IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

Similar documents
A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

The Comparative Study on Visual Cryptography and Random Grid Cryptography

Visual Secret Sharing Scheme using Grayscale Images

Recursive Information Hiding in Visual Cryptography

Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme

Threshold Visual Cryptography Scheme for Color Images with No Pixel Expansion

Visual Secret Sharing Scheme with Autostereogram*

Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications

Visual Cryptography Scheme for Colored Image using XOR with Random Key Generation

(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion

Visual Cryptography of Animated GIF Image Based on XOR Operation

Visual Cryptography for Authentication Using CAPTCHA

Implementation of IRIS recognition for Securing Online Payment

Secret Image Sharing Scheme Based on a Boolean Operation

Visual Cryptography for Black and White Images

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Mody University of Science and Technology Laxmangarh, Sikar, India, Pin

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

THE SECRET image sharing scheme (SISS) is an important

A Study of Prevention of Phishing Threats using Visual Cryptography

Information and Knowledge Management ISSN (Paper) ISSN X (Online) Vol 2, No.2, 2012

Chapter 2 Various Problems in Visual Cryptography

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

SECURITY PROTECTION OF SOFTWARE PROGRAMS BY INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES*

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

A Novel Authenticity of an Image Using Visual Cryptography

Human-Machine Identification Using Visual Cryptography

Recursive Visual Secret Sharing Scheme using Fingerprint. Authentication

A novel privacy preserving visual cryptography based scheme for telemedicine applications.

Visual cryptography on graphs

Data Hiding on Text Using Big-5 Code

A Combined Encryption Compression Scheme Using Chaotic Maps

Science & Technology (DCRUST), Sonepat

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

A reversible data hiding based on adaptive prediction technique and histogram shifting

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Cheating Prevention Schemes for Visual Cryptography

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Advanced Steganographic Technique Based on Extended Visual Cryptography Scheme

Reversible Data Hiding VIA Optimal Code for Image

Some Algebraic (n, n)-secret Image Sharing Schemes

EMBEDDING WATERMARK IN VIDEO RECORDS

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

Enhanced Phishing Detection based on Image Differentiation

Digital Image Steganography Using Bit Flipping

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

Copyright Detection System for Videos Using TIRI-DCT Algorithm

A SEMI-FRAGILE BLIND WATERMARKING SCHEME FOR COLOR IMAGES BASED ON VISUAL CRYPTOGRAPHY AND DISCRETE COSINE TRANSFORM

A new approach to the secret image sharing with steganography and authentication

Robust DWT Based Technique for Digital Watermarking

TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

A Reversible Data Hiding Scheme for BTC- Compressed Images

Reversible Data Hiding Based on Median Difference Histogram

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Identity verification system: a visual cryptography-based approach to prevent fraudulent in admission process

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

Homework 2 CS161 Computer Security, Spring 2008 Assigned 2/13/08 Due 2/25/08

Code Transformation of DF-Expression between Bintree and Quadtree

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

Hybrid filters for medical image reconstruction

Enhanced LSB Based Audio Steganography

Enhanced Detection of Double Adjacent Errors in Hamming Codes through Selective Bit Placement

Face Detection CUDA Accelerating

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

A New Algorithm for Shape Detection

Using Quasigroups for Generating Pseudorandom Numbers

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

CHAPTER 6 IDENTIFICATION OF CLUSTERS USING VISUAL VALIDATION VAT ALGORITHM

Steganography using MATLAB

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

FRAGMENTATION OF HANDWRITTEN TOUCHING CHARACTERS IN DEVANAGARI SCRIPT

LSB Based Audio Steganography Using Pattern Matching

Robust Lossless Data Hiding. Outline

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

REVIEW ON IMAGE COMPRESSION TECHNIQUES AND ADVANTAGES OF IMAGE COMPRESSION

A New hybrid method in watermarking using DCT and AES

Content Based Image Retrieval Using Color Quantizes, EDBTC and LBP Features

A Flexible Scheme of Self Recovery for Digital Image Protection

Efficient & Secure Data Hiding Using Secret Reference Matrix

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

A Proposed Method for Cryptography using Random Key and Rotation of Text

Transcription:

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION Priyanka Agrawal * and Vijay Kumar Sharma *Corresponding Author: Priyanka Agrawal Priyanka_jnit@yahoo.com Region incrementing visual cryptography is used to hide multiple secrecy levels in a single image. In n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode (n+) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by superimposing any three shares, information upto second level could be seen. In similar way, for revealing whole information all the (n+) shares are superimposed. These n levels are created according to user specification. In proposed scheme, user does not need to address the area of different levels manually and levels are created automatically. User needs only to use a particular level information with a particular size of text. The traditional region incrementing visual cryptography scheme has been modified to address the problem of pixel expansion and poor contrast. In proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography. Keywords: Visual cryptography INTRODUCTION Visual cryptography is an encryption technique which is used to hide information which is present in an image. Visual cryptography scheme was developed by Naor and Shamir in 994. In this scheme two transparent images called shares are developed. One of the share is made of random pixels in which black and white pixels are of equal number. Second share is made according to first share. When these two shares are superimposed, information is revealed, Some smaller blocks are used in place of single pixel of original image which is needed to be encrypted. If two blocks are used for representing one pixel of original image, one of the block will be white and second one will be black. In the similar way, if four blocks are used in place of one pixel, two of those pixels will be white and remaining will be black. Now two layers are created. One layer will have all the pixels in random state, one of the six possible states. Share 2 is same as share, Department of Computer Science, Rajasthan Institute of Engineering & Technology, Jaipur. 53

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 except for the information pixels. These pixels are in opposite state in share. When both shares are superimposed, the pixels identical will be seen as gray and remaining will be completely black. Figure 3: A 2-out-of-2 VCS with inverted colors: (a) Secret Image S, ( b) First Share S, (c) Second Share S2, and (d) Reconstructed Image by Superimposing S and S2 Figure : Black Pixel And White Pixel in Visual Cryptography With Two Sub Pixel Layout In the above method we have used four pixels in place of single pixel of secret image. Therefore we got pixel expansion four, i.e., reconstructed image will be four times larger than secret image as shown in Figure 2. Figure 2: A 2-out-of-2 VCS with 4-subpixel layout: (a) Secret Image S, (b) First Share S, (c) Second Share S2, and (d) Reconstructed Image by Superimposing S and S2 LITERATURE REVIEW Visual Cryptography (VC), invented by Noar and Shamir (995), is a method for protecting imagebased secrets that has a computation-free decoding process. Two transparent images called shares are developed. One of the share is made of random pixels in which black and white pixels are of equal number. Second share is made according to first share. When these two shares are superimposed, information is revealed. 54

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 For visual cryptography a smaller pixel expansion and high contrast is desirable because smaller pixel expansion is beneficial for storage and printing out purpose. High contrast is required for easily recognizing the secret image by the unaided eye. On the contrast in visual cryptography schemes by Blundo et al. (999) describes the minimum pixel expansion and maximum contrast. For increasing the contrast of image additional white pixels are added in Contrast-enhanced visual cryptography schemes based on additional pixel patterns by Monoth and Babu (2). For removing pixel expansion, shared of secret image were generated from matrices. Visual cryptography was also used in the form of rotating angles in which we continue rotate the angles of superimposed shares and different reconstructed images are revealed. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing by Hsu et al. (24). Visual cryptography was used for various applications, e.g., scan application. The method to use visual cryptography as scan application has been given by Yan et al. (24). Visual cryptography was also used for biometric representation e.g. finger print application. Visual cryptography was also joined with watermarking by Fu and Au (24) first time. One more application of visual cryptography is that it can be used in medical images and forgery detection as by Manimurugan and Porkumaran (2). METHODOLOGY Region Incrementing Visual Cryptography generates the shares in such a way when we superimpose any two shares, information belonging to first level should be revealed. As we increase the number of shares, corresponding level information is revealed. Depending on the number of levels RIVC may be of 2-level, 3 level or more. Matrix LK j, where j is the level number and represents white pixel. In the similar manner LK j represents the basis matrix for encoding a black pixel of the j th level. Matrices C j and C j for encoding white and black pixels, These matrices are obtained by the permutation of columns of LK j and LK j. Traditional RIVC For each pixel of secret image a matrix is obtained by the permutation of columns of LK j and LK j. C k is used to encode a white pixel and C k is used to encode a black pixel. Now first row of this matrix, according to secret image s pixel is given to first share, second row is given to second share and so on. As there are four columns in any row, four pixel will occupy the place of share corresponding to one pixel of secret image. This will result in pixel expansion four. Wang (29) provided the basis matrices for the construction of 2-level RIVC scheme. LK LK Similarly basis matrices for constructing the 3-level RIVC scheme are given below- LK LK 55

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Basis matrices for proposed 2-level scheme are shown below: LK In this scheme, there are some drawbacks. First drawback is that the address of different levels are given by the user manually everytime. Another drawback is that revealed image bears from pixel expansion m, i.e., the revealed image is m times greater than original image. Also contrast of third level is very low. We propose the (2, n)-rivcs in which user does not need to address the area of different levels manually. Levels are created automatically. User needs only to use a particular level information with a particular size of text. A generalized form of traditional region incrementing visual cryptography with extra features added as no pixel expansion and improved contrast is proposed in this scheme. Proposed Scheme for RIVC with Enhanced Contrast and No Pixel Expansion In proposed two level and three level RIVC we have selected a column randomly from proposed basis matrices for distributing the values to shares for any particular pixel of image to be decoded. By this concept we use only one pixel in one share corresponding to one pixel of image to be encoded. This method does not increase the pixel expansion, i.e., proposed method generates the reconstructed image of same size as that of original image. LK The detailed procedure for proposed 2-level RIVC scheme is presented in ALGORITHM. ALGORITHM : Proposed 2-level scheme ) Select a binary image which needs to be sent secretly. 2) Divide the secret image in two levels according to their significance. 3) Assign level to less significant secret and level 2 to more significant part. 4) For first level white pixel, select one column randomly from LK. 5) Repeat step 4 through 5 for each pixel of the secret image by selecting appropriate basis matrices. 6) Record the three encoded shares obtained at the end of step 5. The procedure from Step through 7 will generate three encoded shares. These shares will be sent over the communication medium, At receiver side any 2 out of 3 shares are superimposed to reveal first level information and 56

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 all 3 shares are superimposed to reveal complete secret image. Basis matrices for 3-level RIVC scheme are given below: LK LK The detailed procedure for proposed 3-level RIVC scheme is presented in ALGORITHM 2. ALGORITHM 2: Proposed 3-level scheme ) Select a binary image which needs to be sent secretly. 2) Divide the secret image in three levels according to their significance. 3) Assign level to least significant secret and level 3 to most significant part. 4) For first level white pixel, select one column randomly from LK. 5) Repeat step 4 through 5 for each pixel of the secret image by selecting appropriate basis matrices. 6) Record the three encoded shares obtained at the end of step 5. Proposed Automatic RIVC with No Pixel Expansion In proposed Automatic RIVC user does not need to address the area of different levels manually. Levels are created automatically. User needs only to use a particular level information with a particular size of text. In proposed algorithm we have considered least significant information (level ) with largest text size and most significant information (level n) with smallest text size. A generalized form of traditional region incrementing visual cryptography with extra features added as no pixel expansion and improved contrast is proposed in this scheme. The generalization of the proposed RIVC scheme for generating the levels automatically is described in Algorithm 3. ALGORITHM 3: A generalized RIVC scheme ) Scan the image by starting from (, ) pixel position and move with the columns. 2) After scanning all the columns of first row, it scans the second row and so on until the first black pixel is encountered 3) After reaching on first black pixel it stores the row number (say m) and moves to the next row. 4) Repeat procedure until scanning reaches a row (say n) in which all the pixels are white. 5) A text is written between these two rows m- and n which can be in any level and the text size is m-n. This helps in getting the addresses of two rows between which a text is embedded and we get the size of text. 57

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 6) The scanning is done in the same manner and the text size and first row and last row number of each level is stored. To automate the process of level identification in Visual Cryptography, the basis matrices are modified as shown below: LK LK Similarly for 3-level automatic scheme, basis matrices are shown below: LK LK Automatic Region Incrementing Visual Cryptography, selects the basis matrices according to number of levels in the image automatically. User does not need to give the number of level details manually. CONCLUSION Region Incrementing Visual Cryptography (RIVC) introduced different levels of information in a single secret image first time but it has the problem of pixel expansion in which the number of pixels were getting increased and also the contrast of reconstructed image was very poor. Furthermore it was not able to identify the levels of information itself. User needed to give the address of levels manually. Due to these reasons RIVC was not efficient. In this work, the efforts are made to overcome the above shortcomings of the traditional region incrementing visual cryptography. In the proposed modified RIVC, the numbers of pixels in the reconstructed image are same as those in original image. The algorithms have also been modified in such a way that the resultant reconstructed images do have the better contrast information. REFERENCES. Blundo, De Santis A and Stinson D R (999), On the contrast in visual cryptography schemes, Journal of Cryptology, Vol. 2, No. 4, pp. 26-289, 999. 2. Hsu H S, Chen T S and Lin Y H (24), The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing, In 58

Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Networking, Sensing and Control, 24 IEEE International Conference on, Vol. 2, pp. 996-, IEEE. 3. Fu M S and Au O C (24), Joint visual cryptography and watermarking, In Multimedia and Expo, ICME 4. IEEE International Conference on, Vol. 2, pp. 975-978., IEEE. 4. Manimurugan S and Porkumaran K (2), A new fast and efficient visual cryptography scheme for medical images with forgery detection, In Emerging Trends in Electrical and Computer Technology (ICETECT), 2 International Conference on, pp. 594-599, IEEE. 5. Monoth T and Babu A P (2), Contrastenhanced visual cryptography schemes based on additional pixel patterns, In Cyberworlds (CW), 2 International Conference on, pp. 7-78, IEEE. 6. Naor M and Shamir A (995), Visual cryptography, p.. 7. Wang R Z (29), Region incrementing visual cryptography, Signal Processing Letters, IEEE, Vol. 6, No. 8, pp. 659-662. 8. Yan W Q, Jin D, and Kankanhalli M S (24), Visual cryptography for print and scan applications, In Circuits and Systems, 24. ISCAS 4. Proceedings of the 24 International Symposium on, Vol. 5, pp. V- 572. IEEE. 59