SlideShare a Scribd company logo
CONTENTS

   INTRODUCTION TO CRYPTOGRAPHY
    INTRODUCTION TO VISUAL CRYPTOGRAPHY
   OVERVIEW OF VISUAL CRYPTOGRAPHY
   TYPES OF VISUAL CRYPTOGRAPHY
   ADVANTAGES
    DISADVANTAGES
   APPLICATIONS
   CONCLUSION
   REFERENCES
INTRODUCTION

What is Cryptography ?

Plain Text/image    Encryption     Cipher



Plain Text /image     Decryption     Channel
TYPES OF CRYPTOGRAPHY:
VISUAL CRYPTOGRAPHY

What is Visual Cryptography ?

   Visual cryptography is a cryptographic technique which
    allows visual information (pictures, text, etc.) to be
    encrypted in such a way that the decryption can be
    performed by the human visual system.

   Visual cryptography was pioneered by Moni Naor and
    Adi Shamir in 1994
Suppose the data D is divided into n shares
 D can be constructed from any k shares out of n

 Complete knowledge of k-1 shares reveals no
  information about D
 k of n shares is necessary to reveal secret data.
EXAMPLE

   6 thieves share a bank account
   They don’t trust one another
   The thieves split up the password for the account in such
    a way that:
    Any 3 or more thieves working together can have access
    to account, but NOT < 3.
OVERVIEW OF V.C
                                     Share1


                               Stacking the share
                                reveals the secret



      Share2



                  Encryption          Decryption
GENERAL K OUT OF K SCHEME
 Matrix size = k x 2k-1
 S0 : handles the white pixels

    All 2k-1 columns have an even number of 1’s


   S1 : handles the black pixels
      All 2k-1 columns have an odd number of 1’s
BASIS MATRICES
   The two matrices S0,S1 are called basis matrices,
    if the two collections C0,C1 as defines in [1] are
    obtained by rearranging the columns of S0,S1
    satisfy the following condition:

    the row vectors V0,V1 obtained by performing
     OR operation on rows i1,i2,…..iv of S0,S1
    respectively, satisfy
     ω(V0) ≤ tX - α(m). m and ω(V1) ≥ tX
   Where tx is the threshold to visually interpret pixel as
    black or white.

                tX = min(ω(V1(M)))

   α(m) is the contrast or relative difference

        α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m
Example: the basis matrices and the collections of the encoding
 matrices in the conventional (2,2) scheme can be written as:




Here, the pixel expansion is m=2. For any matrix M ∈ C0, the row
vector V0= OR (r1,r2) satisfies ω(V0) =1. For any M ∈ C1, the row
vector V1= OR (r1,r2) satisfies ω(V1) =2.
The threshold is given by:


                 tX = min(ω(V1(M))) = 2

Having a relative difference:


α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m = 1/2
IMPLEMENTATION




      FIG 1
   A pixel P is split into two sub pixels in each of the two
    shares.
•   If P is white, then a coin toss is used to randomly choose
    one of the first two rows in the figure above.
•   If P is black, then a coin toss is used to randomly choose
    one of the last two rows in the figure above.
   Then the pixel P is encrypted as two sub pixels in each
    of the two shares, as determined by the chosen row in the
    figure. Every pixel is encrypted using a new coin toss.
   Now let's consider what happens when we superimpose
    the two shares.
•    If P is black, then we get two black sub pixels when we
    superimpose the two shares;
   If P is white, then we get one black sub pixel and one white
    sub pixel when we superimpose the two shares.
   Thus, we can say that the reconstructed pixel (consisting of
    two sub pixels) has a grey level of 1 if P is black, and a grey
    level of 1/2 if P is white. There will be a 50% loss of contrast
    in the reconstructed image, but it is still visible.
EXAMPLE OF TWO-OUT-OF-TWO VC SCHEME:
 The secret image (a) is encoded into (b) & (c) two
  shares and
 (d ) is decoded by superimposing these two shares with
  50% loss of contrast.
 The decoded image is identified, although some contrast
  loss is observed.
 Due to pixel expansion the width of the decoded image is
  twice as that of the original image.
2 OUT OF 2 SCHEME (4 SUB PIXELS)
    Each pixel encoded as
      a 2x2 cell
      in two shares
  Each share has 2 black, 2 white sub pixels
  When stacked, shares combine to
      Solid black
      Half black (seen as gray)
2 OUT OF 2 SCHEME (4 SUB PIXELS)

6 ways to place two black subpixels in the 2 x 2
 square
2 out of 2 Scheme (4 subpixels)

 Horizontal shares   Vertical shares   Diagonal shares
2 out of 2 Scheme (4 sub pixels)
pixel
         0   1     2   3   4   5   0   1   2   3   4   5

share1


share2



stack




                 4 0
                 1 5

             random
2 OUT OF 6 SCHEME
   Any 2 or more shares out of the 6 are required to decrypt
    the image.




               Share1   Share2     Share3   Share4      Share5    Share6




    2 shares       3 shares      4 shares    5 shares        6 shares
3 OUT OF 3 SCHEME (4 SUB PIXELS)

  With same 2 x 2 array (4 sub pixel) layout
  All of the three shares are required to decrypt the image.


 0011 1100 0101 1010 0110 1001



 horizontal shares     vertical shares      diagonal shares
3 OUT OF 3 SCHEME (4 SUB PIXELS)




   Original      Share 1     Share 2     Share 3




   Share 1+2+3   Share 1+2   Share 2+3   Share 1+ 3
TYPES OF VISUAL CRYPTOGRAPHY
o   Halftone visual cryptography

o   Colour visual cryptography

o   Visual Cryptography with Perfect Restoration

o   Multiresolution Visual Cryptography

o   Progressive Multiresolution Visual
    Cryptography
HALFTONE VISUAL CRYPTOGRAPHY
   A halftone image is made up of a series of dots rather than a
    continuous tone.
   These dots can be different sizes, different colors, and sometimes
    even different shapes.
   Larger dots are used to represent darker, more dense areas of the
    image, while smaller dots are used for lighter areas.
COLOUR VISUAL CRYPTOGRAPHY
1)   Color half toning:
     we can do the color channel splitting first and then do
     the grayscale half toning for each channel




     or we can do the colour half toning first followed by the
      splitting.
2) Creation of shares:
Considering the case of (2,2)-VCS, the steps are:
VISUAL CRYPTOGRAPHY WITH PERFECT
RESTORATION

 The half toning method degrades the quality of the
  original image.
 In this technique both gray and colour images are
  encoded without degradation.
 It retains the advantages of traditional visual
  cryptography.
 Here the stacking operation involves only XOR ing .
MULTIRESOLUTION VISUAL
CRYPTOGRAPHY

   In traditional (k;n) visual cryptography, we only
    construct an image of single resolution if the threshold k
    number of shares are available.

   Progressive visual cryptography scheme in which we not
    only build the reconstructed image by stacking the
    threshold number of shares together, but also utilize the
    other shares to enhance the resolution of the final image.
PROGRESSIVE MULTIRESOLUTION VISUAL
CRYPTOGRAPHY


 In PMRVCS, the shares are ordered and merged in such
  a way that as more shares are used, the bigger is the
  spatial resolution of the reconstructed image.
 A (n,n)-PMRVCS is defined as follows:



    Let I be the original image, S0,S1…Sn are the shares
    created. For k =1,2...,n-1, image Ik can be reconstructed
    by merging S0,S1…….Sk
ADVANTAGES


   Simple to implement
   Decryption algorithm not required (Use a human Visual System).
    So a person unknown to cryptography can decrypt the message.
   We can send cipher text through FAX or E-MAIL
   Lower computational cost since the secret message is recognized
    only by human eyes and not cryptographically computed.
DISADVANTAGES

 The contrast of the reconstructed image is not
  maintained.
 Perfect alignment of the transparencies is troublesome.

 Its original formulation is restricted only to binary
  images. For coloured images additional processing has to
  be done.
APPLICATIONS

 Biometric security
 Watermarking

 Steganography

 Printing and scanning applications

 Bank customer identification
     Bank sends customer a set of keys in advance
     Bank web site displays cipher
     Customer applies overlay, reads transaction key
     Customer enters transaction key
CONCLUSION
  Among various advantages of Visual Cryptography
  Schemes is the property that VCS decoding relies purely
  on human visual system, which leads to a lot of
  interesting applications in private and public sectors of
  our society.
 Visual Cryptography is used with short messages,

  therefore giving the cryptanalyst little to work with.
 It can be used with other data hiding techniques to
  provide better security.
   Since Visual Cryptography uses short message,
    public keys can be encrypted using this method. Visual
    Cryptography has proved that security can be attained
    with even simple encryption schemes.
REFERENCES

   Zhongmin Wang, Arce, G.R., Di Crescenzo, G., "Halftone Visual
    Cryptography Via Error Diffusion", Information Forensics and
    Security, IEEE Transactions on, On page(s): 383 - 396 Volume: 4,
    Issue: 3, Sept. 2009
   Z. Zhou , G. R. Arce and G. Di Crescenzo "Halftone visual
    cryptography", IEEE Trans. Image Process., vol. 15, pp.2441
    2006
   ”Progressive visual cryptography”, Duo Jin, Wei-Qi Yan, Mohan S.
    Kankanhalli , SPIE Journal of Electronic Imaging (JEI/SPIE) on
    Nov.15, 2003, revised on Oct.26, 2004.
   “Security of a Visual Cryptography Scheme for Color Images”, Bert
    W. Leung, Felix Y. Ng, and Duncan S. Wong, Department of
    Computer Science, City University of Hong Kong, Hong Kong,
    China
Visual cryptography1

More Related Content

What's hot

Mpeg 2
Mpeg 2Mpeg 2
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
Sou Jana
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
DevangShukla10
 
Image compression
Image compressionImage compression
Image compression
Bassam Kanber
 
Video
VideoVideo
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Ch07
Ch07Ch07
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
PundrikPatel
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
Mazin Alwaaly
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
Kalyan Acharjya
 
HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING
anam singla
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
Manish Myst
 
Halftoning in Computer Graphics
Halftoning  in Computer GraphicsHalftoning  in Computer Graphics
Halftoning in Computer Graphics
University of Potsdam
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
bcanawakadalcollege
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
Inamul Hossain Imran
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
praseethasnair123
 

What's hot (20)

Mpeg 2
Mpeg 2Mpeg 2
Mpeg 2
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
Classical Encryption Techniques.pdf
Classical Encryption Techniques.pdfClassical Encryption Techniques.pdf
Classical Encryption Techniques.pdf
 
Image compression
Image compressionImage compression
Image compression
 
Video
VideoVideo
Video
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Ch07
Ch07Ch07
Ch07
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 
Multimedia basic video compression techniques
Multimedia basic video compression techniquesMultimedia basic video compression techniques
Multimedia basic video compression techniques
 
Introduction to Image Compression
Introduction to Image CompressionIntroduction to Image Compression
Introduction to Image Compression
 
HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Halftoning in Computer Graphics
Halftoning  in Computer GraphicsHalftoning  in Computer Graphics
Halftoning in Computer Graphics
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Run length encoding
Run length encodingRun length encoding
Run length encoding
 

Viewers also liked

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
Debarko De
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
Saurabh Nambiar
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
Vinay Sirivara
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
Nagarjuna mahanti
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
erry wardhana
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
Mohammad Amin Amjadi
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
Shahrukh Ali
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Viewers also liked (19)

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Steganography
Steganography Steganography
Steganography
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Cryptography
CryptographyCryptography
Cryptography
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 

Similar to Visual cryptography1

J017335863
J017335863J017335863
J017335863
IOSR Journals
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
iosrjce
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
cscpconf
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
IJTET Journal
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
eSAT Publishing House
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
IOSR Journals
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
ijfcstjournal
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
Editor IJCATR
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
Universitas Pembangunan Panca Budi
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
IJRAT
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
F42022628
F42022628F42022628
F42022628
IJERA Editor
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 

Similar to Visual cryptography1 (20)

J017335863
J017335863J017335863
J017335863
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
F42022628
F42022628F42022628
F42022628
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Visual cryptography1

  • 1. CONTENTS  INTRODUCTION TO CRYPTOGRAPHY  INTRODUCTION TO VISUAL CRYPTOGRAPHY  OVERVIEW OF VISUAL CRYPTOGRAPHY  TYPES OF VISUAL CRYPTOGRAPHY  ADVANTAGES  DISADVANTAGES  APPLICATIONS  CONCLUSION  REFERENCES
  • 2. INTRODUCTION What is Cryptography ? Plain Text/image Encryption Cipher Plain Text /image Decryption Channel
  • 4. VISUAL CRYPTOGRAPHY What is Visual Cryptography ?  Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system.  Visual cryptography was pioneered by Moni Naor and Adi Shamir in 1994
  • 5. Suppose the data D is divided into n shares  D can be constructed from any k shares out of n  Complete knowledge of k-1 shares reveals no information about D  k of n shares is necessary to reveal secret data.
  • 6. EXAMPLE  6 thieves share a bank account  They don’t trust one another  The thieves split up the password for the account in such a way that:  Any 3 or more thieves working together can have access to account, but NOT < 3.
  • 7. OVERVIEW OF V.C Share1 Stacking the share reveals the secret Share2 Encryption Decryption
  • 8. GENERAL K OUT OF K SCHEME  Matrix size = k x 2k-1  S0 : handles the white pixels  All 2k-1 columns have an even number of 1’s  S1 : handles the black pixels  All 2k-1 columns have an odd number of 1’s
  • 9. BASIS MATRICES  The two matrices S0,S1 are called basis matrices, if the two collections C0,C1 as defines in [1] are obtained by rearranging the columns of S0,S1 satisfy the following condition: the row vectors V0,V1 obtained by performing OR operation on rows i1,i2,…..iv of S0,S1 respectively, satisfy ω(V0) ≤ tX - α(m). m and ω(V1) ≥ tX
  • 10. Where tx is the threshold to visually interpret pixel as black or white. tX = min(ω(V1(M)))  α(m) is the contrast or relative difference α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m
  • 11. Example: the basis matrices and the collections of the encoding matrices in the conventional (2,2) scheme can be written as: Here, the pixel expansion is m=2. For any matrix M ∈ C0, the row vector V0= OR (r1,r2) satisfies ω(V0) =1. For any M ∈ C1, the row vector V1= OR (r1,r2) satisfies ω(V1) =2.
  • 12. The threshold is given by: tX = min(ω(V1(M))) = 2 Having a relative difference: α(m) = {min(ω(V1(M))) - max(ω(V0(M)))} / m = 1/2
  • 13. IMPLEMENTATION FIG 1
  • 14. A pixel P is split into two sub pixels in each of the two shares. • If P is white, then a coin toss is used to randomly choose one of the first two rows in the figure above. • If P is black, then a coin toss is used to randomly choose one of the last two rows in the figure above.  Then the pixel P is encrypted as two sub pixels in each of the two shares, as determined by the chosen row in the figure. Every pixel is encrypted using a new coin toss.  Now let's consider what happens when we superimpose the two shares. • If P is black, then we get two black sub pixels when we superimpose the two shares;
  • 15. If P is white, then we get one black sub pixel and one white sub pixel when we superimpose the two shares.  Thus, we can say that the reconstructed pixel (consisting of two sub pixels) has a grey level of 1 if P is black, and a grey level of 1/2 if P is white. There will be a 50% loss of contrast in the reconstructed image, but it is still visible.
  • 17.  The secret image (a) is encoded into (b) & (c) two shares and  (d ) is decoded by superimposing these two shares with 50% loss of contrast.  The decoded image is identified, although some contrast loss is observed.  Due to pixel expansion the width of the decoded image is twice as that of the original image.
  • 18. 2 OUT OF 2 SCHEME (4 SUB PIXELS)  Each pixel encoded as  a 2x2 cell  in two shares  Each share has 2 black, 2 white sub pixels  When stacked, shares combine to  Solid black  Half black (seen as gray)
  • 19. 2 OUT OF 2 SCHEME (4 SUB PIXELS) 6 ways to place two black subpixels in the 2 x 2 square
  • 20. 2 out of 2 Scheme (4 subpixels) Horizontal shares Vertical shares Diagonal shares
  • 21. 2 out of 2 Scheme (4 sub pixels)
  • 22. pixel 0 1 2 3 4 5 0 1 2 3 4 5 share1 share2 stack 4 0 1 5 random
  • 23. 2 OUT OF 6 SCHEME  Any 2 or more shares out of the 6 are required to decrypt the image. Share1 Share2 Share3 Share4 Share5 Share6 2 shares 3 shares 4 shares 5 shares 6 shares
  • 24. 3 OUT OF 3 SCHEME (4 SUB PIXELS)  With same 2 x 2 array (4 sub pixel) layout  All of the three shares are required to decrypt the image. 0011 1100 0101 1010 0110 1001 horizontal shares vertical shares diagonal shares
  • 25. 3 OUT OF 3 SCHEME (4 SUB PIXELS) Original Share 1 Share 2 Share 3 Share 1+2+3 Share 1+2 Share 2+3 Share 1+ 3
  • 26. TYPES OF VISUAL CRYPTOGRAPHY o Halftone visual cryptography o Colour visual cryptography o Visual Cryptography with Perfect Restoration o Multiresolution Visual Cryptography o Progressive Multiresolution Visual Cryptography
  • 27. HALFTONE VISUAL CRYPTOGRAPHY  A halftone image is made up of a series of dots rather than a continuous tone.  These dots can be different sizes, different colors, and sometimes even different shapes.  Larger dots are used to represent darker, more dense areas of the image, while smaller dots are used for lighter areas.
  • 28.
  • 29.
  • 30. COLOUR VISUAL CRYPTOGRAPHY 1) Color half toning: we can do the color channel splitting first and then do the grayscale half toning for each channel or we can do the colour half toning first followed by the splitting.
  • 31. 2) Creation of shares: Considering the case of (2,2)-VCS, the steps are:
  • 32.
  • 33.
  • 34. VISUAL CRYPTOGRAPHY WITH PERFECT RESTORATION  The half toning method degrades the quality of the original image.  In this technique both gray and colour images are encoded without degradation.  It retains the advantages of traditional visual cryptography.  Here the stacking operation involves only XOR ing .
  • 35.
  • 36. MULTIRESOLUTION VISUAL CRYPTOGRAPHY  In traditional (k;n) visual cryptography, we only construct an image of single resolution if the threshold k number of shares are available.  Progressive visual cryptography scheme in which we not only build the reconstructed image by stacking the threshold number of shares together, but also utilize the other shares to enhance the resolution of the final image.
  • 37.
  • 38. PROGRESSIVE MULTIRESOLUTION VISUAL CRYPTOGRAPHY  In PMRVCS, the shares are ordered and merged in such a way that as more shares are used, the bigger is the spatial resolution of the reconstructed image.  A (n,n)-PMRVCS is defined as follows: Let I be the original image, S0,S1…Sn are the shares created. For k =1,2...,n-1, image Ik can be reconstructed by merging S0,S1…….Sk
  • 39.
  • 40. ADVANTAGES  Simple to implement  Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message.  We can send cipher text through FAX or E-MAIL  Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
  • 41. DISADVANTAGES  The contrast of the reconstructed image is not maintained.  Perfect alignment of the transparencies is troublesome.  Its original formulation is restricted only to binary images. For coloured images additional processing has to be done.
  • 42. APPLICATIONS  Biometric security  Watermarking  Steganography  Printing and scanning applications  Bank customer identification  Bank sends customer a set of keys in advance  Bank web site displays cipher  Customer applies overlay, reads transaction key  Customer enters transaction key
  • 43. CONCLUSION  Among various advantages of Visual Cryptography Schemes is the property that VCS decoding relies purely on human visual system, which leads to a lot of interesting applications in private and public sectors of our society.  Visual Cryptography is used with short messages, therefore giving the cryptanalyst little to work with.  It can be used with other data hiding techniques to provide better security.
  • 44. Since Visual Cryptography uses short message, public keys can be encrypted using this method. Visual Cryptography has proved that security can be attained with even simple encryption schemes.
  • 45. REFERENCES  Zhongmin Wang, Arce, G.R., Di Crescenzo, G., "Halftone Visual Cryptography Via Error Diffusion", Information Forensics and Security, IEEE Transactions on, On page(s): 383 - 396 Volume: 4, Issue: 3, Sept. 2009  Z. Zhou , G. R. Arce and G. Di Crescenzo "Halftone visual cryptography", IEEE Trans. Image Process., vol. 15, pp.2441 2006  ”Progressive visual cryptography”, Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli , SPIE Journal of Electronic Imaging (JEI/SPIE) on Nov.15, 2003, revised on Oct.26, 2004.  “Security of a Visual Cryptography Scheme for Color Images”, Bert W. Leung, Felix Y. Ng, and Duncan S. Wong, Department of Computer Science, City University of Hong Kong, Hong Kong, China