62
Introduction Online Banking Visual cryptography Embedded Visual Cryptography Scheme Related Works Material and Methods Working Principle Proposed Method using EVCS Secret share Embedding the secrete image in cover image Proposed Embedded Visual Cryptography for Secure Transmission of Bank cheque Yara Elmaghraby Andrew Hesham - Nail Ezzat Khaled El-Feky - Omar Sherief Mohamed Ismail - Saleh Megahed German University in Cairo April 12, 2018

Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded Visual Cryptography forSecure Transmission of Bank cheque

Yara ElmaghrabyAndrew Hesham - Nail Ezzat

Khaled El-Feky - Omar SheriefMohamed Ismail - Saleh Megahed

German University in Cairo

April 12, 2018

Page 2: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Outline

1 IntroductionOnline BankingVisual cryptographyEmbedded Visual Cryptography Scheme

2 Related Works

3 Material and MethodsWorking PrincipleProposed Method using EVCS

4 Secret share

5 Embedding the secrete image in cover image

6 Proposed Methodology-EVCS

7 Conclusion

8 References

Page 3: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Banking Systems

Today, banking system hascarried banking for thecustomer’s Expediency byset of services, whereauthentication plays a vitalrole.Due to rapid growth inthe field of banking systemand its services, computerconnected with web cannotbe considered to beprotected.

Page 4: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Banking Systems

In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:

Something the customer knows (e.g. Password,PINnumber)

Something the customer has (e.g. ATM card, Smart card)

Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)

Page 5: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Banking Systems

In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:

Something the customer knows (e.g. Password,PINnumber)

Something the customer has (e.g. ATM card, Smart card)

Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)

Page 6: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Banking Systems

In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:

Something the customer knows (e.g. Password,PINnumber)

Something the customer has (e.g. ATM card, Smart card)

Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)

Page 7: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Banking Systems

But in any of the above verification methods, key elements likepassword or PIN number can be hacked and misused. So aproposed new method to shield the customer information andcheck details to avoid forgery during transmission over internet.

Page 8: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Visual cryptography

A visual cryptography design is a cryptographic approach thatuses visual information as input, encryption and decryption isdone by using human visual system.

Page 9: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Visual cryptography disadvantage

The disadvantage of visual cryptography design is thateven a normal person is capable to decipher the secretimage devoid of having any cryptographic information andcomputational tools.

Page 10: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded Visual Cryptography Scheme

Embedded Visual Cryptography Scheme (EVCS) uses graythreshold with morphological operation for securetransmission of bank check over the network.

Initially in this method apply gray threshold values withmorphological operation and then split the input originalimage into diverse number secret share images usingconventional visual cryptography system.

Page 11: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded Visual Cryptography Scheme

Embedded Visual Cryptography Scheme (EVCS) uses graythreshold with morphological operation for securetransmission of bank check over the network.

Initially in this method apply gray threshold values withmorphological operation and then split the input originalimage into diverse number secret share images usingconventional visual cryptography system.

Page 12: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Sozan Abdulla, University of Sulaimani,Iraq.

The proposed algorithm is for color image that presents asystem which takes three pictures as an input and generatestwo images which correspond to two of the three inputpictures. The decoding requires only selecting some subset ofthese two images, making transparencies of them, and stackingthem on top of each other, so the third picture is reconstructedby printing the two output images onto transparencies andstacking them together. The reconstructed image achieved insame size with original secret image.

Page 13: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Mizuho nakajima, Yasushi yamaguchi,University of Tokyo, Japan.

Same as the previous one, while the previous researchesbasically handle only binary images, those establishes theextended visual cryptography scheme suitable for naturalimages. Generally, visual cryptography suffers from thedeterioration of the image quality. Those researchers alsodescribes the method to improve the quality of the outputimages. The trade-off between the image quality and thesecurity are discussed and assessed by observing the actualresults of this method. Furthermore, the optimization of theimage quality is discussed.

Page 14: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

N.Askari, H.M.Heys, and C.R.Moloney,University of Newfoundland, Canada

In this research, they propose a method for processing halftoneimages that improves the quality of the share images and therecovered secret image in an extended visual cryptographyscheme for which the size of the share images and therecovered image is the same as for the original halftone secretimage. The resulting scheme maintains the perfect security ofthe original extended visual cryptography approach.

Page 15: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Shyamalendu Kandar, Arnab Maiti,University of Jadavpur, India

The shares are generatedusing random number. Theseparation of an input imageinto n number of shares isdone by adopting randomnumber generator, which isa new technique notavailable till date.Thismethod requires very littlemathematical calculationscompared with otherexisting conventionalmethods of visualcryptography on colorimages.

Page 16: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Young-ChangHou, National CentralUniversity, Taiwan

The proposed method does not only preserve the benefits ofblack and white image cryptography, which develops thehuman visual system to decipher secret images withoutmathematical calculations, but also have the backwardcompatibility with the earlier results in black and white visualcryptography, This method develop every pixel of a color secretimage into a 2x2 blocks in the sharing images and keep twocolor and two transparent pixels in the block.

Page 17: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Sagar Kumar, Kamalendra.Gadi, JaypeeInstitute of IT, India

In this research they propose a new way of performing colorvisual cryptography using wavelet technique. Wavelettechnique is used to convert the Color Image to Gray Image.The important feature of the Visual Cryptography is decryptiondoes not require any computer and it requires lesscomputational power. The proposed model secures only onesecret image this can be extended to secure multiple secretimages. The proposed model does not produce the image ofoptimal contrast which can be enhanced.

Page 18: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Working Principle

Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks

pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block

The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..

Page 19: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Working Principle

Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks

pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block

The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..

Page 20: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Working Principle

Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks

pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block

The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..

Page 21: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Example of OR operation by HumanVisual System

Page 22: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Visual cryptography technique

An art that supports several applications:

Transmitting military orders to soldier who may have nocryptographic knowledge

Watermarking and transmitting passwords

Page 23: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Visual cryptography technique

An art that supports several applications:

Transmitting military orders to soldier who may have nocryptographic knowledge

Watermarking and transmitting passwords

Page 24: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded visual Cryptography scheme(EVCS)

proposed to embed the secret shares of an image to hide intocover images

Input of an EVCS: Is the secret image and the originalshare images

Output of the share image should obey the following threeconditions:

1 Any qualified subset of the shares can recuperate thesecret image

2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image

3 the shares are expressive images

Page 25: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded visual Cryptography scheme(EVCS)

proposed to embed the secret shares of an image to hide intocover images

Input of an EVCS: Is the secret image and the originalshare images

Output of the share image should obey the following threeconditions:

1 Any qualified subset of the shares can recuperate thesecret image

2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image

3 the shares are expressive images

Page 26: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded visual Cryptography scheme(EVCS)

proposed to embed the secret shares of an image to hide intocover images

Input of an EVCS: Is the secret image and the originalshare images

Output of the share image should obey the following threeconditions:

1 Any qualified subset of the shares can recuperate thesecret image

2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image

3 the shares are expressive images

Page 27: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded visual Cryptography scheme(EVCS)

proposed to embed the secret shares of an image to hide intocover images

Input of an EVCS: Is the secret image and the originalshare images

Output of the share image should obey the following threeconditions:

1 Any qualified subset of the shares can recuperate thesecret image

2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image

3 the shares are expressive images

Page 28: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Embedded visual Cryptography scheme(EVCS)

proposed to embed the secret shares of an image to hide intocover images

Input of an EVCS: Is the secret image and the originalshare images

Output of the share image should obey the following threeconditions:

1 Any qualified subset of the shares can recuperate thesecret image

2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image

3 the shares are expressive images

Page 29: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:

Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image

Decryption:

Hold partly covered or stacked the embedded image to getthe original image

Page 30: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internet

Image is partitioned into different secret sharesThen embedded the secret share into cover image

Decryption:

Hold partly covered or stacked the embedded image to getthe original image

Page 31: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret shares

Then embedded the secret share into cover image

Decryption:

Hold partly covered or stacked the embedded image to getthe original image

Page 32: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image

Decryption:

Hold partly covered or stacked the embedded image to getthe original image

Page 33: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image

Decryption:

Hold partly covered or stacked the embedded image to getthe original image

Page 34: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Proposed Method using EVCS

Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image

Decryption:Hold partly covered or stacked the embedded image to getthe original image

Page 35: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Block diagram of Proposed Approach

Page 36: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Architecture of Proposed Approach

Page 37: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Creating Secret share

Page 38: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Construct the Cover Image usingDithering Matrices

The proposed method, create two cover images randomlyfor hiding the secret shares which are denoted as G1 andG2

The information of share images which are S1 and S2 arecovered by G1 and G2

Page 39: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Construct the Cover Image usingDithering Matrices

The proposed method, create two cover images randomlyfor hiding the secret shares which are denoted as G1 andG2

The information of share images which are S1 and S2 arecovered by G1 and G2

Page 40: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Construct the Cover Image usingDithering Matrices

The benefits of coveringimage is when the qualifiedsubsets are stacked, all thedata about the original shareimages models is covered.

Page 41: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.

1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.

2 Choose m positions in each t sub pixels to implant m subpixels

We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image

Page 42: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.

1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.

2 Choose m positions in each t sub pixels to implant m subpixels

We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image

Page 43: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.

1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.

2 Choose m positions in each t sub pixels to implant m subpixels

We choose the selected m positions that are used forimplanting the secret information as the embeddingpositions

In order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image

Page 44: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.

1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.

2 Choose m positions in each t sub pixels to implant m subpixels

We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the same

At this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image

Page 45: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.

1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.

2 Choose m positions in each t sub pixels to implant m subpixels

We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image

Page 46: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

In case we choose the t = m the Embedded VisualCryptography Scheme deteriorates to be VisualCryptography Scheme because all the data about thecovering shares is covered by the secret sub pixels of theshare

there are t −m sub-pixels in the covering shares S1,S2,that protect the data about the original share images G1,G2and the remaining m sub-pixels carry the secret dataabout the secret image. Hence, the smallest secret imagepixel expansion is m + 1.

Page 47: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

In case we choose the t = m the Embedded VisualCryptography Scheme deteriorates to be VisualCryptography Scheme because all the data about thecovering shares is covered by the secret sub pixels of theshare

there are t −m sub-pixels in the covering shares S1,S2,that protect the data about the original share images G1,G2and the remaining m sub-pixels carry the secret dataabout the secret image. Hence, the smallest secret imagepixel expansion is m + 1.

Page 48: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Method of embedding the secrete imagein cover image

Page 49: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion2 Dilation3 Opening4 Closing

Page 50: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion2 Dilation3 Opening4 Closing

Page 51: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion

2 Dilation3 Opening4 Closing

Page 52: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion2 Dilation

3 Opening4 Closing

Page 53: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion2 Dilation3 Opening

4 Closing

Page 54: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Operation using Erosion

Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape

Basic Morphological Operators

1 Erosion2 Dilation3 Opening4 Closing

Page 55: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Morphological Erosion

It’s typically applied to binary images or gray scale images. Theeffect of this operation is to erode or decrease the area of thewhite pixels within an image.

Page 56: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Resultant of Applying MorphologicalOperation

Page 57: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Combination of Gray Threshold andMorphological Operation

Page 58: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Conclusion

To sum up...

1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated

2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result

3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network

4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS

Page 59: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Conclusion

To sum up...

1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated

2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result

3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network

4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS

Page 60: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Conclusion

To sum up...

1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated

2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result

3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network

4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS

Page 61: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

Conclusion

To sum up...

1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated

2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result

3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network

4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS

Page 62: Embedded Visual Cryptography for Secure Transmission of ......A visual cryptography design is a cryptographic approach that uses visual information as input, encryption and decryption

Introduction

OnlineBanking

Visualcryptography

EmbeddedVisualCryptographyScheme

RelatedWorks

MaterialandMethods

WorkingPrinciple

ProposedMethod usingEVCS

Secretshare

Embeddingthe secreteimage incover image

ProposedMethodology-EVCS

Conclusion

References

For further Reading

Feng Liu, Wei Qi Yan, June 2014, Visual Cryptography forImage Processing and Security” Theory, Methods andApplications, Springer.

Sozan Abdulla, April 2010, New Visual CryptographyAlgorithm for Colored Image, Journal of Computing,volume 2, issue 4.

Mizuho Nakajima, Yasushi Yamaguchi, Extended VisualCryptography for Natural Images.

Young-ChangHou, 2003, Visual cryptography for colorimages, Pattern Recognition Society. Published by ElsevierScience Ltd.

Ankush V.Dahat, Pallavi V.Chavan, 2016, Secret SharingBased Visual Crytography Scheme using CMY Colorspace, Procedia Computer Science.