorized access and all possible attacks. • The above work implemented on the basis of security measure. This results in reduction of random-noise generated between shares, secret sharing in a secured medium, and increase transparency also robustness. • The hybrid mechanism of two level approach is to enhance the security and makes the visual cryptography more robust to prevent attacks.
  • 17. FUTURE SCOPE Every parameter of visual cryptography is kept minded and implemented, so that we can use this approach in real time applications like distributed system, networks, banking and so on. Data security is concentrated majorly in recent research works further we can implement for multimedia security like audio and video.
  • 18. REFERENCES [1] a. Pandey and S. Som, “applications and usage of visual cryptography: A review,” 2016 5th int. Conf. Reliab. Infocom technol. Optim. ICRITO 2016 trends futur. Dir., Pp. 375–381, 2016. [2] b. Symposium, “AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET HIDING R . youmaran , A . adler , A . miri school of information technology and engineering ( SITE ), university of ottawa , ontario , canada,” pp. 340–343, 2006. [3] c. N. Yang, T. C. Tung, F. H. Wu, and Z. Zhou, “color transfer visual cryptography with perfect security,” meas. J. Int. Meas. Confed., Vol. 95, pp. 480–493, 2017. [4] s. Dixit, D. K. Jain, and A. Saxena, “an approach for secret sharing using randomized visual secret sharing,” proc. - 2014 4th int. Conf. Commun. Syst. Netw. Technol. CSNT 2014, pp. 847–850, 2014. [5] c. Vyas and M. Lunagaria, “a review on methods for image authentication and visual cryptography in digital image,” IEEE int. Conf. Comput. Intell. Comput. Res., 2014. 1a34gvddskjjjfjij