SlideShare a Scribd company logo
1 of 6
Securing Visual Cryptographic Shares using Public
Key Encryption
Kulvinder Kaur
Department of Computer Science & Engineering
ABES Engineering College
Ghaziabad, India
skulvinder_08@yahoo.co.in
Vineeta Khemchandani
Department of Computer Applications
JSS Academy of Technical Education
NOIDA, India
V_khemchandani@yahoo.com
Abstract-The Visual Cryptography Scheme is a secure method
that encrypts a secret document or image by breaking it into
shares. A distinctive property of Visual Cryptography Scheme is
that one can visually decode the secret image by superimposing
shares without computation. By taking the advantage of this
property, third person can easily retrieve the secret image if shares
are passing in sequence over the network. The project presents an
approach for encrypting visual cryptographically generated image
shares using Public Key Encryption. RSA algorithm is used for
providing the double security of secret document. Thus secret share
are not available in their actual form for any alteration by the
adversaries who try to create fake shares. The scheme provides
more secure secret shares that are robust against a number of
attacks & the system provides a strong security for the handwritten
text, images and printed documents over the public network.
Keywords---Visual Cryptography; Encryption; Information
Security; VC shares
I. INTRODUCTION
In today’s information age, information sharing and transfer has
increased exponentially. The threat of an intruder accessing
secret information has been an ever existing concern for the data
communication experts. With the rapid advancement of network
topology, multimedia information is transmitted over the
Internet conveniently. Various confidential data such as military
maps and commercial identification are transmitted over the
Internet. While using secret images, security issues should be
taken into consideration because hackers may utilize weak link
over public network to steal information that they want. To deal
with security problems of secret images, we should develop
some secure appropriate algorithm by which we can secure our
data on internet. With this system visual information (pictures)
can be secure over the internet with the help of Visual
Cryptography.
The proposed scheme combines the advantages of both Visual
Cryptography as well as Public Key Cryptography. This scheme
enhances the security of VC shares by encrypting with Public
Key Cryptography [14][15], which provides the strong security
to the transfer of secret information in form of images, printed
text and hand written material.
Visual Cryptography (VC) is a special encryption
technique used to encrypt images in such a way that it can be
decrypted by the human visual system if the correct key images
are used. The technique was proposed by Moni Naor and Adi
Shamir[6] in 1994. According to them Visual Cryptography is a
method of encrypting a secret image into shares such that
stacking a sufficient number of shares reveals the secret image.
Shares are binary images usually presented in transparencies.
Unlike conventional cryptographic methods, VC needs no
complicated computation for recovering the secret image. The
act of decryption is to simply stack shares and view the secret
image that appears on the stacked shares. Visual Cryptographic
technique is being used for secretly transfer of images in army,
hand written documents, financial documents, text images,
internet- voting etc.
VC shares exist in their actual form during the transmission over
network. However, directly third person cannot guess the secret
information with any single share, but there is a possibility of
retrieval if hackers are able to collect all the shares passing in
sequence over the network. Thus to get rid of this problem, we
need to enhance the security of shares. For the same purpose we
have used Public Key Cryptography in addition to Visual
Cryptography so that even if hackers are able to get all the
shares but they cannot retrieve the original secret without the
access of private key.
II. RELATED WORK
Various researches have been carried out in this area to increase
the security & visual quality of the secret image. Some of them
are as follows:
Néelima Guntupalli et al [5] presented survey of various Visual
Cryptographic Schemes and established the conceptual
knowledge about Visual Cryptography.
Yogesh Bani, Dr. B.Majhi, Ram S. Mangrulkar [13] proposed a
novel approach for Visual Cryptography using Data Hiding by
Conjugate Error Diffusion watermarking technique. Two shares
have been generated and then embed into the cover image x with
the help of watermarking. Secret and cover images have been
revealed after overlapping shares. Cover image consume extra
storage space. Intruder can attack on the shares to reveal the
secret, which causes disturbance in the pixels of original image
and the receiver will not get the actual secret. At the receiver end
1108978-1-4673-4529-3/12/$31.00 c 2012 IEEE
the cover image and secret both will be revealed, so the quality
will be very poor of retrieved secret image.
Debashish Jena, Sanjay Kumar Jena [4] implemented Data
Hiding using Conjugate Ordered Dithering (DHCOD) algorithm
for generating the shares. A dithered halftone image generated
by the cover image was the first share. For second share, some
noise was added to the secret image and converted it to the
binary image after that using share 1 and binary image they
generated the second share. The secret image has been revealed
with the simple AND operation of share 1 and share 2. Share
generation process is made complicated by this method.
B. Padhmavati, P. Nirmal Kumar, M. A. Dorai Rangaswamy [2]
generated shares first by Visual Cryptography VC (2, 2) scheme.
Then both shares were embedded into the cover images with the
help of watermarking. For reveal of secret image, the extraction
process was used to extract the shares from the embedded
images. At last both shares were overlapped and revealed the
secret image. Two cover images have been used to hide the
shares which require extra memory space.
M. Nakajima, Y. Yamaguchi [7] suggested Extended Visual
Cryptography for natural images. Three input pictures have been
taken; one is secret and other two for encryption. The encryption
process is based upon determining the arrangements of
transparent sub pixels on two images (used to conceal the
existence of third secret image) according to the pixel
transparencies, t1, t2 and tT. Where, tT is the transparency of
target image. The secret picture is reconstructed by printing the
two output images on transparencies and stacking them together.
The problems with this technique are network overload due to
two extra images and poor quality of revealed image.
Wei-Qi-Yan, Duo Jin, Mohan S Kankanhalli [12] suggested a
solution for superimposition of two shares. Some alignment
marks are used in Walsh transform domain. It is always
beneficial to use the scheme developed by this author, because
in VC decryption stacking of two shares is mandatory and
without exact alignment retrieval is not possible.
Abhishek Parakh and Subhash Kak [1] suggested Recursive
Hiding scheme for 2 out of 3 secret sharing. Secret bit is divided
into 3 pieces p1, p2, p3.
For 0 p1=p2=p3 as 000,111, 222
For 1p1≠p2≠p3 as 021,102,120,210,201etc
Shares of smaller message are used to create shares of larger
message. This scheme helps in decreasing the network load. Per
pixel 9 bits expansion if the image size is multiple of 3, 16 bits
expansion if image is multiple of 4 and so on this is not
acceptable after a limit. Currently the efficiency of this system is
33% which will decrease as the size will not be exactly in
multiple of 3.
Vaibhav Choudhary et al [11] discussed an Improved Pixel
Sieve Method for Visual Cryptography used an additional sieve
to generate shares. In this scheme Secret is hidden properly
using this scheme but efficiency of this scheme cannot be
evaluated as decryption algorithm and the results of retrieval
have not been shown in the paper.
Ujjwal Chakraborty et al [10] proposed two schemes for (2, 2)
and (2, 3) visual cryptographic encryption. The first scheme
considers 4 pixels of input image at a time and generates 4
output pixels in each share. The second scheme considers 2
pixels (1 block) of input image at a time and generates 3 output
pixels in each share. The dimension of revealed image is
increased by 1.5 times in horizontal direction and remains same
in vertical direction.
Shyamalendu Kandar & Arnab Maiti [9] has proposed a
technique of k-n secret sharing on color images. At the time of
dividing an image into n number of shares, they have used random
number generator. Minimum k numbers of shares are sufficient to
reconstruct the image. If k numbers of shares are taken then the
remaining shares are (n−k). In an image if certain position of a
pixel is 1, then in (n−k) +1 number of shares in that position of
that pixel there will be 1. In the remaining shares in that position
of the pixel there will be 0. A random number generator is used
to identify those (n−k) +1 number of shares. Secret is not
properly hidden and it is easy to guess the contents in all three
shares. If intruder is able to get the information about
randomness, secret image can be retrieved.
Chandramathi S, Ramesh Kumar R, Suresh R & Harish S [3] in
2010 concluded from the overview of all existing VC schemes
that researchers should focus on good quality of reconstructed
image & to increase security with minimum pixel expansion.
P. S. Revenkar, Anisa Anjum and W. Z Gandhare [8] evaluated
the performance of various Visual Cryptographic Schemes,
which help in choice of best scheme according to the available
bandwidth or color of secret image or level of security required.
Following parameters have been used to evaluate the
performance:
No. of Secret images
Pixel Expansion
Image Format
Type of shares generated
As we have observed that conventional cryptography is not used
to protect the shares. In some cases cover images are used to
2013 3rd
IEEE International Advance Computing Conference (IACC) 1109
carry the secret share which is an extra overload on network.
This limitation forced us to use Public Key cryptography which
provides shares with change in actual information.
III. METHODOLOGY OF THE PROPOSED SCHEME
The proposed scheme generates the VC shares using
basic Visual Cryptography model and then encrypt both shares
using RSA algorithm of Public Key Cryptography so that the
secret shares will be more secure and shares are protected from
the malicious adversaries who may alter the bit sequences to
create the fake shares. During the decryption phase, secret shares
are extracted by RSA decryption algorithm & stacked to reveal
the secret image. As shown in Fig. 3.1, complete scheme is
divided into following four phases:
Fig.3.1 Methodology of the Proposed Scheme
A. PHASE-1 Generating shares of secret image: In this
phase Visual Cryptography Encryption is implemented. It
consists of generation of shares from secret image using VC (2,
2) scheme. The secret image is first converted into a binary
image then each pixel in the secret image is broken into 8 sub
pixels, 4 pixels in each share by selecting the random pixel
encoding scheme out of three given in Fig.3.2.
Fig. 3.2. Pixel encoding schemes
The algorithms for conversion of image into binary and share
generation are given below:
Algorithm 3.1 Image Conversion
Algorithm 3.2 Share Generation
B. PHASE-2 Encrypting the generated Shares: This is the
second phase of our approach which will encrypt shares
generated from the first phase. We have used RSA for
encryption in this step. First we have generated the key for RSA
and then performed the encryption. Results of this phase are
encrypted shares.
C. PHASE-3 Decrypting the Shares using RSA: This
process takes place at the destination of the
document/image/text. We again convert the encrypted shares in
their actual form using RSA decryption algorithm, which were
encrypted at the sender end.
Image-conversion
Input: .jpg image/.bmp image
Output: BIN_IMG, R_size, C_size
IMG=read ()
BIN_IMG=Convert_to_binary (IMG)
[R_size C_size]=Cal_size (BIN_IMG)
Share_generation
Input: BIN_IMG, R_size, C_size
Output: SHARE1
SHARE2
For i=1 TO R_size
Do
For j=1 TO C_size
Do
Pix_enc_scheme=Rand_select()
SHARE1=Pix_enc_scheme(BIN_IMG(i,j))
SHARE 2=Pix_enc_scheme(BIN_IMG(I,j))
Done
Done
Decryption
using RSA
Secret Image
Share 1 Share 2
Encryption
using RSA
Encryption
using RSA
Decryption
using RSA
Decoded Secret
Image
Phase1
Phase 2
Phase3
Phase4
1110 2013 3rd
IEEE International Advance Computing Conference (IACC)
D. PHASE-4 Visual Cryptographic decryption: In this
phase Visual Cryptographic decryption is performed. We have
decrypted the original secret image by applying the binary XOR
operation on both decrypted shares.
IV. EXPERIMENTAL RESULTS
Proposed scheme has been implemented in MATLAB
7.5. To run this scheme minimum hardware configuration is
required with no extra specifications. The experiments have
been run in Windows 7 on a Sony VAIO laptop with Intel i5 2.4
GHz processor.
To test the performance of this scheme number of
experiments has been conducted with varying image sizes, types
& keys but every time secret image is retrieved with good visual
quality. The confidentiality of shares is also tested by super
imposing the encrypted shares before reaching to the destination.
Results of some experiments are shown in Fig.4.1, Fig.4.2 &
Fig.4.3.
Fig. 4.1 Experiment-1 Fig. 4.2 Experiment-2
A. Binary Input Image2
B. Image2_share1 C. Image2_share2
D. Image2_Encrypted share2 E. Image2_Encrypted share2
F. Revealed Image from Encrypted shares
G. Image2_Decrypted share1
I. Revealed Image2 from Decrypted shares
H. Image2_Decrypted share2
A. Binary Input Image1
B. Image1_share1 C. Image1_share2
D. Image1_Encrypted share2 E. Image1_Encrypted share2
F. Revealed Image from Encrypted shares
G. Image1_Decrypted share1
I. Revealed Image1from decrypted shares
H. Image1_Decrypted share2
2013 3rd
IEEE International Advance Computing Conference (IACC) 1111
Fig. 4.3 Experiment-3
These experiments have been conducted taking secret
images of different sizes as an input shown by ‘A’ in Fig.4.1,
Fig.4.2 & Fig.4.3, ‘B’ & ‘C’ show share1 & share2 of the secret
image generated by the Visual Cryptographic encryption phase.
‘D’ & ‘E’ show the encrypted share1 & encrypted share2. These
are the results of second phase, in which the Visual
Cryptographic shares have been encrypted using encryption
algorithm. ‘G’ & ‘H’ show the decrypted share1 & decrypted
share2, the results of decryption phase using RSA. ‘I’ shows the
original secret image revealed by overlapping the decrypted
share1 and decrypted share2. The Visual Cryptographic
decryption is used to retrieve this secret image.
Performance of the scheme has been evaluated to test
whether retrieval of input images have been possible by any
opponent having all the shares at the same time by stacking
encrypted shares. In Fig.4.1, Fig.4.2 & Fig.4.3 ‘F shows the
result of stacking encrypted shares which prove that opponent
cannot retrieve secret image without having secret key. Table I
shows that system is enough efficient with the varying size of
input and random selection of key.
Table I. System Performance
V. CONCLUSION & FUTURE SCOPE
We have tested this scheme on different types of input
images with change in size of the image and keys of RSA. But
the entire time secret image is retrieved with good visual quality.
The confidentiality of shares is also tested by super imposing the
encrypted shares before reaching to the destination. In all the
cases it has been observed that if any intruder will be successful
to get the encrypted shares from network, he or she cannot
retrieve the original secret image without availability of private
key.
Input
Image
(size)
In Pixels
Public Key
(e, n)
Private
Key
(d, n)
Retrieval
after
stacking
encrypted
shares
Retrieval
after
stacking
decrypted
shares
(38X90) (25,163202)
(77929,
163201)
Not
Retrieved
Retrieved
(80X96) (53,511493)
(404189,
511493)
Not
Retrieved
Retrieved
(80X96) (13, 92341)
(56229,
92341)
Not
Retrieved
Retrieved
A. Binary Input Image3
B. Image3_share1 C. Image3_share2
D. Image3_Encrypted share2 E. Image3_Encrypted share2
F. Revealed Image from Encrypted shares
G. Image3_Decrypted share1
I. Revealed Image3 from decrypted shares
H. Image3_Decrypted share2
1112 2013 3rd
IEEE International Advance Computing Conference (IACC)
It has been observed that there are many possible
enhancements and extensions exist as the visual quality & size
of revealed image. The major areas of future scope are:
We can use colour image in place of binary image and then
generate the shares using Visual Cryptography.
Compression of encrypted shares to reduce bandwidth
requirement
More sophisticated public key encryption to reduce key size.
Size of image
Variations in format of Input image
REFERENCES
[1] A. Parakh and S.kak “A Recursive Threshold Visual Cryptography
Scheme”. Department of Computer Science, Oklahoma State University
Stillwater, OK 74078.
[2] B. Padhmavati, P. Nirmal Kumar, M. A. Dorai Rangaswamy “A Novel
Scheme for Mutual Authentication and Cheating Prevention in Visual
Cryptography Using Image Processing”. Department of Computer Science
& Engineering, Easwari Engineering College, Chennai, DOI: 02,
ACS.2010.01.264, 2010 ACEEE.
[3] Chandramathi S., Ramesh Kumar R., Suresh R. and Harish S. “An
overview of visual cryptography” International Journal of Computational
Intelligence Techniques, ISSN: 0976–0466 & E-ISSN: 0976–0474Volume
1, Issue 1, 2010, PP-32-37
[4] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 978- 07695-
3516-6/08 © 2008 IEEE DOI 10.1109/ICACC.2009.109.
[5] Néelima. Guntupalli et al, “An Introduction to Different Types of Visual
Cryptography Schemes”, International Journal of Science and Advanced
Technology (ISSN 2221-8386), Volume 1 No 7 September 2011, PP 198-
205.
[6] M. Naor and A. Shamir “Visual Cryptography”. Advances in Cryptology
EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12,
1995.
[7] M.Nakajima and Y.Yamaguchi “Extended Visual Cryptography for
Natural Images”. Department of Graphics and Computer Sciences,
Graduate School of Arts and Sciences, the University of Tokyo 153-8902,
Japan.
[8] P. S. Revenkar, Anisa Anjum, W. Z. Gandhare “Survey of Visual
Cryptographic Schemes”. International Journal of Security and Its
Applications Vol. 4, No. 2, April, 2010.
[9] Shyamalendu Kandar & Arnab Maiti “K-N Secret Sharing Visual
Cryptography Scheme For Color Image Using Random Number”.
International Journal of Engineering Science and Technology (IJEST),
ISSN 0975-5462, Vol. 3 No. 3 Mar 201,PP 1851-1857
[10] Ujjwal Chakraborty et al, “Design and Implementation of a (2, 2) and a (2,
3) Visual Cryptographic Scheme” International Conference [ACCTA-
2010], Vol.1 Issue 2, 3, 4, PP 128-134
[11] Vaibhav Choudhary “An Improved Pixel Sieve Method for Visual
Cryptography” International Journal of Computer Applications, (0975 –
8887) Volume 12– No.9, January 2011.
[12] Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli “Visual Cryptography for
print and scan applications” School of Computing, National University of
Singapore, Singapore 117543
[13] Y. Bani, Dr. B. Majhi and R. S. Mangrulkar, 2008. A Novel Approach for
Visual Cryptography Using a Watermarking Technique. In Proceedings of
2nd
National Conference, IndiaCom 2008.
[14] Behrouz A. Forouzon, “Cryptography & Network Security” 4th
Edition.
[15] http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html Last
accessed on 28.07.12
2013 3rd
IEEE International Advance Computing Conference (IACC) 1113

More Related Content

What's hot

Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyIAEME Publication
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...TELKOMNIKA JOURNAL
 

What's hot (19)

Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
G1803063741
G1803063741G1803063741
G1803063741
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
50120130405004 2
50120130405004 250120130405004 2
50120130405004 2
 

Similar to Kaur2013

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
 
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...IJNSA Journal
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesIJERA Editor
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixelsmuhammed jassim k
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 

Similar to Kaur2013 (20)

F42022628
F42022628F42022628
F42022628
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
Design and Implementation of Hierarchical Visual Cryptography with Expansionl...
 
The Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret ImagesThe Cryptographic Schemes for Secret Images
The Cryptographic Schemes for Secret Images
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
50120140501019
5012014050101950120140501019
50120140501019
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Kaur2013

  • 1. Securing Visual Cryptographic Shares using Public Key Encryption Kulvinder Kaur Department of Computer Science & Engineering ABES Engineering College Ghaziabad, India skulvinder_08@yahoo.co.in Vineeta Khemchandani Department of Computer Applications JSS Academy of Technical Education NOIDA, India V_khemchandani@yahoo.com Abstract-The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. By taking the advantage of this property, third person can easily retrieve the secret image if shares are passing in sequence over the network. The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption. RSA algorithm is used for providing the double security of secret document. Thus secret share are not available in their actual form for any alteration by the adversaries who try to create fake shares. The scheme provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network. Keywords---Visual Cryptography; Encryption; Information Security; VC shares I. INTRODUCTION In today’s information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. With the rapid advancement of network topology, multimedia information is transmitted over the Internet conveniently. Various confidential data such as military maps and commercial identification are transmitted over the Internet. While using secret images, security issues should be taken into consideration because hackers may utilize weak link over public network to steal information that they want. To deal with security problems of secret images, we should develop some secure appropriate algorithm by which we can secure our data on internet. With this system visual information (pictures) can be secure over the internet with the help of Visual Cryptography. The proposed scheme combines the advantages of both Visual Cryptography as well as Public Key Cryptography. This scheme enhances the security of VC shares by encrypting with Public Key Cryptography [14][15], which provides the strong security to the transfer of secret information in form of images, printed text and hand written material. Visual Cryptography (VC) is a special encryption technique used to encrypt images in such a way that it can be decrypted by the human visual system if the correct key images are used. The technique was proposed by Moni Naor and Adi Shamir[6] in 1994. According to them Visual Cryptography is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are binary images usually presented in transparencies. Unlike conventional cryptographic methods, VC needs no complicated computation for recovering the secret image. The act of decryption is to simply stack shares and view the secret image that appears on the stacked shares. Visual Cryptographic technique is being used for secretly transfer of images in army, hand written documents, financial documents, text images, internet- voting etc. VC shares exist in their actual form during the transmission over network. However, directly third person cannot guess the secret information with any single share, but there is a possibility of retrieval if hackers are able to collect all the shares passing in sequence over the network. Thus to get rid of this problem, we need to enhance the security of shares. For the same purpose we have used Public Key Cryptography in addition to Visual Cryptography so that even if hackers are able to get all the shares but they cannot retrieve the original secret without the access of private key. II. RELATED WORK Various researches have been carried out in this area to increase the security & visual quality of the secret image. Some of them are as follows: Néelima Guntupalli et al [5] presented survey of various Visual Cryptographic Schemes and established the conceptual knowledge about Visual Cryptography. Yogesh Bani, Dr. B.Majhi, Ram S. Mangrulkar [13] proposed a novel approach for Visual Cryptography using Data Hiding by Conjugate Error Diffusion watermarking technique. Two shares have been generated and then embed into the cover image x with the help of watermarking. Secret and cover images have been revealed after overlapping shares. Cover image consume extra storage space. Intruder can attack on the shares to reveal the secret, which causes disturbance in the pixels of original image and the receiver will not get the actual secret. At the receiver end 1108978-1-4673-4529-3/12/$31.00 c 2012 IEEE
  • 2. the cover image and secret both will be revealed, so the quality will be very poor of retrieved secret image. Debashish Jena, Sanjay Kumar Jena [4] implemented Data Hiding using Conjugate Ordered Dithering (DHCOD) algorithm for generating the shares. A dithered halftone image generated by the cover image was the first share. For second share, some noise was added to the secret image and converted it to the binary image after that using share 1 and binary image they generated the second share. The secret image has been revealed with the simple AND operation of share 1 and share 2. Share generation process is made complicated by this method. B. Padhmavati, P. Nirmal Kumar, M. A. Dorai Rangaswamy [2] generated shares first by Visual Cryptography VC (2, 2) scheme. Then both shares were embedded into the cover images with the help of watermarking. For reveal of secret image, the extraction process was used to extract the shares from the embedded images. At last both shares were overlapped and revealed the secret image. Two cover images have been used to hide the shares which require extra memory space. M. Nakajima, Y. Yamaguchi [7] suggested Extended Visual Cryptography for natural images. Three input pictures have been taken; one is secret and other two for encryption. The encryption process is based upon determining the arrangements of transparent sub pixels on two images (used to conceal the existence of third secret image) according to the pixel transparencies, t1, t2 and tT. Where, tT is the transparency of target image. The secret picture is reconstructed by printing the two output images on transparencies and stacking them together. The problems with this technique are network overload due to two extra images and poor quality of revealed image. Wei-Qi-Yan, Duo Jin, Mohan S Kankanhalli [12] suggested a solution for superimposition of two shares. Some alignment marks are used in Walsh transform domain. It is always beneficial to use the scheme developed by this author, because in VC decryption stacking of two shares is mandatory and without exact alignment retrieval is not possible. Abhishek Parakh and Subhash Kak [1] suggested Recursive Hiding scheme for 2 out of 3 secret sharing. Secret bit is divided into 3 pieces p1, p2, p3. For 0 p1=p2=p3 as 000,111, 222 For 1p1≠p2≠p3 as 021,102,120,210,201etc Shares of smaller message are used to create shares of larger message. This scheme helps in decreasing the network load. Per pixel 9 bits expansion if the image size is multiple of 3, 16 bits expansion if image is multiple of 4 and so on this is not acceptable after a limit. Currently the efficiency of this system is 33% which will decrease as the size will not be exactly in multiple of 3. Vaibhav Choudhary et al [11] discussed an Improved Pixel Sieve Method for Visual Cryptography used an additional sieve to generate shares. In this scheme Secret is hidden properly using this scheme but efficiency of this scheme cannot be evaluated as decryption algorithm and the results of retrieval have not been shown in the paper. Ujjwal Chakraborty et al [10] proposed two schemes for (2, 2) and (2, 3) visual cryptographic encryption. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. The second scheme considers 2 pixels (1 block) of input image at a time and generates 3 output pixels in each share. The dimension of revealed image is increased by 1.5 times in horizontal direction and remains same in vertical direction. Shyamalendu Kandar & Arnab Maiti [9] has proposed a technique of k-n secret sharing on color images. At the time of dividing an image into n number of shares, they have used random number generator. Minimum k numbers of shares are sufficient to reconstruct the image. If k numbers of shares are taken then the remaining shares are (n−k). In an image if certain position of a pixel is 1, then in (n−k) +1 number of shares in that position of that pixel there will be 1. In the remaining shares in that position of the pixel there will be 0. A random number generator is used to identify those (n−k) +1 number of shares. Secret is not properly hidden and it is easy to guess the contents in all three shares. If intruder is able to get the information about randomness, secret image can be retrieved. Chandramathi S, Ramesh Kumar R, Suresh R & Harish S [3] in 2010 concluded from the overview of all existing VC schemes that researchers should focus on good quality of reconstructed image & to increase security with minimum pixel expansion. P. S. Revenkar, Anisa Anjum and W. Z Gandhare [8] evaluated the performance of various Visual Cryptographic Schemes, which help in choice of best scheme according to the available bandwidth or color of secret image or level of security required. Following parameters have been used to evaluate the performance: No. of Secret images Pixel Expansion Image Format Type of shares generated As we have observed that conventional cryptography is not used to protect the shares. In some cases cover images are used to 2013 3rd IEEE International Advance Computing Conference (IACC) 1109
  • 3. carry the secret share which is an extra overload on network. This limitation forced us to use Public Key cryptography which provides shares with change in actual information. III. METHODOLOGY OF THE PROPOSED SCHEME The proposed scheme generates the VC shares using basic Visual Cryptography model and then encrypt both shares using RSA algorithm of Public Key Cryptography so that the secret shares will be more secure and shares are protected from the malicious adversaries who may alter the bit sequences to create the fake shares. During the decryption phase, secret shares are extracted by RSA decryption algorithm & stacked to reveal the secret image. As shown in Fig. 3.1, complete scheme is divided into following four phases: Fig.3.1 Methodology of the Proposed Scheme A. PHASE-1 Generating shares of secret image: In this phase Visual Cryptography Encryption is implemented. It consists of generation of shares from secret image using VC (2, 2) scheme. The secret image is first converted into a binary image then each pixel in the secret image is broken into 8 sub pixels, 4 pixels in each share by selecting the random pixel encoding scheme out of three given in Fig.3.2. Fig. 3.2. Pixel encoding schemes The algorithms for conversion of image into binary and share generation are given below: Algorithm 3.1 Image Conversion Algorithm 3.2 Share Generation B. PHASE-2 Encrypting the generated Shares: This is the second phase of our approach which will encrypt shares generated from the first phase. We have used RSA for encryption in this step. First we have generated the key for RSA and then performed the encryption. Results of this phase are encrypted shares. C. PHASE-3 Decrypting the Shares using RSA: This process takes place at the destination of the document/image/text. We again convert the encrypted shares in their actual form using RSA decryption algorithm, which were encrypted at the sender end. Image-conversion Input: .jpg image/.bmp image Output: BIN_IMG, R_size, C_size IMG=read () BIN_IMG=Convert_to_binary (IMG) [R_size C_size]=Cal_size (BIN_IMG) Share_generation Input: BIN_IMG, R_size, C_size Output: SHARE1 SHARE2 For i=1 TO R_size Do For j=1 TO C_size Do Pix_enc_scheme=Rand_select() SHARE1=Pix_enc_scheme(BIN_IMG(i,j)) SHARE 2=Pix_enc_scheme(BIN_IMG(I,j)) Done Done Decryption using RSA Secret Image Share 1 Share 2 Encryption using RSA Encryption using RSA Decryption using RSA Decoded Secret Image Phase1 Phase 2 Phase3 Phase4 1110 2013 3rd IEEE International Advance Computing Conference (IACC)
  • 4. D. PHASE-4 Visual Cryptographic decryption: In this phase Visual Cryptographic decryption is performed. We have decrypted the original secret image by applying the binary XOR operation on both decrypted shares. IV. EXPERIMENTAL RESULTS Proposed scheme has been implemented in MATLAB 7.5. To run this scheme minimum hardware configuration is required with no extra specifications. The experiments have been run in Windows 7 on a Sony VAIO laptop with Intel i5 2.4 GHz processor. To test the performance of this scheme number of experiments has been conducted with varying image sizes, types & keys but every time secret image is retrieved with good visual quality. The confidentiality of shares is also tested by super imposing the encrypted shares before reaching to the destination. Results of some experiments are shown in Fig.4.1, Fig.4.2 & Fig.4.3. Fig. 4.1 Experiment-1 Fig. 4.2 Experiment-2 A. Binary Input Image2 B. Image2_share1 C. Image2_share2 D. Image2_Encrypted share2 E. Image2_Encrypted share2 F. Revealed Image from Encrypted shares G. Image2_Decrypted share1 I. Revealed Image2 from Decrypted shares H. Image2_Decrypted share2 A. Binary Input Image1 B. Image1_share1 C. Image1_share2 D. Image1_Encrypted share2 E. Image1_Encrypted share2 F. Revealed Image from Encrypted shares G. Image1_Decrypted share1 I. Revealed Image1from decrypted shares H. Image1_Decrypted share2 2013 3rd IEEE International Advance Computing Conference (IACC) 1111
  • 5. Fig. 4.3 Experiment-3 These experiments have been conducted taking secret images of different sizes as an input shown by ‘A’ in Fig.4.1, Fig.4.2 & Fig.4.3, ‘B’ & ‘C’ show share1 & share2 of the secret image generated by the Visual Cryptographic encryption phase. ‘D’ & ‘E’ show the encrypted share1 & encrypted share2. These are the results of second phase, in which the Visual Cryptographic shares have been encrypted using encryption algorithm. ‘G’ & ‘H’ show the decrypted share1 & decrypted share2, the results of decryption phase using RSA. ‘I’ shows the original secret image revealed by overlapping the decrypted share1 and decrypted share2. The Visual Cryptographic decryption is used to retrieve this secret image. Performance of the scheme has been evaluated to test whether retrieval of input images have been possible by any opponent having all the shares at the same time by stacking encrypted shares. In Fig.4.1, Fig.4.2 & Fig.4.3 ‘F shows the result of stacking encrypted shares which prove that opponent cannot retrieve secret image without having secret key. Table I shows that system is enough efficient with the varying size of input and random selection of key. Table I. System Performance V. CONCLUSION & FUTURE SCOPE We have tested this scheme on different types of input images with change in size of the image and keys of RSA. But the entire time secret image is retrieved with good visual quality. The confidentiality of shares is also tested by super imposing the encrypted shares before reaching to the destination. In all the cases it has been observed that if any intruder will be successful to get the encrypted shares from network, he or she cannot retrieve the original secret image without availability of private key. Input Image (size) In Pixels Public Key (e, n) Private Key (d, n) Retrieval after stacking encrypted shares Retrieval after stacking decrypted shares (38X90) (25,163202) (77929, 163201) Not Retrieved Retrieved (80X96) (53,511493) (404189, 511493) Not Retrieved Retrieved (80X96) (13, 92341) (56229, 92341) Not Retrieved Retrieved A. Binary Input Image3 B. Image3_share1 C. Image3_share2 D. Image3_Encrypted share2 E. Image3_Encrypted share2 F. Revealed Image from Encrypted shares G. Image3_Decrypted share1 I. Revealed Image3 from decrypted shares H. Image3_Decrypted share2 1112 2013 3rd IEEE International Advance Computing Conference (IACC)
  • 6. It has been observed that there are many possible enhancements and extensions exist as the visual quality & size of revealed image. The major areas of future scope are: We can use colour image in place of binary image and then generate the shares using Visual Cryptography. Compression of encrypted shares to reduce bandwidth requirement More sophisticated public key encryption to reduce key size. Size of image Variations in format of Input image REFERENCES [1] A. Parakh and S.kak “A Recursive Threshold Visual Cryptography Scheme”. Department of Computer Science, Oklahoma State University Stillwater, OK 74078. [2] B. Padhmavati, P. Nirmal Kumar, M. A. Dorai Rangaswamy “A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography Using Image Processing”. Department of Computer Science & Engineering, Easwari Engineering College, Chennai, DOI: 02, ACS.2010.01.264, 2010 ACEEE. [3] Chandramathi S., Ramesh Kumar R., Suresh R. and Harish S. “An overview of visual cryptography” International Journal of Computational Intelligence Techniques, ISSN: 0976–0466 & E-ISSN: 0976–0474Volume 1, Issue 1, 2010, PP-32-37 [4] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 978- 07695- 3516-6/08 © 2008 IEEE DOI 10.1109/ICACC.2009.109. [5] Néelima. Guntupalli et al, “An Introduction to Different Types of Visual Cryptography Schemes”, International Journal of Science and Advanced Technology (ISSN 2221-8386), Volume 1 No 7 September 2011, PP 198- 205. [6] M. Naor and A. Shamir “Visual Cryptography”. Advances in Cryptology EUROCRYPT ’94. Lecture Notes in Computer Science, (950):1–12, 1995. [7] M.Nakajima and Y.Yamaguchi “Extended Visual Cryptography for Natural Images”. Department of Graphics and Computer Sciences, Graduate School of Arts and Sciences, the University of Tokyo 153-8902, Japan. [8] P. S. Revenkar, Anisa Anjum, W. Z. Gandhare “Survey of Visual Cryptographic Schemes”. International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010. [9] Shyamalendu Kandar & Arnab Maiti “K-N Secret Sharing Visual Cryptography Scheme For Color Image Using Random Number”. International Journal of Engineering Science and Technology (IJEST), ISSN 0975-5462, Vol. 3 No. 3 Mar 201,PP 1851-1857 [10] Ujjwal Chakraborty et al, “Design and Implementation of a (2, 2) and a (2, 3) Visual Cryptographic Scheme” International Conference [ACCTA- 2010], Vol.1 Issue 2, 3, 4, PP 128-134 [11] Vaibhav Choudhary “An Improved Pixel Sieve Method for Visual Cryptography” International Journal of Computer Applications, (0975 – 8887) Volume 12– No.9, January 2011. [12] Wei-Qi Yan, Duo Jin, Mohan S Kankanhalli “Visual Cryptography for print and scan applications” School of Computing, National University of Singapore, Singapore 117543 [13] Y. Bani, Dr. B. Majhi and R. S. Mangrulkar, 2008. A Novel Approach for Visual Cryptography Using a Watermarking Technique. In Proceedings of 2nd National Conference, IndiaCom 2008. [14] Behrouz A. Forouzon, “Cryptography & Network Security” 4th Edition. [15] http://gdp.globus.org/gt4-tutorial/multiplehtml/ch09s03.html Last accessed on 28.07.12 2013 3rd IEEE International Advance Computing Conference (IACC) 1113