SlideShare a Scribd company logo
Visual Cryptography
For Biometric Privacy
Waseem Ahmad
M.Tech
 Preserving the privacy of digital biometric data (e.g., face images)
stored in a central database has become of paramount importance.
This work explores the possibility of using visual cryptography for
imparting privacy to biometric data.
 In the case of faces, private face image is dithered into two host face
images (known as sheets) that are stored in separate database servers
such that the private image can be revealed only when both sheets
are simultaneously available; at the same time.
 Cryptography is one of the most important technique for
protecting the data such as biometric templates. It is the concept of
sending and receiving encrypted messages that is the
communication of the messages that can be decrypted only by the
authorized sender or the receiver.
 The original image is divided into the two cover images and, then
each cover image is stored in two different databases
geographically apart. When both the cover images are
simultaneously available then only we can access that original
image.
 "Biometrics" means "life measurement" but the term is usually
associated with the use of unique physiological characteristics to
identify an individual. The application which most people
associate with biometrics is security.
 A biometric system can be either an 'identification' system or a
'verification' (authentication) system, which are defined below.
Visual Cryptography for biometric privacy
Biometrics can be used to determine a person's identity even
without his knowledge or consent. For example, scanning a crowd
with a camera and using face recognition technology, one can
determine matches against a known database
• Fingerprint identification
• Hand geometry
• Palm Vein Authentication
• Face recognition
 Biometrics can also be used to verify a person's identity. For
example, one can grant physical access to a secure area in a
building by using finger scans or can grant access to a bank
account at an ATM by using retinal scan.
Visual Cryptography is a special encryption technique to hide information in
images in such a way that it can be decrypted by the human vision if the
correct key image is used.
1. Visual cryptography Scheme
a. Secret Image
b. Host Image
c. Sheet
d. Pixel
The Original image that has to be hidden In Our Application
This is private biometric image.
These are face image used to encrypt the secret image using the
EVCS In our application these correspond to the face image in a
public data sheet.
The secret image is encrypted into n sheet image which appear as
random noise image
Pixel is the smallest element of an image. Each pixel correspond to
any one value. In an 8-bit gray scale image, the value of the pixel
between 0 and 255. The value of a pixel at any point correspond to
the intensity of the light photons striking at that point.
Gray scaling is a process that uses gray shades to capture tone
variations. This is usually applied to monochrome graphics and
photos.
Gray-scaling is the process of converting a continuous-tone image
to an image that a computer can manipulate.
A pixel is made up 4 component
Alpha
Red
Green
Blue
Front –end
In this paper use c# technology as a frond end
Back-end
Sql server 2008 is a back-end
 Input: Secret Gray scale image (SI)
 Output: Valid Shares Share1, Share2
 Metod:
 Step1h:- Pixel Sij with position i and j is the input called original
 pixel.
 Step2:- Apply pixel reversal i.e Sij´ = 255 – Sij .
 Step3:- Use pseudo - random number generator (0.1 to 0.9) to
 reduce Si j´ randomly.
 Step4:- Take the difference of Sij´ with original pixel Sij.
 Step5:- Use pseudo-random number generator to reduce reversed
 value of Sij´ randomly.
 Step6:- Apply pixel reversal i.e Sij´´ = 255 – Sij´
 Step7:- Store in matrix as image called share 1.
 Step8:- Take the difference of two random number generators
 with original pixel S ij .
 Step9:- Apply pixel reversal i.e Sij´´´ = 255 - Sij´.
 Step10:- Store Sij´´´ in matrix as image called share 2.
 Step 11:- Stack both the share 1 and share 2
 Step 12:- Apply the sigmoid mask to each pixel
 Step 13:- Display the final encrypted image.
HARDWARE REQUIREMENTS
Processor : core i3 & above
CPU clock : 850 MHZ
RAM : 1GB Min
Hard Disk : 80GB
Display : Intel Graphic Adapter.
 Core Technology : Microsoft .Net 2010
 Framework : .Net Framework 2.0
 Front End : C#.Net
 Back End : SQL 2008
 Enrollment
 Authentication
 User Interface
In this user image , primary key ,username and password have
got from the user and it is stored successfully in database.
 Business layer
In this the user image is splited as 2 images. This 2 images are
hided randomly chose 2 host images. The 2host images are
encrypted with username and password. This images is saved in
the database.
 User Interface
In authentication form the enrolled user give their new image
,username, password and primary key.
 Business Layer:
By using the primary key the encrypted host image is retrieved
from the database. And that 2 host image is decrypted as username
with host image1 and password with host image2. Then the hided
images are retrieved from the host images(split1 and split2).
Concept is privet face image is can revealed
only both host image are simultaneously available.
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
1. This project at start should aim at the security of private face
image .
2. Only qualified subset of shares can recover the secret image
3. Any forbidden subset of share can not obtain any information
of the secret image other than the size of the secret image
4. It can be used at all security related institution like military
,office ,confidential lab or laboratories
 The contribution of this paper includes a methodology to protect
the privacy of a face data-base by decomposing an input private
face image into two independent sheet images such that the
private face image can be reconstructed only when both sheets are
simultaneously available.

More Related Content

PPTX
Cryptography.ppt
PPTX
SQL INJECTION
PPTX
Cryptography - Block cipher & stream cipher
PPTX
5. message authentication and hash function
PPT
graphical password authentication
PPTX
SHA- Secure hashing algorithm
PPTX
Hash Function
PPTX
Transport layer security
Cryptography.ppt
SQL INJECTION
Cryptography - Block cipher & stream cipher
5. message authentication and hash function
graphical password authentication
SHA- Secure hashing algorithm
Hash Function
Transport layer security

What's hot (20)

PPTX
Kerberos
PDF
Unit 5- Cloud Applications.pdf
PPTX
Computer graphics LINE DRAWING algorithm.pptx
PDF
8. Software Development Security
PPTX
Back face detection
PPTX
Topic2 caser hill_cripto
PPT
Authentication Application in Network Security NS4
PDF
symmetric key encryption algorithms
PPTX
Raster animation
PPTX
Image to text Converter
PPTX
Cia security model
DOCX
What is AES? Advanced Encryption Standards
PPTX
Attendance Management System using Face Recognition
PPTX
Computer graphics chapter 4
PPTX
Data encryption
PPTX
Scan line method
PPTX
Cryptography and network security
PPTX
Public key algorithm
PDF
Classical encryption techniques
PPTX
Curve clipping
Kerberos
Unit 5- Cloud Applications.pdf
Computer graphics LINE DRAWING algorithm.pptx
8. Software Development Security
Back face detection
Topic2 caser hill_cripto
Authentication Application in Network Security NS4
symmetric key encryption algorithms
Raster animation
Image to text Converter
Cia security model
What is AES? Advanced Encryption Standards
Attendance Management System using Face Recognition
Computer graphics chapter 4
Data encryption
Scan line method
Cryptography and network security
Public key algorithm
Classical encryption techniques
Curve clipping
Ad

Similar to Visual Cryptography for biometric privacy (20)

PDF
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
PDF
Digital image copyright protection based on visual cryptography
PDF
11.biometric data security using recursive visual cryptography
PDF
Retrieving Of Color Images Using SDS Technique
PDF
separable reversible data hiding in encrypted image
PDF
G1803063741
PDF
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
PDF
A comparatively study on visual cryptography
PDF
F1803063236
PDF
International Journal of Engineering Research and Development
DOCX
Optical Watermarking Literature survey....
PDF
IRJET- Image Privacy Protection as a Single Share
PDF
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
PDF
Variable length key based visual
PDF
DOCX
Multi-Biometric Authentication through Hybrid Cryptographic System
PDF
Image Cryptography using Nearest Prime Pixels
PPTX
BLIND RECOVERY OF DATA
PDF
An Introduction to Digital Image Analysis.pdf
PDF
Digital Image Sharing Using NVSS
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Digital image copyright protection based on visual cryptography
11.biometric data security using recursive visual cryptography
Retrieving Of Color Images Using SDS Technique
separable reversible data hiding in encrypted image
G1803063741
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
A comparatively study on visual cryptography
F1803063236
International Journal of Engineering Research and Development
Optical Watermarking Literature survey....
IRJET- Image Privacy Protection as a Single Share
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
Variable length key based visual
Multi-Biometric Authentication through Hybrid Cryptographic System
Image Cryptography using Nearest Prime Pixels
BLIND RECOVERY OF DATA
An Introduction to Digital Image Analysis.pdf
Digital Image Sharing Using NVSS
Ad

Recently uploaded (20)

PDF
Designing Intelligence for the Shop Floor.pdf
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Nekopoi APK 2025 free lastest update
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Design an Analysis of Algorithms I-SECS-1021-03
Designing Intelligence for the Shop Floor.pdf
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Reimagine Home Health with the Power of Agentic AI​
Odoo Companies in India – Driving Business Transformation.pdf
Autodesk AutoCAD Crack Free Download 2025
Why Generative AI is the Future of Content, Code & Creativity?
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Nekopoi APK 2025 free lastest update
Computer Software and OS of computer science of grade 11.pptx
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
iTop VPN Crack Latest Version Full Key 2025
Navsoft: AI-Powered Business Solutions & Custom Software Development
Digital Systems & Binary Numbers (comprehensive )
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Design an Analysis of Algorithms I-SECS-1021-03

Visual Cryptography for biometric privacy

  • 1. Visual Cryptography For Biometric Privacy Waseem Ahmad M.Tech
  • 2.  Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data.  In the case of faces, private face image is dithered into two host face images (known as sheets) that are stored in separate database servers such that the private image can be revealed only when both sheets are simultaneously available; at the same time.
  • 3.  Cryptography is one of the most important technique for protecting the data such as biometric templates. It is the concept of sending and receiving encrypted messages that is the communication of the messages that can be decrypted only by the authorized sender or the receiver.  The original image is divided into the two cover images and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image.
  • 4.  "Biometrics" means "life measurement" but the term is usually associated with the use of unique physiological characteristics to identify an individual. The application which most people associate with biometrics is security.  A biometric system can be either an 'identification' system or a 'verification' (authentication) system, which are defined below.
  • 6. Biometrics can be used to determine a person's identity even without his knowledge or consent. For example, scanning a crowd with a camera and using face recognition technology, one can determine matches against a known database • Fingerprint identification • Hand geometry • Palm Vein Authentication • Face recognition
  • 7.  Biometrics can also be used to verify a person's identity. For example, one can grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM by using retinal scan.
  • 8. Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. 1. Visual cryptography Scheme a. Secret Image b. Host Image c. Sheet d. Pixel
  • 9. The Original image that has to be hidden In Our Application This is private biometric image.
  • 10. These are face image used to encrypt the secret image using the EVCS In our application these correspond to the face image in a public data sheet.
  • 11. The secret image is encrypted into n sheet image which appear as random noise image
  • 12. Pixel is the smallest element of an image. Each pixel correspond to any one value. In an 8-bit gray scale image, the value of the pixel between 0 and 255. The value of a pixel at any point correspond to the intensity of the light photons striking at that point.
  • 13. Gray scaling is a process that uses gray shades to capture tone variations. This is usually applied to monochrome graphics and photos. Gray-scaling is the process of converting a continuous-tone image to an image that a computer can manipulate.
  • 14. A pixel is made up 4 component Alpha Red Green Blue
  • 15. Front –end In this paper use c# technology as a frond end Back-end Sql server 2008 is a back-end
  • 16.  Input: Secret Gray scale image (SI)  Output: Valid Shares Share1, Share2  Metod:  Step1h:- Pixel Sij with position i and j is the input called original  pixel.  Step2:- Apply pixel reversal i.e Sij´ = 255 – Sij .  Step3:- Use pseudo - random number generator (0.1 to 0.9) to  reduce Si j´ randomly.  Step4:- Take the difference of Sij´ with original pixel Sij.  Step5:- Use pseudo-random number generator to reduce reversed  value of Sij´ randomly.  Step6:- Apply pixel reversal i.e Sij´´ = 255 – Sij´  Step7:- Store in matrix as image called share 1.  Step8:- Take the difference of two random number generators  with original pixel S ij .  Step9:- Apply pixel reversal i.e Sij´´´ = 255 - Sij´.  Step10:- Store Sij´´´ in matrix as image called share 2.  Step 11:- Stack both the share 1 and share 2  Step 12:- Apply the sigmoid mask to each pixel  Step 13:- Display the final encrypted image.
  • 17. HARDWARE REQUIREMENTS Processor : core i3 & above CPU clock : 850 MHZ RAM : 1GB Min Hard Disk : 80GB Display : Intel Graphic Adapter.
  • 18.  Core Technology : Microsoft .Net 2010  Framework : .Net Framework 2.0  Front End : C#.Net  Back End : SQL 2008
  • 20.  User Interface In this user image , primary key ,username and password have got from the user and it is stored successfully in database.  Business layer In this the user image is splited as 2 images. This 2 images are hided randomly chose 2 host images. The 2host images are encrypted with username and password. This images is saved in the database.
  • 21.  User Interface In authentication form the enrolled user give their new image ,username, password and primary key.  Business Layer: By using the primary key the encrypted host image is retrieved from the database. And that 2 host image is decrypted as username with host image1 and password with host image2. Then the hided images are retrieved from the host images(split1 and split2). Concept is privet face image is can revealed only both host image are simultaneously available.
  • 27. 1. This project at start should aim at the security of private face image . 2. Only qualified subset of shares can recover the secret image 3. Any forbidden subset of share can not obtain any information of the secret image other than the size of the secret image 4. It can be used at all security related institution like military ,office ,confidential lab or laboratories
  • 28.  The contribution of this paper includes a methodology to protect the privacy of a face data-base by decomposing an input private face image into two independent sheet images such that the private face image can be reconstructed only when both sheets are simultaneously available.