SlideShare a Scribd company logo
1 of 46
CONTENTS

   INTRODUCTION TO CRYPTOGRAPHY
    INTRODUCTION TO VISUAL CRYPTOGRAPHY
   OVERVIEW OF VISUAL CRYPTOGRAPHY
   TYPES OF VISUAL CRYPTOGRAPHY
   ADVANTAGES
    DISADVANTAGES
   APPLICATIONS
   CONCLUSION
   REFERENCES
INTRODUCTION

What is Cryptography ?

Plain Text/image    Encryption     Cipher



Plain Text /image     Decryption     Channel
TYPES OF CRYPTOGRAPHY:
VISUAL CRYPTOGRAPHY

What is Visual Cryptography ?

   Visual cryptography is a cryptographic technique which
    allows visual information (pictures, text, etc.) to be
    encrypted in such a way that the decryption can be
    performed by the human visual system.

   Visual cryptography was pioneered by Moni Naor and
    Adi Shamir in 1994
Suppose the data D is divided into n shares
 D can be constructed from any k shares out of n

 Complete knowledge of k-1 shares reveals no
  information about D
 k of n shares is necessary to reveal secret data.
EXAMPLE

   6 thieves share a bank account
   They don’t trust one another
   The thieves split up the password for the account in such
    a way that:
    Any 3 or more thieves working together can have access
    to account, but NOT < 3.
OVERVIEW OF V.C
                                     Share1


                               Stacking the share
                                reveals the secret



      Share2



                  Encryption          Decryption
GENERAL K OUT OF K SCHEME
 Matrix size = k x 2k-1
 S0 : handles the white pixels

    All 2k-1 columns have an even number of 1’s


   S1 : handles the black pixels
      All 2k-1 columns have an odd number of 1’s
BASIS MATRICES
   The two matrices S0,S1 are called basis matrices,
    if the two collections C0,C1 as defines in [1] are
    obtained by rearranging the columns of S0,S1
    satisfy the following condition:

    the row vectors V0,V1 obtained by performing
     OR operation on rows i1,i2,…..iv of S0,S1
    respectively, satisfy
     ω(V0) ≤ tX - α(m). m and ω(V1) ≥ tX
   Where tx is the threshold to visually interpret pixel as
    black or white.

                tX = min(ω(V1(M)))

   α(m) is the contrast or relative difference

        α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m
Example: the basis matrices and the collections of the encoding
 matrices in the conventional (2,2) scheme can be written as:




Here, the pixel expansion is m=2. For any matrix M ∈ C0, the row
vector V0= OR (r1,r2) satisfies ω(V0) =1. For any M ∈ C1, the row
vector V1= OR (r1,r2) satisfies ω(V1) =2.
The threshold is given by:


                 tX = min(ω(V1(M))) = 2

Having a relative difference:


α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m = 1/2
IMPLEMENTATION




      FIG 1
   A pixel P is split into two sub pixels in each of the two
    shares.
•   If P is white, then a coin toss is used to randomly choose
    one of the first two rows in the figure above.
•   If P is black, then a coin toss is used to randomly choose
    one of the last two rows in the figure above.
   Then the pixel P is encrypted as two sub pixels in each
    of the two shares, as determined by the chosen row in the
    figure. Every pixel is encrypted using a new coin toss.
   Now let's consider what happens when we superimpose
    the two shares.
•    If P is black, then we get two black sub pixels when we
    superimpose the two shares;
   If P is white, then we get one black sub pixel and one white
    sub pixel when we superimpose the two shares.
   Thus, we can say that the reconstructed pixel (consisting of
    two sub pixels) has a grey level of 1 if P is black, and a grey
    level of 1/2 if P is white. There will be a 50% loss of contrast
    in the reconstructed image, but it is still visible.
EXAMPLE OF TWO-OUT-OF-TWO VC SCHEME:
 The secret image (a) is encoded into (b) & (c) two
  shares and
 (d ) is decoded by superimposing these two shares with
  50% loss of contrast.
 The decoded image is identified, although some contrast
  loss is observed.
 Due to pixel expansion the width of the decoded image is
  twice as that of the original image.
2 OUT OF 2 SCHEME (4 SUB PIXELS)
    Each pixel encoded as
      a 2x2 cell
      in two shares
  Each share has 2 black, 2 white sub pixels
  When stacked, shares combine to
      Solid black
      Half black (seen as gray)
2 OUT OF 2 SCHEME (4 SUB PIXELS)

6 ways to place two black subpixels in the 2 x 2
 square
2 out of 2 Scheme (4 subpixels)

 Horizontal shares   Vertical shares   Diagonal shares
2 out of 2 Scheme (4 sub pixels)
pixel
         0   1     2   3   4   5   0   1   2   3   4   5

share1


share2



stack




                 4 0
                 1 5

             random
2 OUT OF 6 SCHEME
   Any 2 or more shares out of the 6 are required to decrypt
    the image.




               Share1   Share2     Share3   Share4      Share5    Share6




    2 shares       3 shares      4 shares    5 shares        6 shares
3 OUT OF 3 SCHEME (4 SUB PIXELS)

  With same 2 x 2 array (4 sub pixel) layout
  All of the three shares are required to decrypt the image.


 0011 1100 0101 1010 0110 1001



 horizontal shares     vertical shares      diagonal shares
3 OUT OF 3 SCHEME (4 SUB PIXELS)




   Original      Share 1     Share 2     Share 3




   Share 1+2+3   Share 1+2   Share 2+3   Share 1+ 3
TYPES OF VISUAL CRYPTOGRAPHY
o   Halftone visual cryptography

o   Colour visual cryptography

o   Visual Cryptography with Perfect Restoration

o   Multiresolution Visual Cryptography

o   Progressive Multiresolution Visual
    Cryptography
HALFTONE VISUAL CRYPTOGRAPHY
   A halftone image is made up of a series of dots rather than a
    continuous tone.
   These dots can be different sizes, different colors, and sometimes
    even different shapes.
   Larger dots are used to represent darker, more dense areas of the
    image, while smaller dots are used for lighter areas.
COLOUR VISUAL CRYPTOGRAPHY
1)   Color half toning:
     we can do the color channel splitting first and then do
     the grayscale half toning for each channel




     or we can do the colour half toning first followed by the
      splitting.
2) Creation of shares:
Considering the case of (2,2)-VCS, the steps are:
VISUAL CRYPTOGRAPHY WITH PERFECT
RESTORATION

 The half toning method degrades the quality of the
  original image.
 In this technique both gray and colour images are
  encoded without degradation.
 It retains the advantages of traditional visual
  cryptography.
 Here the stacking operation involves only XOR ing .
MULTIRESOLUTION VISUAL
CRYPTOGRAPHY

   In traditional (k;n) visual cryptography, we only
    construct an image of single resolution if the threshold k
    number of shares are available.

   Progressive visual cryptography scheme in which we not
    only build the reconstructed image by stacking the
    threshold number of shares together, but also utilize the
    other shares to enhance the resolution of the final image.
PROGRESSIVE MULTIRESOLUTION VISUAL
CRYPTOGRAPHY


 In PMRVCS, the shares are ordered and merged in such
  a way that as more shares are used, the bigger is the
  spatial resolution of the reconstructed image.
 A (n,n)-PMRVCS is defined as follows:



    Let I be the original image, S0,S1…Sn are the shares
    created. For k =1,2...,n-1, image Ik can be reconstructed
    by merging S0,S1…….Sk
ADVANTAGES


   Simple to implement
   Decryption algorithm not required (Use a human Visual System).
    So a person unknown to cryptography can decrypt the message.
   We can send cipher text through FAX or E-MAIL
   Lower computational cost since the secret message is recognized
    only by human eyes and not cryptographically computed.
DISADVANTAGES

 The contrast of the reconstructed image is not
  maintained.
 Perfect alignment of the transparencies is troublesome.

 Its original formulation is restricted only to binary
  images. For coloured images additional processing has to
  be done.
APPLICATIONS

 Biometric security
 Watermarking

 Steganography

 Printing and scanning applications

 Bank customer identification
     Bank sends customer a set of keys in advance
     Bank web site displays cipher
     Customer applies overlay, reads transaction key
     Customer enters transaction key
CONCLUSION
  Among various advantages of Visual Cryptography
  Schemes is the property that VCS decoding relies purely
  on human visual system, which leads to a lot of
  interesting applications in private and public sectors of
  our society.
 Visual Cryptography is used with short messages,

  therefore giving the cryptanalyst little to work with.
 It can be used with other data hiding techniques to
  provide better security.
   Since Visual Cryptography uses short message,
    public keys can be encrypted using this method. Visual
    Cryptography has proved that security can be attained
    with even simple encryption schemes.
REFERENCES

   Zhongmin Wang, Arce, G.R., Di Crescenzo, G., "Halftone Visual
    Cryptography Via Error Diffusion", Information Forensics and
    Security, IEEE Transactions on, On page(s): 383 - 396 Volume: 4,
    Issue: 3, Sept. 2009
   Z. Zhou , G. R. Arce and G. Di Crescenzo "Halftone visual
    cryptography", IEEE Trans. Image Process., vol. 15, pp.2441
    2006
   ”Progressive visual cryptography”, Duo Jin, Wei-Qi Yan, Mohan S.
    Kankanhalli , SPIE Journal of Electronic Imaging (JEI/SPIE) on
    Nov.15, 2003, revised on Oct.26, 2004.
   “Security of a Visual Cryptography Scheme for Color Images”, Bert
    W. Leung, Felix Y. Ng, and Duncan S. Wong, Department of
    Computer Science, City University of Hong Kong, Hong Kong,
    China
Visual cryptography1

More Related Content

What's hot

A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 InteractionMark Kilgard
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacywaseem ahmad
 
Software Visualization (EVO 2008)
Software Visualization (EVO 2008)Software Visualization (EVO 2008)
Software Visualization (EVO 2008)Tudor Girba
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
CS 354 Shadows (cont'd) and Scene Graphs
CS 354 Shadows (cont'd) and Scene GraphsCS 354 Shadows (cont'd) and Scene Graphs
CS 354 Shadows (cont'd) and Scene GraphsMark Kilgard
 
CS 354 Ray Casting & Tracing
CS 354 Ray Casting & TracingCS 354 Ray Casting & Tracing
CS 354 Ray Casting & TracingMark Kilgard
 
Convolutional Neural Network
Convolutional Neural NetworkConvolutional Neural Network
Convolutional Neural NetworkVignesh Suresh
 
CS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and CullingCS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and CullingMark Kilgard
 
image-deblurring
image-deblurringimage-deblurring
image-deblurringErik Mayer
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
 
CS 354 Performance Analysis
CS 354 Performance AnalysisCS 354 Performance Analysis
CS 354 Performance AnalysisMark Kilgard
 

What's hot (20)

A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
Vc pred
Vc predVc pred
Vc pred
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 Interaction
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
Software Visualization (EVO 2008)
Software Visualization (EVO 2008)Software Visualization (EVO 2008)
Software Visualization (EVO 2008)
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
CS 354 Shadows (cont'd) and Scene Graphs
CS 354 Shadows (cont'd) and Scene GraphsCS 354 Shadows (cont'd) and Scene Graphs
CS 354 Shadows (cont'd) and Scene Graphs
 
F42022628
F42022628F42022628
F42022628
 
CS 354 Ray Casting & Tracing
CS 354 Ray Casting & TracingCS 354 Ray Casting & Tracing
CS 354 Ray Casting & Tracing
 
Convolutional Neural Network
Convolutional Neural NetworkConvolutional Neural Network
Convolutional Neural Network
 
CS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and CullingCS 354 Transformation, Clipping, and Culling
CS 354 Transformation, Clipping, and Culling
 
CS 354 Typography
CS 354 TypographyCS 354 Typography
CS 354 Typography
 
image-deblurring
image-deblurringimage-deblurring
image-deblurring
 
Deblurring3
Deblurring3Deblurring3
Deblurring3
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
T01022103108
T01022103108T01022103108
T01022103108
 
CS 354 Performance Analysis
CS 354 Performance AnalysisCS 354 Performance Analysis
CS 354 Performance Analysis
 

Viewers also liked

Comunicación estratégica de Aqualand
Comunicación estratégica de AqualandComunicación estratégica de Aqualand
Comunicación estratégica de Aqualandkristinaah
 
ProCor audience survey results
ProCor audience survey resultsProCor audience survey results
ProCor audience survey resultsprocor
 
Kevan Bilton Exact Target Email Marketing 2.0
Kevan Bilton Exact Target Email Marketing 2.0Kevan Bilton Exact Target Email Marketing 2.0
Kevan Bilton Exact Target Email Marketing 2.0Michael Leander
 
Servicios de marketing y diseño en "Ruiz Prieto Asesores".
Servicios de marketing y diseño en "Ruiz Prieto Asesores".Servicios de marketing y diseño en "Ruiz Prieto Asesores".
Servicios de marketing y diseño en "Ruiz Prieto Asesores".Ruiz Prieto Asesores
 
Personal disciplina
Personal disciplinaPersonal disciplina
Personal disciplinaconvertidor
 
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...Communardo GmbH
 
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...Frederik Smit
 
IT-Link - Company Profile
IT-Link - Company Profile IT-Link - Company Profile
IT-Link - Company Profile IT-Link
 
CADprofi4Partners
CADprofi4PartnersCADprofi4Partners
CADprofi4Partnerscgaldini
 
Entity Search & Getting to Understand Freebase by Jonathan Goodman
Entity Search & Getting to Understand Freebase by Jonathan GoodmanEntity Search & Getting to Understand Freebase by Jonathan Goodman
Entity Search & Getting to Understand Freebase by Jonathan GoodmanSearch Marketing Expo - SMX
 
Monografia balonmano
Monografia balonmanoMonografia balonmano
Monografia balonmanoKarina PS
 

Viewers also liked (20)

Comunicación estratégica de Aqualand
Comunicación estratégica de AqualandComunicación estratégica de Aqualand
Comunicación estratégica de Aqualand
 
Trabajotesismelinda
TrabajotesismelindaTrabajotesismelinda
Trabajotesismelinda
 
Capitulo 3.5: Sistemas sanitarios más cercanos
Capitulo 3.5: Sistemas sanitarios más cercanosCapitulo 3.5: Sistemas sanitarios más cercanos
Capitulo 3.5: Sistemas sanitarios más cercanos
 
Formations PAO & 3D
Formations PAO & 3DFormations PAO & 3D
Formations PAO & 3D
 
Family Law Magazine
Family Law MagazineFamily Law Magazine
Family Law Magazine
 
ProCor audience survey results
ProCor audience survey resultsProCor audience survey results
ProCor audience survey results
 
Kevan Bilton Exact Target Email Marketing 2.0
Kevan Bilton Exact Target Email Marketing 2.0Kevan Bilton Exact Target Email Marketing 2.0
Kevan Bilton Exact Target Email Marketing 2.0
 
Servicios de marketing y diseño en "Ruiz Prieto Asesores".
Servicios de marketing y diseño en "Ruiz Prieto Asesores".Servicios de marketing y diseño en "Ruiz Prieto Asesores".
Servicios de marketing y diseño en "Ruiz Prieto Asesores".
 
Fb para empresas mod3 - ud2y3
Fb para empresas   mod3 - ud2y3Fb para empresas   mod3 - ud2y3
Fb para empresas mod3 - ud2y3
 
Personal disciplina
Personal disciplinaPersonal disciplina
Personal disciplina
 
Mba college in bangalore - NIBE
Mba college in bangalore - NIBEMba college in bangalore - NIBE
Mba college in bangalore - NIBE
 
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...
Microsharing Im Unternehmen: Wie Dokumentieren und Lernen Teil der täglichen ...
 
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...
Frederik Smit, Hans Moerel, Kees van der Wolf & Peter Sleegers (1999). Buildi...
 
IT-Link - Company Profile
IT-Link - Company Profile IT-Link - Company Profile
IT-Link - Company Profile
 
CADprofi4Partners
CADprofi4PartnersCADprofi4Partners
CADprofi4Partners
 
Online Werbung
Online WerbungOnline Werbung
Online Werbung
 
24 10-12 presentation vca marco tiggelman
24 10-12 presentation vca marco tiggelman24 10-12 presentation vca marco tiggelman
24 10-12 presentation vca marco tiggelman
 
Entity Search & Getting to Understand Freebase by Jonathan Goodman
Entity Search & Getting to Understand Freebase by Jonathan GoodmanEntity Search & Getting to Understand Freebase by Jonathan Goodman
Entity Search & Getting to Understand Freebase by Jonathan Goodman
 
Monografia balonmano
Monografia balonmanoMonografia balonmano
Monografia balonmano
 
Determinación de Hemoglobina A2
Determinación de Hemoglobina A2Determinación de Hemoglobina A2
Determinación de Hemoglobina A2
 

Similar to Visual cryptography1

"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual CryptographyAneeshGKumar
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 

Similar to Visual cryptography1 (20)

J017335863
J017335863J017335863
J017335863
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Jz3118501853
Jz3118501853Jz3118501853
Jz3118501853
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Visual cryptography1

  • 1. CONTENTS  INTRODUCTION TO CRYPTOGRAPHY  INTRODUCTION TO VISUAL CRYPTOGRAPHY  OVERVIEW OF VISUAL CRYPTOGRAPHY  TYPES OF VISUAL CRYPTOGRAPHY  ADVANTAGES  DISADVANTAGES  APPLICATIONS  CONCLUSION  REFERENCES
  • 2. INTRODUCTION What is Cryptography ? Plain Text/image Encryption Cipher Plain Text /image Decryption Channel
  • 4. VISUAL CRYPTOGRAPHY What is Visual Cryptography ?  Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system.  Visual cryptography was pioneered by Moni Naor and Adi Shamir in 1994
  • 5. Suppose the data D is divided into n shares  D can be constructed from any k shares out of n  Complete knowledge of k-1 shares reveals no information about D  k of n shares is necessary to reveal secret data.
  • 6. EXAMPLE  6 thieves share a bank account  They don’t trust one another  The thieves split up the password for the account in such a way that:  Any 3 or more thieves working together can have access to account, but NOT < 3.
  • 7. OVERVIEW OF V.C Share1 Stacking the share reveals the secret Share2 Encryption Decryption
  • 8. GENERAL K OUT OF K SCHEME  Matrix size = k x 2k-1  S0 : handles the white pixels  All 2k-1 columns have an even number of 1’s  S1 : handles the black pixels  All 2k-1 columns have an odd number of 1’s
  • 9. BASIS MATRICES  The two matrices S0,S1 are called basis matrices, if the two collections C0,C1 as defines in [1] are obtained by rearranging the columns of S0,S1 satisfy the following condition: the row vectors V0,V1 obtained by performing OR operation on rows i1,i2,…..iv of S0,S1 respectively, satisfy ω(V0) ≤ tX - α(m). m and ω(V1) ≥ tX
  • 10. Where tx is the threshold to visually interpret pixel as black or white. tX = min(ω(V1(M)))  α(m) is the contrast or relative difference α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m
  • 11. Example: the basis matrices and the collections of the encoding matrices in the conventional (2,2) scheme can be written as: Here, the pixel expansion is m=2. For any matrix M ∈ C0, the row vector V0= OR (r1,r2) satisfies ω(V0) =1. For any M ∈ C1, the row vector V1= OR (r1,r2) satisfies ω(V1) =2.
  • 12. The threshold is given by: tX = min(ω(V1(M))) = 2 Having a relative difference: α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m = 1/2
  • 13. IMPLEMENTATION FIG 1
  • 14. A pixel P is split into two sub pixels in each of the two shares. • If P is white, then a coin toss is used to randomly choose one of the first two rows in the figure above. • If P is black, then a coin toss is used to randomly choose one of the last two rows in the figure above.  Then the pixel P is encrypted as two sub pixels in each of the two shares, as determined by the chosen row in the figure. Every pixel is encrypted using a new coin toss.  Now let's consider what happens when we superimpose the two shares. • If P is black, then we get two black sub pixels when we superimpose the two shares;
  • 15. If P is white, then we get one black sub pixel and one white sub pixel when we superimpose the two shares.  Thus, we can say that the reconstructed pixel (consisting of two sub pixels) has a grey level of 1 if P is black, and a grey level of 1/2 if P is white. There will be a 50% loss of contrast in the reconstructed image, but it is still visible.
  • 17.  The secret image (a) is encoded into (b) & (c) two shares and  (d ) is decoded by superimposing these two shares with 50% loss of contrast.  The decoded image is identified, although some contrast loss is observed.  Due to pixel expansion the width of the decoded image is twice as that of the original image.
  • 18. 2 OUT OF 2 SCHEME (4 SUB PIXELS)  Each pixel encoded as  a 2x2 cell  in two shares  Each share has 2 black, 2 white sub pixels  When stacked, shares combine to  Solid black  Half black (seen as gray)
  • 19. 2 OUT OF 2 SCHEME (4 SUB PIXELS) 6 ways to place two black subpixels in the 2 x 2 square
  • 20. 2 out of 2 Scheme (4 subpixels) Horizontal shares Vertical shares Diagonal shares
  • 21. 2 out of 2 Scheme (4 sub pixels)
  • 22. pixel 0 1 2 3 4 5 0 1 2 3 4 5 share1 share2 stack 4 0 1 5 random
  • 23. 2 OUT OF 6 SCHEME  Any 2 or more shares out of the 6 are required to decrypt the image. Share1 Share2 Share3 Share4 Share5 Share6 2 shares 3 shares 4 shares 5 shares 6 shares
  • 24. 3 OUT OF 3 SCHEME (4 SUB PIXELS)  With same 2 x 2 array (4 sub pixel) layout  All of the three shares are required to decrypt the image. 0011 1100 0101 1010 0110 1001 horizontal shares vertical shares diagonal shares
  • 25. 3 OUT OF 3 SCHEME (4 SUB PIXELS) Original Share 1 Share 2 Share 3 Share 1+2+3 Share 1+2 Share 2+3 Share 1+ 3
  • 26. TYPES OF VISUAL CRYPTOGRAPHY o Halftone visual cryptography o Colour visual cryptography o Visual Cryptography with Perfect Restoration o Multiresolution Visual Cryptography o Progressive Multiresolution Visual Cryptography
  • 27. HALFTONE VISUAL CRYPTOGRAPHY  A halftone image is made up of a series of dots rather than a continuous tone.  These dots can be different sizes, different colors, and sometimes even different shapes.  Larger dots are used to represent darker, more dense areas of the image, while smaller dots are used for lighter areas.
  • 28.
  • 29.
  • 30. COLOUR VISUAL CRYPTOGRAPHY 1) Color half toning: we can do the color channel splitting first and then do the grayscale half toning for each channel or we can do the colour half toning first followed by the splitting.
  • 31. 2) Creation of shares: Considering the case of (2,2)-VCS, the steps are:
  • 32.
  • 33.
  • 34. VISUAL CRYPTOGRAPHY WITH PERFECT RESTORATION  The half toning method degrades the quality of the original image.  In this technique both gray and colour images are encoded without degradation.  It retains the advantages of traditional visual cryptography.  Here the stacking operation involves only XOR ing .
  • 35.
  • 36. MULTIRESOLUTION VISUAL CRYPTOGRAPHY  In traditional (k;n) visual cryptography, we only construct an image of single resolution if the threshold k number of shares are available.  Progressive visual cryptography scheme in which we not only build the reconstructed image by stacking the threshold number of shares together, but also utilize the other shares to enhance the resolution of the final image.
  • 37.
  • 38. PROGRESSIVE MULTIRESOLUTION VISUAL CRYPTOGRAPHY  In PMRVCS, the shares are ordered and merged in such a way that as more shares are used, the bigger is the spatial resolution of the reconstructed image.  A (n,n)-PMRVCS is defined as follows: Let I be the original image, S0,S1…Sn are the shares created. For k =1,2...,n-1, image Ik can be reconstructed by merging S0,S1…….Sk
  • 39.
  • 40. ADVANTAGES  Simple to implement  Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message.  We can send cipher text through FAX or E-MAIL  Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
  • 41. DISADVANTAGES  The contrast of the reconstructed image is not maintained.  Perfect alignment of the transparencies is troublesome.  Its original formulation is restricted only to binary images. For coloured images additional processing has to be done.
  • 42. APPLICATIONS  Biometric security  Watermarking  Steganography  Printing and scanning applications  Bank customer identification  Bank sends customer a set of keys in advance  Bank web site displays cipher  Customer applies overlay, reads transaction key  Customer enters transaction key
  • 43. CONCLUSION  Among various advantages of Visual Cryptography Schemes is the property that VCS decoding relies purely on human visual system, which leads to a lot of interesting applications in private and public sectors of our society.  Visual Cryptography is used with short messages, therefore giving the cryptanalyst little to work with.  It can be used with other data hiding techniques to provide better security.
  • 44. Since Visual Cryptography uses short message, public keys can be encrypted using this method. Visual Cryptography has proved that security can be attained with even simple encryption schemes.
  • 45. REFERENCES  Zhongmin Wang, Arce, G.R., Di Crescenzo, G., "Halftone Visual Cryptography Via Error Diffusion", Information Forensics and Security, IEEE Transactions on, On page(s): 383 - 396 Volume: 4, Issue: 3, Sept. 2009  Z. Zhou , G. R. Arce and G. Di Crescenzo "Halftone visual cryptography", IEEE Trans. Image Process., vol. 15, pp.2441 2006  ”Progressive visual cryptography”, Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli , SPIE Journal of Electronic Imaging (JEI/SPIE) on Nov.15, 2003, revised on Oct.26, 2004.  “Security of a Visual Cryptography Scheme for Color Images”, Bert W. Leung, Felix Y. Ng, and Duncan S. Wong, Department of Computer Science, City University of Hong Kong, Hong Kong, China