SlideShare a Scribd company logo
Mini Project on
GENERATION OF MEANINGFUL SHARES IN VISUAL
CRYPTOGRAPHIC SYSTEMS
Presented
By
Uttari Chakraborty (200911117)
Debarko De (200915026)
Pratarshi Saha (200911075)
Under the supervision
of
Mr. Sandeep Gurung
(Associate Professor, CSE Dept., SMIT)
DEPT. OF COMPUTER SCIENCE AND ENGINEERING
SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY
MAJITAR SIKKIM, 737136.
Dated : 07/12/2012
CONTENTS
1. Introduction
2.Design Strategy
3.Test Plan
4.Implementation Details
5.Results and Discussions
6.Summary and Conclusion
INTRODUCTION
Visual Cryptography combines perfect ciphers and
graphics
Input = Binary Image
Output = 2 (or more) shares
Shares can be printed on transparent papers
Overlapping of shares reveals the secret
No computer participation is required
Can be decoded directly by the HVS
AIM
To implement Generation of
meaningful shares in Visual
Cryptographic Systems
Problem Definition
• To share secrets without revealing the message
• A third party cannot decrypt the message if he
has less than the required number of shares
• The main areas of problem are-
The contrasts of the output images are lower
than the original secret message
To make the shares completely unsuspicious
Analysis of the Problem
• To extract meaningful shares out of various
kinds of images
• The schemes developed have a disadvantage of
contrast loss
• Also the randomness of the shares make them
obvious
• Hence, we have to develop a method to conceal
the shares inside meaningful images
Solution Strategy
• Partial images are generated of the secret
message by breaking the image into random
parts
• Distribute these parts among random images
which upon overlapping reveal the secret
message
• These partial images are embedded in
meaningful shares which make it difficult to
detect any hidden image
Literature Survey
Visual Cryptography and Shares
Visual Cryptography by Moni Naor and Adi Shamir, LNCS,
Springer, Heidelberg (1994)
Different schemes for generation of shares
A Comprehensive Study of Visual Cryptography by Jonathan
Weir and WeiQi Yan (Queen’s University Belfast, Belfast, BT7
1NN, UK)
Design Strategy
Fig:- Steps involved in accomplishing the project
TEST PLAN
• Should work for any kind of image-
The algorithms used in this project work for any
type, dimension or color model of image.
• Minimum contrast degradation-
The PSNR of the algorithms is calculated to
compare the unwanted contrast loss.
• Randomness in partial images
AND operation is performed on the shares to
check for randomness.
IMPLEMENTATION DETAILS
(2,2) SCHEME
WHITE SHARES: { }
BLACK SHARES: { }
• Each pixel is divided into 2 sub pixels
• Thereby distorts the aspect ratio of the image
• This scheme is seldom used
(2,4) SCHEME
Problems
Contrast Ratio gets deviated from the original
image and is almost half of that of the original
image.
PROPOSED SOLUTION
HALFTONING
Half toning is a method for creating the illusion of Continuous tone output in
Binary Mode.
•Error diffusion is a type of halftoning in which Quantization Residual is
distributed to neighboring Pixels that have not yet been processed.
•Error diffusion using FLYOD-STEINBERG ALGORITHM
Initialize w(x,y)
to Image(x,y)
If w(x,y)
>
threshold
Print
0
Print 1
No
Yes
Compute Error
w(x,y)-max
Forward
Distribute Error
Halftone Results
Original Gray Scale Image Halftone Image
Input Image Output ImageHalftoned
Comparison of (2,4) Scheme Output with and without Halftoning
Colour Visual Cryptography
Input ImageOuutput Image
RESULTS AND DISCUSSIONS
COMPARISON OF ALGORITHMS
PSNR Ratio is used to find out the relative execution time of different
algorithms. The formaula to calculate the PSNR is as given below:
Type of Image PSNR Value
Black & White Image
without Halftoning
6.5715 dB
Black & White Image with
Halftoning
7.3651 dB
Colour CMYK Images 7.4337 dB
SUMMARY AND CONCLUSION
• Thus, in this project we have implemented a new type of
cryptographic scheme which can decode concealed
images without any computation.
• We have generated random parts of various types of
images and embedded them in meaningful shares
• After generating shares using the cover image, we have
overlapped those shares to get the decrypted output.
REFERENCES
• Visual Cryptography by Moni Naor and Adi
Shamir, LNCS, Springer, Heidelberg (1994)
• A Comprehensive Study of Visual Cryptography
by Jonathan Weir and WeiQi Yan (Queen’s
University Belfast, Belfast, BT7 1NN, UK)
GANTT CHART
Project Gantt Chart
7
Aug
2012
11
Aug
2012
22
Aug
2012
15
Nov
2012
Problem
Definition
& Solution
Formulatio
n
Literature Survey
IMPLEMENTATION
Verification And
Validation
Dcumentation
20
Oct
2012
Thank You

More Related Content

What's hot

Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
pallavikhandekar212
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
Mohit Kumar
 
Vc pred
Vc predVc pred
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Dr Qaim Mehdi
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
F42022628
F42022628F42022628
F42022628
IJERA Editor
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
waseem ahmad
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
Nikita Kasar
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
IJMER
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
eSAT Publishing House
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
AmAl C
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
IJNSA Journal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
AM Publications
 

What's hot (20)

Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Vc pred
Vc predVc pred
Vc pred
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
F42022628
F42022628F42022628
F42022628
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 

Viewers also liked

Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Ecaterina Moraru (Valica)
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
Saurabh Nambiar
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
erry wardhana
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
Vinay Sirivara
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
Shahid Zargar
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
Alexander Decker
 
dwm
dwmdwm
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
Shiraz University
 
Watermarking
WatermarkingWatermarking
Watermarking
Nova Sari
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
2510stk
 
secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
wonloser
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
Mohammad Amin Amjadi
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
wonloser
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
Surit Datta
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
Vijayakumar Veeramuthu
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
Qaisar Ayub
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
Raj Endiran
 

Viewers also liked (20)

Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
dwm
dwmdwm
dwm
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
 

Similar to Visual Cryptography in Meaningful Shares

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
IJRAT
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
Editor IJMTER
 
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Arti Singh
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
AmAl C
 
Color Detection & Segmentation based Invisible Cloak
Color Detection & Segmentation based Invisible CloakColor Detection & Segmentation based Invisible Cloak
Color Detection & Segmentation based Invisible Cloak
Aviral Chaurasia
 
Digital Image Communication and Enhancement
Digital Image Communication and EnhancementDigital Image Communication and Enhancement
Digital Image Communication and Enhancement
Nisar Ahmed Rana
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
IJERA Editor
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
ijcsit
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET Journal
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
Oğul Göçmen
 
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET -  	  Deep Learning Approach to Inpainting and Outpainting SystemIRJET -  	  Deep Learning Approach to Inpainting and Outpainting System
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET Journal
 
H1802054851
H1802054851H1802054851
H1802054851
IOSR Journals
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
CSCJournals
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
N.CH Karthik
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUES
IRJET Journal
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
Using A Application For A Desktop Application
Using A Application For A Desktop ApplicationUsing A Application For A Desktop Application
Using A Application For A Desktop Application
Tracy Huang
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
06 cie552 image_manipulation
06 cie552 image_manipulation06 cie552 image_manipulation
06 cie552 image_manipulation
Elsayed Hemayed
 

Similar to Visual Cryptography in Meaningful Shares (20)

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Color Detection & Segmentation based Invisible Cloak
Color Detection & Segmentation based Invisible CloakColor Detection & Segmentation based Invisible Cloak
Color Detection & Segmentation based Invisible Cloak
 
Digital Image Communication and Enhancement
Digital Image Communication and EnhancementDigital Image Communication and Enhancement
Digital Image Communication and Enhancement
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET-  	  Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
IRJET - Deep Learning Approach to Inpainting and Outpainting System
IRJET -  	  Deep Learning Approach to Inpainting and Outpainting SystemIRJET -  	  Deep Learning Approach to Inpainting and Outpainting System
IRJET - Deep Learning Approach to Inpainting and Outpainting System
 
H1802054851
H1802054851H1802054851
H1802054851
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
 
IMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUESIMAGE SEGMENTATION AND ITS TECHNIQUES
IMAGE SEGMENTATION AND ITS TECHNIQUES
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Using A Application For A Desktop Application
Using A Application For A Desktop ApplicationUsing A Application For A Desktop Application
Using A Application For A Desktop Application
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
06 cie552 image_manipulation
06 cie552 image_manipulation06 cie552 image_manipulation
06 cie552 image_manipulation
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Visual Cryptography in Meaningful Shares

  • 1. Mini Project on GENERATION OF MEANINGFUL SHARES IN VISUAL CRYPTOGRAPHIC SYSTEMS Presented By Uttari Chakraborty (200911117) Debarko De (200915026) Pratarshi Saha (200911075) Under the supervision of Mr. Sandeep Gurung (Associate Professor, CSE Dept., SMIT) DEPT. OF COMPUTER SCIENCE AND ENGINEERING SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY MAJITAR SIKKIM, 737136. Dated : 07/12/2012
  • 2. CONTENTS 1. Introduction 2.Design Strategy 3.Test Plan 4.Implementation Details 5.Results and Discussions 6.Summary and Conclusion
  • 3. INTRODUCTION Visual Cryptography combines perfect ciphers and graphics Input = Binary Image Output = 2 (or more) shares Shares can be printed on transparent papers Overlapping of shares reveals the secret No computer participation is required Can be decoded directly by the HVS
  • 4. AIM To implement Generation of meaningful shares in Visual Cryptographic Systems
  • 5. Problem Definition • To share secrets without revealing the message • A third party cannot decrypt the message if he has less than the required number of shares • The main areas of problem are- The contrasts of the output images are lower than the original secret message To make the shares completely unsuspicious
  • 6. Analysis of the Problem • To extract meaningful shares out of various kinds of images • The schemes developed have a disadvantage of contrast loss • Also the randomness of the shares make them obvious • Hence, we have to develop a method to conceal the shares inside meaningful images
  • 7. Solution Strategy • Partial images are generated of the secret message by breaking the image into random parts • Distribute these parts among random images which upon overlapping reveal the secret message • These partial images are embedded in meaningful shares which make it difficult to detect any hidden image
  • 8. Literature Survey Visual Cryptography and Shares Visual Cryptography by Moni Naor and Adi Shamir, LNCS, Springer, Heidelberg (1994) Different schemes for generation of shares A Comprehensive Study of Visual Cryptography by Jonathan Weir and WeiQi Yan (Queen’s University Belfast, Belfast, BT7 1NN, UK)
  • 9. Design Strategy Fig:- Steps involved in accomplishing the project
  • 10. TEST PLAN • Should work for any kind of image- The algorithms used in this project work for any type, dimension or color model of image. • Minimum contrast degradation- The PSNR of the algorithms is calculated to compare the unwanted contrast loss. • Randomness in partial images AND operation is performed on the shares to check for randomness.
  • 11. IMPLEMENTATION DETAILS (2,2) SCHEME WHITE SHARES: { } BLACK SHARES: { } • Each pixel is divided into 2 sub pixels • Thereby distorts the aspect ratio of the image • This scheme is seldom used
  • 12. (2,4) SCHEME Problems Contrast Ratio gets deviated from the original image and is almost half of that of the original image.
  • 13. PROPOSED SOLUTION HALFTONING Half toning is a method for creating the illusion of Continuous tone output in Binary Mode. •Error diffusion is a type of halftoning in which Quantization Residual is distributed to neighboring Pixels that have not yet been processed. •Error diffusion using FLYOD-STEINBERG ALGORITHM Initialize w(x,y) to Image(x,y) If w(x,y) > threshold Print 0 Print 1 No Yes Compute Error w(x,y)-max Forward Distribute Error
  • 14. Halftone Results Original Gray Scale Image Halftone Image Input Image Output ImageHalftoned Comparison of (2,4) Scheme Output with and without Halftoning
  • 15. Colour Visual Cryptography Input ImageOuutput Image
  • 17. COMPARISON OF ALGORITHMS PSNR Ratio is used to find out the relative execution time of different algorithms. The formaula to calculate the PSNR is as given below: Type of Image PSNR Value Black & White Image without Halftoning 6.5715 dB Black & White Image with Halftoning 7.3651 dB Colour CMYK Images 7.4337 dB
  • 18. SUMMARY AND CONCLUSION • Thus, in this project we have implemented a new type of cryptographic scheme which can decode concealed images without any computation. • We have generated random parts of various types of images and embedded them in meaningful shares • After generating shares using the cover image, we have overlapped those shares to get the decrypted output.
  • 19. REFERENCES • Visual Cryptography by Moni Naor and Adi Shamir, LNCS, Springer, Heidelberg (1994) • A Comprehensive Study of Visual Cryptography by Jonathan Weir and WeiQi Yan (Queen’s University Belfast, Belfast, BT7 1NN, UK)
  • 20. GANTT CHART Project Gantt Chart 7 Aug 2012 11 Aug 2012 22 Aug 2012 15 Nov 2012 Problem Definition & Solution Formulatio n Literature Survey IMPLEMENTATION Verification And Validation Dcumentation 20 Oct 2012