SlideShare a Scribd company logo
HYBRID APPROACH FOR (K, N) SECRET SHARING IN VISUAL CRYPTOGRAPHY
School of Computer Science and Engineering
Vellore Institute of Technology, Vellore-Tamil Nadu -632014
Allu Supraja-17MCI0013
M-Tech CSE(IS) 2017-2019
allu.supraja2017@vitstudent.ac.in
INTRODUCTION:
• Visual cryptography (VC) is an emerging area used for data hiding, authentication,
multimedia security and transmission of data.
• Recent research shows many applications uses visual cryptography concept in
authentication, secure transaction, secret sharing of information.
LITERATURE SURVEY
• Vinita malik et al (2016) [1] have proposed a des (data encryption standard) algorithm for shaded
visual cryptography.
• Ch. Rupa et al(2016)[2] have proposed another recommendation that is keyed visual cryptographic
scheme (KVCS) to decrease the assault by programmer.
• Asha bhadran r (2015) [3] have displayed a visual cryptography procedure for shading pictures get
encoded due to created share.
• M. Karolinet et al (2015) [4] have proposed a technique for pictures with 256 hues which are
changed over to 16 standard RGB hues design.
• Kashmira S. Gulhaneet et al (2016), [5] the image is partitioned into parts known as offers and
after that these offers are dispersed to the members.
• Nidhal khdhair, abbadiet et al (2016) [6] have recommended another technique for picture
encryption in light.
• K. Kanagalakshmet et al (2016) [7] have proposed a technique that depends on blowfish
calculation with prevalent highlights.
• Naor & shamir (1994) [8] have proposed the fundamental topic of visual cryptography inside
which the key picture is part into 2 shares.
• Manika sharmaet al (2013) [9] have proposed a cryptographic system for shading pictures where
we are utilizing shading mistake dissemination with xor activity.
EXAMPLE USING PIXELS:
COMPARITIVE STUDY
ALGORITHM METHOD ADVANTAGES DISADVANTAGE
Watermark method based on
Visual cryptography
• Difficult to detect or
recover from marked
image illegally
• The weakness of this
method is different
verification information
for different marked
images
(K,N)-threshold visual
cryptography scheme
• Data loss prevention and
security in recovering
image.
• If the dimensions of the
image is high difficult to
analyze.
Extended colour visual
cryptography for black and
white secret image
• Satisfy security, contrast,
and cover image
conditions.
• (k, n)-CBW-VCS are all
perfect black.
• Non-perfect black VC
cannot be determined
Concept of VC and image
processing in banking
• Secure transactions
• authentication
• Only works on black and
white images.
CHANG’S EMBEDDING • Less noisy • (2,N) colored images can’t
OBJECTIVE
• The existing system include lot of research on visual cryptography technique.
• The concepts like EVCT (extended visual cryptography technique), halftoning, CTVCS (color
transfer visual cryptography scheme), (k, n) secret sharing.
• The implementation of visual cryptography concept include mainly number of secret images,
pixel expansion, image format and types of share generated.
VISUAL CRYPTOGRAPHY NOTATIONS
• (1) k- threshold
• (2) n- group size
• (3) m-pixel expansion
• (4) α-relative contrast
• (5) h(v)-hamming weight
• (6) c0-collection of n*m Boolean matrices for shares of white pixel
• (7) c1-collection of n*m Boolean matrices for shares of black pixel
• (8) d-number in [1,m]
• (9) v- or’ed K rows
ALGORITHM FOR IMPLEMENTATION
• Visual cryptography by naor and shamir for monochrome images
• KN sharing scheme for colored images
• SHA-512 algorithm
• AES-256 bit algorithm
Tools:
• MATLAB 2018 or later
FLOWCHART FOR IMPLEMENTATION
METHODOLOGY:
CONS OF EXISTING SYSTEM
• Low level of security
• No key based security
• Random noise generation in shares
• Transparency
• Possibility of attack in shares
PROS ON ANALYSIS OF HYBRID APPROACH
• Enhanced security
• Robustness
• No transparency
• Key based approach for each individual share
RESULTS AND ANALYSIS
• The below figure shows result when AES algorithm is used to generate the (k, n) secret sharing
scheme to make data more secure.
QUANTITATIVE RESULTS
Fig: Psnr Vs K For Normal Image Fig: Psnr Vs K For 10*10 Image
Show Variation In Psnr When Ran
10 Times
Fig 7: Psnr Vs K For 100*100
Image Variation In Psnr When Ran
10 Times
APPLICATIONS OF VISUAL CRYPTOGRAPHY
• Watermarking
• Secure banking communication
• Defense system
• Anti-phishing system
CONCLUSION
• Visual cryptography scheme place vital role in rapid growth technology while implementing any
type of application. This can be considered as one of major security concern to prevent
unauthorized access and all possible attacks.
• The above work implemented on the basis of security measure. This results in reduction of
random-noise generated between shares, secret sharing in a secured medium, and increase
transparency also robustness.
• The hybrid mechanism of two level approach is to enhance the security and makes the visual
cryptography more robust to prevent attacks.
FUTURE SCOPE
Every parameter of visual cryptography is kept minded and implemented, so that we can use this
approach in real time applications like distributed system, networks, banking and so on. Data
security is concentrated majorly in recent research works further we can implement for multimedia
security like audio and video.
REFERENCES
[1] a. Pandey and S. Som, “applications and usage of visual cryptography: A review,” 2016 5th int.
Conf. Reliab. Infocom technol. Optim. ICRITO 2016 trends futur. Dir., Pp. 375–381, 2016.
[2] b. Symposium, “AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET
HIDING R . youmaran , A . adler , A . miri school of information technology and engineering (
SITE ), university of ottawa , ontario , canada,” pp. 340–343, 2006.
[3] c. N. Yang, T. C. Tung, F. H. Wu, and Z. Zhou, “color transfer visual cryptography with perfect
security,” meas. J. Int. Meas. Confed., Vol. 95, pp. 480–493, 2017.
[4] s. Dixit, D. K. Jain, and A. Saxena, “an approach for secret sharing using randomized visual
secret sharing,” proc. - 2014 4th int. Conf. Commun. Syst. Netw. Technol. CSNT 2014, pp. 847–850,
2014.
[5] c. Vyas and M. Lunagaria, “a review on methods for image authentication and visual
cryptography in digital image,” IEEE int. Conf. Comput. Intell. Comput. Res., 2014.
1a34gvddskjjjfjij
Visual cryptography for hybrid approach

More Related Content

DOCX
Designing an efficient image encryption then-compression system via predictio...
DOCX
designing an efficient image encryption-then-compression system via predictio...
PDF
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
DOCX
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
DOCX
Visual Cryptography Industrial Training Report
PDF
Threat Detection in Surveillance Videos
PDF
Extended Visual Cryptography Using Watermarking
PDF
Fx3610771081
Designing an efficient image encryption then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
Visual Cryptography Industrial Training Report
Threat Detection in Surveillance Videos
Extended Visual Cryptography Using Watermarking
Fx3610771081

What's hot (20)

PDF
IJAER Publishes
PPTX
Image secret sharing using Shamir's Algorithm
PDF
Public key steganography using lsb method with chaotic neural network
PDF
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
PPT
Image secret sharing using Shamir's scheme with Steganography
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Jz3118501853
PDF
A novel steganographic scheme based on
PDF
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
PDF
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
PDF
Transmission of cryptic text using rotational visual cryptography
PDF
Transmission of cryptic text using rotational visual
PPTX
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
PDF
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
PDF
A comparatively study on visual cryptography
PDF
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
PDF
A novel technique of visual cryptography for maintaining the security of visu...
PPTX
An Efficient encryption using Data compression towards Steganography,introduc...
PDF
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
PDF
Image Steganography Using HBC and RDH Technique
IJAER Publishes
Image secret sharing using Shamir's Algorithm
Public key steganography using lsb method with chaotic neural network
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
Image secret sharing using Shamir's scheme with Steganography
Image Cryptography using Nearest Prime Pixels
Jz3118501853
A novel steganographic scheme based on
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
“Applying the Right Deep Learning Model with the Right Data for Your Applicat...
A comparatively study on visual cryptography
Cross-Year Multi-Modal Image Retrieval Using Siamese Networks by Margarita Kh...
A novel technique of visual cryptography for maintaining the security of visu...
An Efficient encryption using Data compression towards Steganography,introduc...
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
Image Steganography Using HBC and RDH Technique
Ad

Similar to Visual cryptography for hybrid approach (20)

PDF
R04405103106
PPTX
cse final year project of image encryption
PDF
18. 23367.pdf
PDF
Fz2510901096
PDF
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
PDF
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
A novel technique of visual cryptography for maintaining the security of visu...
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
PDF
Dual-Layer Video Encryption and Decryption using RSA Algorithm
PDF
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
PDF
Chaos Based Image Encryption Techniques: A Review
PDF
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
PDF
Asymmetric image encryption scheme based on Massey Omura scheme
PDF
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
PDF
An efficient and highly secure technique to encrypt
R04405103106
cse final year project of image encryption
18. 23367.pdf
Fz2510901096
Secure Grayscale Image Encryption Using Symmetric Block Cipher with Enhanced ...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Elliptical curve cryptography image encryption scheme with aid of optimizatio...
Review On Encrypting and Decrypting Message Via Image Slicing
A novel technique of visual cryptography for maintaining the security of visu...
Survey on Different Image Encryption Techniques with Tabular Form
Visually Image Encryption and Compression using a CNN-Based Autoencoder
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Dual-Layer Video Encryption and Decryption using RSA Algorithm
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Chaos Based Image Encryption Techniques: A Review
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Asymmetric image encryption scheme based on Massey Omura scheme
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
An efficient and highly secure technique to encrypt
Ad

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
web development for engineering and engineering
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PPT on Performance Review to get promotions
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CH1 Production IntroductoryConcepts.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Lecture Notes Electrical Wiring System Components
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
bas. eng. economics group 4 presentation 1.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Structs to JSON How Go Powers REST APIs.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
573137875-Attendance-Management-System-original
web development for engineering and engineering
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CH1 Production IntroductoryConcepts.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Lecture Notes Electrical Wiring System Components

Visual cryptography for hybrid approach

  • 1. HYBRID APPROACH FOR (K, N) SECRET SHARING IN VISUAL CRYPTOGRAPHY School of Computer Science and Engineering Vellore Institute of Technology, Vellore-Tamil Nadu -632014 Allu Supraja-17MCI0013 M-Tech CSE(IS) 2017-2019 allu.supraja2017@vitstudent.ac.in
  • 2. INTRODUCTION: • Visual cryptography (VC) is an emerging area used for data hiding, authentication, multimedia security and transmission of data. • Recent research shows many applications uses visual cryptography concept in authentication, secure transaction, secret sharing of information.
  • 3. LITERATURE SURVEY • Vinita malik et al (2016) [1] have proposed a des (data encryption standard) algorithm for shaded visual cryptography. • Ch. Rupa et al(2016)[2] have proposed another recommendation that is keyed visual cryptographic scheme (KVCS) to decrease the assault by programmer. • Asha bhadran r (2015) [3] have displayed a visual cryptography procedure for shading pictures get encoded due to created share. • M. Karolinet et al (2015) [4] have proposed a technique for pictures with 256 hues which are changed over to 16 standard RGB hues design.
  • 4. • Kashmira S. Gulhaneet et al (2016), [5] the image is partitioned into parts known as offers and after that these offers are dispersed to the members. • Nidhal khdhair, abbadiet et al (2016) [6] have recommended another technique for picture encryption in light. • K. Kanagalakshmet et al (2016) [7] have proposed a technique that depends on blowfish calculation with prevalent highlights. • Naor & shamir (1994) [8] have proposed the fundamental topic of visual cryptography inside which the key picture is part into 2 shares. • Manika sharmaet al (2013) [9] have proposed a cryptographic system for shading pictures where we are utilizing shading mistake dissemination with xor activity.
  • 6. COMPARITIVE STUDY ALGORITHM METHOD ADVANTAGES DISADVANTAGE Watermark method based on Visual cryptography • Difficult to detect or recover from marked image illegally • The weakness of this method is different verification information for different marked images (K,N)-threshold visual cryptography scheme • Data loss prevention and security in recovering image. • If the dimensions of the image is high difficult to analyze. Extended colour visual cryptography for black and white secret image • Satisfy security, contrast, and cover image conditions. • (k, n)-CBW-VCS are all perfect black. • Non-perfect black VC cannot be determined Concept of VC and image processing in banking • Secure transactions • authentication • Only works on black and white images. CHANG’S EMBEDDING • Less noisy • (2,N) colored images can’t
  • 7. OBJECTIVE • The existing system include lot of research on visual cryptography technique. • The concepts like EVCT (extended visual cryptography technique), halftoning, CTVCS (color transfer visual cryptography scheme), (k, n) secret sharing. • The implementation of visual cryptography concept include mainly number of secret images, pixel expansion, image format and types of share generated.
  • 8. VISUAL CRYPTOGRAPHY NOTATIONS • (1) k- threshold • (2) n- group size • (3) m-pixel expansion • (4) α-relative contrast • (5) h(v)-hamming weight • (6) c0-collection of n*m Boolean matrices for shares of white pixel • (7) c1-collection of n*m Boolean matrices for shares of black pixel • (8) d-number in [1,m] • (9) v- or’ed K rows
  • 9. ALGORITHM FOR IMPLEMENTATION • Visual cryptography by naor and shamir for monochrome images • KN sharing scheme for colored images • SHA-512 algorithm • AES-256 bit algorithm Tools: • MATLAB 2018 or later
  • 11. CONS OF EXISTING SYSTEM • Low level of security • No key based security • Random noise generation in shares • Transparency • Possibility of attack in shares
  • 12. PROS ON ANALYSIS OF HYBRID APPROACH • Enhanced security • Robustness • No transparency • Key based approach for each individual share
  • 13. RESULTS AND ANALYSIS • The below figure shows result when AES algorithm is used to generate the (k, n) secret sharing scheme to make data more secure.
  • 14. QUANTITATIVE RESULTS Fig: Psnr Vs K For Normal Image Fig: Psnr Vs K For 10*10 Image Show Variation In Psnr When Ran 10 Times Fig 7: Psnr Vs K For 100*100 Image Variation In Psnr When Ran 10 Times
  • 15. APPLICATIONS OF VISUAL CRYPTOGRAPHY • Watermarking • Secure banking communication • Defense system • Anti-phishing system
  • 16. CONCLUSION • Visual cryptography scheme place vital role in rapid growth technology while implementing any type of application. This can be considered as one of major security concern to prevent unauthorized access and all possible attacks. • The above work implemented on the basis of security measure. This results in reduction of random-noise generated between shares, secret sharing in a secured medium, and increase transparency also robustness. • The hybrid mechanism of two level approach is to enhance the security and makes the visual cryptography more robust to prevent attacks.
  • 17. FUTURE SCOPE Every parameter of visual cryptography is kept minded and implemented, so that we can use this approach in real time applications like distributed system, networks, banking and so on. Data security is concentrated majorly in recent research works further we can implement for multimedia security like audio and video.
  • 18. REFERENCES [1] a. Pandey and S. Som, “applications and usage of visual cryptography: A review,” 2016 5th int. Conf. Reliab. Infocom technol. Optim. ICRITO 2016 trends futur. Dir., Pp. 375–381, 2016. [2] b. Symposium, “AN IMPROVED VISUAL CRYPTOGRAPHY SCHEME FOR SECRET HIDING R . youmaran , A . adler , A . miri school of information technology and engineering ( SITE ), university of ottawa , ontario , canada,” pp. 340–343, 2006. [3] c. N. Yang, T. C. Tung, F. H. Wu, and Z. Zhou, “color transfer visual cryptography with perfect security,” meas. J. Int. Meas. Confed., Vol. 95, pp. 480–493, 2017. [4] s. Dixit, D. K. Jain, and A. Saxena, “an approach for secret sharing using randomized visual secret sharing,” proc. - 2014 4th int. Conf. Commun. Syst. Netw. Technol. CSNT 2014, pp. 847–850, 2014. [5] c. Vyas and M. Lunagaria, “a review on methods for image authentication and visual cryptography in digital image,” IEEE int. Conf. Comput. Intell. Comput. Res., 2014. 1a34gvddskjjjfjij