SlideShare a Scribd company logo
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
INTERNATIONAL JOURNAL OF ELECTRONICS AND 
17 – 19, July 2014, Mysore, Karnataka, India 
COMMUNICATION ENGINEERING  TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 8, August (2014), pp. 194-199 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
www.jifactor.com 
194 
 
IJECET 
© I A E M E 
A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR 
MAINTAINING THE SECURITY OF VISUAL INFORMATION 
TRANSACTION 
Akshatha M M#1 Lokesh B#2 Nuthan A C#3 
#1Student, Dept. of ECE, SIT Mangalore 
#2Dept. of EEE, SIT Mangalore 
#3Research Scholar, Jain University 
ABSTRACT 
As the growth in the technology increases maintaining the security of visual information 
during its transaction has to be increased. Rapid growth in the techniques for doing so is also 
increasing. Internet has become most commonly used media for communication and hence text, 
voice, video, Images and many more are transmitted through Internet. These might include Military 
Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by 
safer means with enhanced security. In the process of Visual Cryptography a secret image is 
encrypted into shares which refuse to divulge information about the original secret image. In this 
paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to 
reduce the degradation of the resultant image is proposed by an extension from gray to color image. 
Pixel Index Method is discussed to improve the security for images. 
Keywords: Security, Visual Information, Visual Cryptography. 
I. INTRODUCTION 
Cryptography refers to the study of mathematical techniques and related aspects of 
information security like data confidentiality, data integrity and of data authentication. In the process 
of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information 
about the original secret image. Decryption is through a separate decryption algorithm. A basic 
model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the 
resultant image is twice the size of secret image. 
As the advent of electronic applications increases, providing the security for information in 
an open network environment is required. Encryption is a method of transforming original data,
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
called plain text or clear text into a form that appears to be random and unreadable which is called 
Cipher text. Plain text is either in the form that can be understood by a person (document) or by a 
computer (executable code). 
195 
 
Once it is transformed into Cipher text, neither human nor machine can properly process it 
until it is decrypted. This enables the transmission of confidential information over insecure channels 
without unauthorized disclosure. When data is stored on a computer it is protected by logical and 
physical access controls. When this same sensitive information is sent over a network, the 
information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual 
Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They 
proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares 
[3], revealing the secret image through Share Stacking. 
Fig. 1: Example of Visual Cryptography 
In figure 1 a secret image that has to be sent is divided into shares. When these two shares are 
stacked together and put into a Human Visual System the resultant image is revealed. In the visual 
secret sharing model [1], a secret picture must be shared among n participants. The picture is divided 
into n shares so that if m transparencies (shares) are placed together the picture is visible. When there 
are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of 
black and white pixels with each pixel being handled separately. 
II. RELATED WORK 
2.1 Basic (2, 2) Scheme 
The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an 
image from a share is impossible. Each share is printed in transparency. A share is a random noise. 
Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. 
The figure shows how a pixel in a image in divided into two sub pixels depending on whether the 
pixel is black or white. By doing so the width of the share increases. This is termed as Pixel 
Expansion.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
196 
 
Fig. 2: A (2,2) Visual Cryptography Scheme 
2.2 Pseudo Randomized Visual Cryptography Scheme 
Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random 
technique [10]. Each pixel is being handled separately. The input is a secret image and the output is 
the shares. Here there is no pixel expansion. The decoded image and the original secret image are of 
the same sizes. But the secret image which is decoded had a darker resolution than the original 
image. Preprocessing technique was used to overcome this problem [6]. 
Fig. 3: Pseudo Random Scheme 
III. PROPOSED WORK 
In this paper, the problem of pixel expansion is eliminated and also a method is proposed for 
color image usage and thus the degradation of the resultant image is reduced. Chaotic random 
number generation technique is used to provide much more security. Pixel index reversal is applied 
where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase 
the scrambling and thus there will be increase in the security. The secret image can be revealed by a 
decryption algorithm. A secret image is first split into R G B component and then the security 
techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB 
components. Each component is handled separately. Each pixel is decomposed using Bit Plane
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This 
result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered 
and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the 
Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the 
Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 
197 
 
Fig. 4: Block Diagram of the Cryptographic Technique 
3.1 Simulations and Results 
The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the 
gray image. 
Fig. 5: Results for gray image as input
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
198 
 
Fig. 6: Results for Color Image as input 
Fig. 7: Results for Color Image after applying the Security Methods 
Fig. 8: Complete Encrypted Result 
3.2 Comparison of the Algorithms 
Table. 1: Comparison of Algorithms 
Algorithm Pixel Security Quality 
Naor, 
Double Increase Poor 
Shamir 
(k, n) 
scheme 
Double Increase Poor 
Existing 
Method 
No 
Expansion 
Increase Increase 
Proposed 
Work 
No 
Expansion 
Increase Color 
Image 
In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was 
expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant 
image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the 
concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna 
Babu and team the problem of pixel expansion was eliminated and pixel reversal method was 
suggested [10]. The security also increased because of Chaotic Randomization. In the proposed 
technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The 
security increases due to Scan Pattern method and Chaotic Randomization. This technique is also 
applicable for color images and so the quality increases.
Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 
17 – 19, July 2014, Mysore, Karnataka, India 
199 
IV. CONCLUSION AND FUTURE WORK 
 
The security increases as the scrambling is more. The time consumption is also in terms of 
Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel 
expansion is also eliminated. Future work can include the application of this technique for bit map 
images. Some techniques can be made to improve the quality of resultant image and also to reduce 
the power consumption. 
V. REFERENCES 
1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, 
Massachusetts Institute of Technology, 1979. 
2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 
9–12, LNCS 950, Springer Verlag, 1994, 1–12. 
3. “What are Visual Secret Sharing Schemes”, General concept. 
4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual 
Cryptography for general access structure”, ICALP'96, Italy, 1996. 
5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 
1998, http://www.cl.cam.ac.uk/~fms27/vck/. 
6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, 
IEEE Transaction on image processing, vol.15, no.8, 2006. 
7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast 
visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 
8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 
9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. 
Theory of Cryptography Library, (96-07), 1996. 
10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray 
Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual 
Information Security”, IEEE, 2013. 
BIOGRAPHY 
Akshatha M M 
Completed her BE under Visvesvaraiah Technological University, Belgaum in 
Electronics and Communication Engineering. She completed her M. Tech degree, 
under the same university in VLSI and Embedded Systems. At present she is 
working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. 
Lokesh B 
Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, 
Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. 
Nuthan A C 
Completed his BE in Electronics and Communication Engineering and M. Tech in Digital 
Electronics under Visvesvaraiah Technological University. At present he is working as Assistant 
Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a 
research scholar under Jain University, Bangalore.

More Related Content

PDF
IRJET- Image Privacy Protection as a Single Share
PDF
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
PDF
11.biometric data security using recursive visual cryptography
PDF
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
PDF
50120140501019
PDF
Implementation of image steganography using lab view
PDF
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
PDF
Image Steganography Using HBC and RDH Technique
IRJET- Image Privacy Protection as a Single Share
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
11.biometric data security using recursive visual cryptography
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
50120140501019
Implementation of image steganography using lab view
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Image Steganography Using HBC and RDH Technique

What's hot (20)

PDF
A comparatively study on visual cryptography
PDF
Frequency Domain Approach of Image Steganography
PDF
IRJET- Mosaic Image Creation in Video for Secure Transmission
PDF
PDF
Implementation of Steganographic Model using Inverted LSB Insertion
PDF
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
PDF
IRJET- Homomorphic Image Encryption
PDF
Reversible Encrypytion and Information Concealment
PDF
Image Cryptography using Nearest Prime Pixels
DOCX
Visual Cryptography Industrial Training Report
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PDF
IRJET- GSVD Algorithm for Image Encryption
PDF
An LSB Method Of Image Steganographic Techniques
PDF
Security using image processing
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PDF
Variable length key based visual
PDF
Analysing secure image secret sharing schemes based on steganography
PDF
A novel cryptographic technique that emphasis visual quality and efficieny by...
PDF
Proposed aes for image steganography in different medias
A comparatively study on visual cryptography
Frequency Domain Approach of Image Steganography
IRJET- Mosaic Image Creation in Video for Secure Transmission
Implementation of Steganographic Model using Inverted LSB Insertion
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
IRJET- Homomorphic Image Encryption
Reversible Encrypytion and Information Concealment
Image Cryptography using Nearest Prime Pixels
Visual Cryptography Industrial Training Report
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
IRJET- GSVD Algorithm for Image Encryption
An LSB Method Of Image Steganographic Techniques
Security using image processing
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Variable length key based visual
Analysing secure image secret sharing schemes based on steganography
A novel cryptographic technique that emphasis visual quality and efficieny by...
Proposed aes for image steganography in different medias
Ad

Viewers also liked (7)

PDF
LDPC Encoding and Hamming Encoding
PPTX
PPTX
LDPC - Low Density Parity Check Matrix
PPTX
LDPC Encoding
DOCX
Image encryption using aes key expansion
PDF
LDPC Codes
PPTX
Image encryption using aes key expansion
LDPC Encoding and Hamming Encoding
LDPC - Low Density Parity Check Matrix
LDPC Encoding
Image encryption using aes key expansion
LDPC Codes
Image encryption using aes key expansion
Ad

Similar to A novel technique of visual cryptography for maintaining the security of visual information transaction (20)

PDF
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
F42022628
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Implementation of Steganographic Techniques and its Detection.
PDF
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
PDF
Fz2510901096
PDF
Chaos Based Image Encryption Techniques: A Review
PDF
R04405103106
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
PDF
A comparatively study on visual cryptography
PDF
Retrieving Of Color Images Using SDS Technique
PDF
Hf2513081311
PDF
Hf2513081311
PDF
Data Hiding and Retrieval using Visual Cryptography
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
Image encryption approach for security issues
PDF
Encrypting and Decrypting Message via Image Slicing
PDF
Digital image copyright protection based on visual cryptography
PDF
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
Review On Encrypting and Decrypting Message Via Image Slicing
F42022628
Image Cryptography using Nearest Prime Pixels
Implementation of Steganographic Techniques and its Detection.
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
Fz2510901096
Chaos Based Image Encryption Techniques: A Review
R04405103106
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
A comparatively study on visual cryptography
Retrieving Of Color Images Using SDS Technique
Hf2513081311
Hf2513081311
Data Hiding and Retrieval using Visual Cryptography
Survey on Different Image Encryption Techniques with Tabular Form
Image encryption approach for security issues
Encrypting and Decrypting Message via Image Slicing
Digital image copyright protection based on visual cryptography
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
August Patch Tuesday
PPTX
A Presentation on Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Mushroom cultivation and it's methods.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
project resource management chapter-09.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Chapter 5: Probability Theory and Statistics
SOPHOS-XG Firewall Administrator PPT.pptx
August Patch Tuesday
A Presentation on Artificial Intelligence
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Mushroom cultivation and it's methods.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A comparative analysis of optical character recognition models for extracting...
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Enhancing emotion recognition model for a student engagement use case through...
TLE Review Electricity (Electricity).pptx
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
cloud_computing_Infrastucture_as_cloud_p
project resource management chapter-09.pdf

A novel technique of visual cryptography for maintaining the security of visual information transaction

  • 1. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 INTERNATIONAL JOURNAL OF ELECTRONICS AND 17 – 19, July 2014, Mysore, Karnataka, India COMMUNICATION ENGINEERING TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 8, August (2014), pp. 194-199 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com 194 IJECET © I A E M E A NOVEL TECHNIQUE OF VISUAL CRYPTOGRAPHY FOR MAINTAINING THE SECURITY OF VISUAL INFORMATION TRANSACTION Akshatha M M#1 Lokesh B#2 Nuthan A C#3 #1Student, Dept. of ECE, SIT Mangalore #2Dept. of EEE, SIT Mangalore #3Research Scholar, Jain University ABSTRACT As the growth in the technology increases maintaining the security of visual information during its transaction has to be increased. Rapid growth in the techniques for doing so is also increasing. Internet has become most commonly used media for communication and hence text, voice, video, Images and many more are transmitted through Internet. These might include Military Secrets, Commercial Secrets and Information of individuals and therefore it has to be transmitted by safer means with enhanced security. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. In this paper, Chaotic Pseudo – Random Number generation, Zigzag Scan Pattern Method, Method to reduce the degradation of the resultant image is proposed by an extension from gray to color image. Pixel Index Method is discussed to improve the security for images. Keywords: Security, Visual Information, Visual Cryptography. I. INTRODUCTION Cryptography refers to the study of mathematical techniques and related aspects of information security like data confidentiality, data integrity and of data authentication. In the process of Visual Cryptography a secret image is encrypted into shares which refuse to divulge information about the original secret image. Decryption is through a separate decryption algorithm. A basic model for Visual Cryptography for natural images was proposed by Naor and Shamir [2], where the resultant image is twice the size of secret image. As the advent of electronic applications increases, providing the security for information in an open network environment is required. Encryption is a method of transforming original data,
  • 2. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India called plain text or clear text into a form that appears to be random and unreadable which is called Cipher text. Plain text is either in the form that can be understood by a person (document) or by a computer (executable code). 195 Once it is transformed into Cipher text, neither human nor machine can properly process it until it is decrypted. This enables the transmission of confidential information over insecure channels without unauthorized disclosure. When data is stored on a computer it is protected by logical and physical access controls. When this same sensitive information is sent over a network, the information is in much more vulnerable state. Naor and Shamir introduced the new concept of Visual Cryptography in 1994[1], requiring no computation except human Visual System to decrypt. They proposed a basic (2, 2) Visual Cryptography scheme where a secret image is divided into 2 shares [3], revealing the secret image through Share Stacking. Fig. 1: Example of Visual Cryptography In figure 1 a secret image that has to be sent is divided into shares. When these two shares are stacked together and put into a Human Visual System the resultant image is revealed. In the visual secret sharing model [1], a secret picture must be shared among n participants. The picture is divided into n shares so that if m transparencies (shares) are placed together the picture is visible. When there are fewer m transparencies it is invisible. This ensures that the secret picture is viewed as a set of black and white pixels with each pixel being handled separately. II. RELATED WORK 2.1 Basic (2, 2) Scheme The (2, 2) VC scheme divides the secret image into two shares so that reconstruction of an image from a share is impossible. Each share is printed in transparency. A share is a random noise. Encryption is performed for each pixel. Fig.2 shows the 2 different shares for black and white pixels. The figure shows how a pixel in a image in divided into two sub pixels depending on whether the pixel is black or white. By doing so the width of the share increases. This is termed as Pixel Expansion.
  • 3. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 196 Fig. 2: A (2,2) Visual Cryptography Scheme 2.2 Pseudo Randomized Visual Cryptography Scheme Figure 3 shows how the shares are generated by pixel reversal [7] and using pseudo random technique [10]. Each pixel is being handled separately. The input is a secret image and the output is the shares. Here there is no pixel expansion. The decoded image and the original secret image are of the same sizes. But the secret image which is decoded had a darker resolution than the original image. Preprocessing technique was used to overcome this problem [6]. Fig. 3: Pseudo Random Scheme III. PROPOSED WORK In this paper, the problem of pixel expansion is eliminated and also a method is proposed for color image usage and thus the degradation of the resultant image is reduced. Chaotic random number generation technique is used to provide much more security. Pixel index reversal is applied where the index of each pixel is reversed and applied to a Zigzag scan pattern technique to increase the scrambling and thus there will be increase in the security. The secret image can be revealed by a decryption algorithm. A secret image is first split into R G B component and then the security techniques are applied for each pixel of R G B. A secret image is taken and is split into RGB components. Each component is handled separately. Each pixel is decomposed using Bit Plane
  • 4. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India Decomposition technique. ATMF and De – noising is done to eliminate the presence of noise. This result is then encrypted using Chaotic Random Number Generator and the bit planes are re – ordered and Re – combined. Pixel Index Reversal is done to reverse the index of the pixel to improve the Security. At this stage Zigzag Scan Pattern is applied to increase the scrambling, thus increasing the Security. The output after the Scan is then applied to Pseudo Random Scheme as shown in Figure 4. 197 Fig. 4: Block Diagram of the Cryptographic Technique 3.1 Simulations and Results The algorithm is implemented in MATLAB. Figure 5 shows the experiment results for the gray image. Fig. 5: Results for gray image as input
  • 5. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 198 Fig. 6: Results for Color Image as input Fig. 7: Results for Color Image after applying the Security Methods Fig. 8: Complete Encrypted Result 3.2 Comparison of the Algorithms Table. 1: Comparison of Algorithms Algorithm Pixel Security Quality Naor, Double Increase Poor Shamir (k, n) scheme Double Increase Poor Existing Method No Expansion Increase Increase Proposed Work No Expansion Increase Color Image In the early technique of Visual Cryptography given by Naor and Shamir [2] the pixel was expanded in width wise and so there was a problem of pixel expansion. The quality of the resultant image was also poor. The (k, n) Visual Cryptography scheme was also suggested to improve the concept of Visual Cryptography by Naor and Shamir. In the existing method given by Ch. Ratna Babu and team the problem of pixel expansion was eliminated and pixel reversal method was suggested [10]. The security also increased because of Chaotic Randomization. In the proposed technique pixel reversal and pixel index reversal is suggested to eliminate pixel expansion. The security increases due to Scan Pattern method and Chaotic Randomization. This technique is also applicable for color images and so the quality increases.
  • 6. Proceedings of the 2nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 17 – 19, July 2014, Mysore, Karnataka, India 199 IV. CONCLUSION AND FUTURE WORK The security increases as the scrambling is more. The time consumption is also in terms of Nano seconds and hence this method can be applicable in most of the fields. The problem of pixel expansion is also eliminated. Future work can include the application of this technique for bit map images. Some techniques can be made to improve the quality of resultant image and also to reduce the power consumption. V. REFERENCES 1. Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer science, Massachusetts Institute of Technology, 1979. 2. Naor M. and Shamir A, “Visual cryptography” , In Proc. Eurocrypt 94, Perugia, Italy, May 9–12, LNCS 950, Springer Verlag, 1994, 1–12. 3. “What are Visual Secret Sharing Schemes”, General concept. 4. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson, “Visual Cryptography for general access structure”, ICALP'96, Italy, 1996. 5. Frank Stajano, “Visual Cryptography Kit”, Computer Laboratory, University of Cambridge, 1998, http://www.cl.cam.ac.uk/~fms27/vck/. 6. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, “Half tone Visual Cryptography”, IEEE Transaction on image processing, vol.15, no.8, 2006. 7. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci, “Ideal contrast visual cryptography schemes with reversing”, Information Processing Letters, Elsevier. 8. Jim Cai, “A Short Survey On Visual Cryptography Schemes”, 2004. 9. M.Naor and A.Shamir. “Visual cryptography II: Improving the contrast via the cover base”. Theory of Cryptography Library, (96-07), 1996. 10. Ch. Ratna Babu, M.Shridhar, Dr. B. Raveendra Babu “Information Hiding in a Gray Scale Image using Pseudo – Randomised Visual Cryptography Algorithm for Visual Information Security”, IEEE, 2013. BIOGRAPHY Akshatha M M Completed her BE under Visvesvaraiah Technological University, Belgaum in Electronics and Communication Engineering. She completed her M. Tech degree, under the same university in VLSI and Embedded Systems. At present she is working as an Asst. Professor in Sai Vidya Institute of Technology, Bengaluru. Lokesh B Is the Associate Professor and HOD in the department of Electronics and Electricals in SIT, Mangalore. He is also a research scholar under Visveswaraiah Technological University, Belgaum. Nuthan A C Completed his BE in Electronics and Communication Engineering and M. Tech in Digital Electronics under Visvesvaraiah Technological University. At present he is working as Assistant Professor in the department of Electronics and Communication in GMIT, Mandya. He is also a research scholar under Jain University, Bangalore.