SlideShare a Scribd company logo
WELCOME TO THE
SEMINAR TITLED
VISUAL CRYPTOGRAPHY
Presented by:
SHAHID MANZOOR ZARGAR
SEMINAR OVERVIEW
 INTRODUCTION
 VISUAL CRYPTOGRAPHY
 SECRET SHARING SCHEME
 VISUAL CRYPTOGRAPHY FOR BINARY IMAGES
 VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES
 VISUAL CYPTOGRAPHY FOR COLOR IMAGES
 IMPLEMENTATION
 ADVANTAGES
 DISADVANTAGES
 APPLICATION
INTRODUCTION
 Cryptography is the science and art of transforming
messages to make them secure and immune to attack.
Process of Cryptography
Plain Text/image Encryption Cipher
Plain Text /image Decryption Channel
It is the practice and study of techniques for secure communication in the presence of
third parties (called adversaries).
Visual cryptography
 Visual cryptography (VC) was introduced by Moni Naor and Adi Shamir at EUROCRYPT (1994).
 Used to encrypt written text/ pictures etc in a perfectly secure way.
 Decoding is done by human visual system, without any computation.
 Encryption involves creating “shares” of the image which in a sense will be a piece of the image.
 Give of the shares to the respective holders.
 Decryption – involving bringing together an appropriate combination and the human visual
system.
Secret sharing scheme in Visual
Cryptography
Suppose the data D is divided into n shares
 D can be constructed from any k shares out of n
 Complete knowledge of k-1 shares reveals no information about D
 k of n shares is necessary to reveal secret data.
OVERVIEW OF Visual Cryptography
Share1
Stacking the share
reveals the secret
Share2
Encryption Decryption
Visual cryptography
2 out of 2 scheme(2 subpixels)
 Black and white image: each pixel divided in 2 sub-pixels
 Randomly choose between black and white.
 If white, then randomly choose one of the two rows for white.
2 out of 2 Scheme (2 subpixels)
 If black, then randomly choose between one of the two rows for
black.
2 out of 2 Scheme (4 subpixels)
 Each pixel encoded as
 a 2x2 cell
 in two shares (key and cipher)
 Each share has 2 black, 2 transparent subpixels
 When stacked, shares combine to
 Solid black
 Half black (seen as gray)
Horizontal shares Vertical shares Diagonal shares
2 out of 2 Scheme (4 subpixels)
2 out of 2 Scheme (4 subpixels)
Visual cryptography for Binary Images
 Naor and Shamir proposed a scheme
 take a pixel from secret image
 extend it onto 2x2 subpixel
 Randomly choose 1 out of 2 share.
Visual Cryptography for gray-level images
(The halftone technology )
 Transform the gray-level image into black-and white halftone image
 Halftone technology uses the density of black dots to simulate the content of
grayscale image
 White area: low density of black dots
 Black area: high density of black dots
visual cryptography for color images
 Rijmen and Preneel’s method
 Each pixel is divided into 4 subpixels, with the color red, green,
blue and white.
 In any order, we can get 24 different combination of colors. We
average the combination to present the color.
 To encode, choose the closest combination, select a random order
on the first share. According to the combination, we can get the
second share.
visual cryptography for color images
 Rijmen and Preneel’s method
Pattern1 Pattern1Pattern2 Pattern2
Combined
Result
Combined
Result
visual cryptography for color images
Advantages
 Simple to implement, Such a technique thus would be lucrative for
defense and security.
 Decryption algorithm not required (Use a human Visual System). So a
person unknown to cryptography can decrypt the message.
 We can send cipher text through FAX or E-MAIL.
 Lower computational cost since the secret message is recognized only by
human eyes and not cryptographically computed.
Advantages
 Send innocent looking transparencies, e.g. Send images a dog, a house, and get
a spy message with no trace.
 
Disadvantages
 The contrast of the reconstructed image is not maintained.
 Perfect alignment of the transparencies is troublesome.
 Due to pixel expansion the width of the decoded image is twice as
that of the original image. Leads to loss of information due to
change in aspect ratio.
 Its original formulation is restricted only to binary images.
Additional processing is required for colored images.
Implementation
 Platform: .Net Framework 3.5
 Language: C#
 Reason for selecting .Net:
 Previous experience working on .Net.
 .NET also has lot of support for image acquisition and
manipulation.
 Other Platforms: Matlab, Python etc
Application
Watermarking
 Steganography
 Remote electronic voting
 Bank customer identification
Example of watermarking
Fig: A twenty euro bank note held against the light to show watermark.
Example of steganography
Example of internet voting system
 Fig 1. The screen image and
transparency are random dots before
aligning.
 Fig 2. After aligning the
transparency and screen image,the
voter password (EH) is revealed.
Visual cryptography

More Related Content

PPT
Visual Cryptography
PPT
Visual cryptography1
PPTX
Visual CryptoGraphy
PPTX
Visual Cryptography
PPTX
Visual Cryptography
PPTX
Hybrid encryption ppt
PPT
Data Redundacy
PPT
Symmetric and Asymmetric Encryption.ppt
Visual Cryptography
Visual cryptography1
Visual CryptoGraphy
Visual Cryptography
Visual Cryptography
Hybrid encryption ppt
Data Redundacy
Symmetric and Asymmetric Encryption.ppt

What's hot (20)

PPTX
Transform coding
PDF
Introduction to Cryptography
PDF
Report on Digital Watermarking Technology
PPT
Cryptography
PDF
Public private key
PPT
Public Key Cryptography
PPTX
What is Digital Morphing and Its Techniques
PDF
Digital Electronics viva and interview questions-min.pdf
PPTX
Edge Detection using Hough Transform
PDF
2. public key cryptography and RSA
PPT
5 spatial filtering p1
PPTX
Modern symmetric cipher
PPTX
Encoding Techniques
PPT
6 spatial filtering p2
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
PPSX
Image Processing: Spatial filters
PDF
4.intensity transformations
PPT
Cryptography Intro
PDF
Acik Anahtarli Kripto Sistemler
PDF
Steganography and Its Applications in Security
Transform coding
Introduction to Cryptography
Report on Digital Watermarking Technology
Cryptography
Public private key
Public Key Cryptography
What is Digital Morphing and Its Techniques
Digital Electronics viva and interview questions-min.pdf
Edge Detection using Hough Transform
2. public key cryptography and RSA
5 spatial filtering p1
Modern symmetric cipher
Encoding Techniques
6 spatial filtering p2
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Image Processing: Spatial filters
4.intensity transformations
Cryptography Intro
Acik Anahtarli Kripto Sistemler
Steganography and Its Applications in Security
Ad

Viewers also liked (20)

PPS
Visual Cryptography in Meaningful Shares
PPTX
online payment system using Steganography and Visual cryptography
DOCX
Visual Cryptography Industrial Training Report
PPTX
steganography using genetic algorithm along with visual cryptography for wire...
PPTX
Visual cryptography for color images
PPTX
3 d antiphishing based cryptography
PPTX
digital watermarking
PPTX
Join community criptography in .net
PPT
Intro Watermarking
PDF
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
PPS
Criptography
PDF
Automata Invasion
PDF
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
PDF
Finite automata
PPTX
Scene Text Detection on Images using Cellular Automata
PPTX
cryptography ppt free download
PPT
Cloud computing for agent based urban transportation system vinayss
PDF
Automata
PDF
Cellular Automata
Visual Cryptography in Meaningful Shares
online payment system using Steganography and Visual cryptography
Visual Cryptography Industrial Training Report
steganography using genetic algorithm along with visual cryptography for wire...
Visual cryptography for color images
3 d antiphishing based cryptography
digital watermarking
Join community criptography in .net
Intro Watermarking
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
Criptography
Automata Invasion
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Finite automata
Scene Text Detection on Images using Cellular Automata
cryptography ppt free download
Cloud computing for agent based urban transportation system vinayss
Automata
Cellular Automata
Ad

Similar to Visual cryptography (20)

PDF
Paper id 212014107
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Fz2510901096
PDF
International Journal of Engineering Research and Development
PDF
Paper id 25201475
PDF
Hf2513081311
PDF
Hf2513081311
PDF
akashreport
PDF
IJAER Publishes
PDF
Retrieving Of Color Images Using SDS Technique
PDF
Variable length key based visual
PDF
A comparatively study on visual cryptography
PDF
Image steganography techniques
PDF
Image Steganography Techniques
PDF
Digital Image Sharing Using NVSS
PDF
Data Hiding and Retrieval using Visual Cryptography
PDF
A comparatively study on visual cryptography
PDF
A Survey on Visual Cryptography Schemes
PDF
11.biometric data security using recursive visual cryptography
PDF
Jz3118501853
Paper id 212014107
Image Cryptography using Nearest Prime Pixels
Fz2510901096
International Journal of Engineering Research and Development
Paper id 25201475
Hf2513081311
Hf2513081311
akashreport
IJAER Publishes
Retrieving Of Color Images Using SDS Technique
Variable length key based visual
A comparatively study on visual cryptography
Image steganography techniques
Image Steganography Techniques
Digital Image Sharing Using NVSS
Data Hiding and Retrieval using Visual Cryptography
A comparatively study on visual cryptography
A Survey on Visual Cryptography Schemes
11.biometric data security using recursive visual cryptography
Jz3118501853

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
A Presentation on Artificial Intelligence
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx

Visual cryptography

  • 1. WELCOME TO THE SEMINAR TITLED VISUAL CRYPTOGRAPHY Presented by: SHAHID MANZOOR ZARGAR
  • 2. SEMINAR OVERVIEW  INTRODUCTION  VISUAL CRYPTOGRAPHY  SECRET SHARING SCHEME  VISUAL CRYPTOGRAPHY FOR BINARY IMAGES  VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES  VISUAL CYPTOGRAPHY FOR COLOR IMAGES  IMPLEMENTATION  ADVANTAGES  DISADVANTAGES  APPLICATION
  • 3. INTRODUCTION  Cryptography is the science and art of transforming messages to make them secure and immune to attack. Process of Cryptography Plain Text/image Encryption Cipher Plain Text /image Decryption Channel It is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).
  • 4. Visual cryptography  Visual cryptography (VC) was introduced by Moni Naor and Adi Shamir at EUROCRYPT (1994).  Used to encrypt written text/ pictures etc in a perfectly secure way.  Decoding is done by human visual system, without any computation.  Encryption involves creating “shares” of the image which in a sense will be a piece of the image.  Give of the shares to the respective holders.  Decryption – involving bringing together an appropriate combination and the human visual system.
  • 5. Secret sharing scheme in Visual Cryptography Suppose the data D is divided into n shares  D can be constructed from any k shares out of n  Complete knowledge of k-1 shares reveals no information about D  k of n shares is necessary to reveal secret data.
  • 6. OVERVIEW OF Visual Cryptography Share1 Stacking the share reveals the secret Share2 Encryption Decryption
  • 8. 2 out of 2 scheme(2 subpixels)  Black and white image: each pixel divided in 2 sub-pixels  Randomly choose between black and white.  If white, then randomly choose one of the two rows for white.
  • 9. 2 out of 2 Scheme (2 subpixels)  If black, then randomly choose between one of the two rows for black.
  • 10. 2 out of 2 Scheme (4 subpixels)  Each pixel encoded as  a 2x2 cell  in two shares (key and cipher)  Each share has 2 black, 2 transparent subpixels  When stacked, shares combine to  Solid black  Half black (seen as gray)
  • 11. Horizontal shares Vertical shares Diagonal shares 2 out of 2 Scheme (4 subpixels)
  • 12. 2 out of 2 Scheme (4 subpixels)
  • 13. Visual cryptography for Binary Images  Naor and Shamir proposed a scheme  take a pixel from secret image  extend it onto 2x2 subpixel  Randomly choose 1 out of 2 share.
  • 14. Visual Cryptography for gray-level images (The halftone technology )  Transform the gray-level image into black-and white halftone image  Halftone technology uses the density of black dots to simulate the content of grayscale image  White area: low density of black dots  Black area: high density of black dots
  • 15. visual cryptography for color images  Rijmen and Preneel’s method  Each pixel is divided into 4 subpixels, with the color red, green, blue and white.  In any order, we can get 24 different combination of colors. We average the combination to present the color.  To encode, choose the closest combination, select a random order on the first share. According to the combination, we can get the second share.
  • 16. visual cryptography for color images  Rijmen and Preneel’s method Pattern1 Pattern1Pattern2 Pattern2 Combined Result Combined Result
  • 17. visual cryptography for color images
  • 18. Advantages  Simple to implement, Such a technique thus would be lucrative for defense and security.  Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message.  We can send cipher text through FAX or E-MAIL.  Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
  • 19. Advantages  Send innocent looking transparencies, e.g. Send images a dog, a house, and get a spy message with no trace.  
  • 20. Disadvantages  The contrast of the reconstructed image is not maintained.  Perfect alignment of the transparencies is troublesome.  Due to pixel expansion the width of the decoded image is twice as that of the original image. Leads to loss of information due to change in aspect ratio.  Its original formulation is restricted only to binary images. Additional processing is required for colored images.
  • 21. Implementation  Platform: .Net Framework 3.5  Language: C#  Reason for selecting .Net:  Previous experience working on .Net.  .NET also has lot of support for image acquisition and manipulation.  Other Platforms: Matlab, Python etc
  • 22. Application Watermarking  Steganography  Remote electronic voting  Bank customer identification
  • 23. Example of watermarking Fig: A twenty euro bank note held against the light to show watermark.
  • 25. Example of internet voting system  Fig 1. The screen image and transparency are random dots before aligning.  Fig 2. After aligning the transparency and screen image,the voter password (EH) is revealed.