Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded Visual Cryptography forSecure Transmission of Bank cheque
Yara ElmaghrabyAndrew Hesham - Nail Ezzat
Khaled El-Feky - Omar SheriefMohamed Ismail - Saleh Megahed
German University in Cairo
April 12, 2018
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Outline
1 IntroductionOnline BankingVisual cryptographyEmbedded Visual Cryptography Scheme
2 Related Works
3 Material and MethodsWorking PrincipleProposed Method using EVCS
4 Secret share
5 Embedding the secrete image in cover image
6 Proposed Methodology-EVCS
7 Conclusion
8 References
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Banking Systems
Today, banking system hascarried banking for thecustomer’s Expediency byset of services, whereauthentication plays a vitalrole.Due to rapid growth inthe field of banking systemand its services, computerconnected with web cannotbe considered to beprotected.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Banking Systems
In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:
Something the customer knows (e.g. Password,PINnumber)
Something the customer has (e.g. ATM card, Smart card)
Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Banking Systems
In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:
Something the customer knows (e.g. Password,PINnumber)
Something the customer has (e.g. ATM card, Smart card)
Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Banking Systems
In online banking system, Safety begins with the verificationprocess.Verification depends up on the following factors:
Something the customer knows (e.g. Password,PINnumber)
Something the customer has (e.g. ATM card, Smart card)
Something the customer is (e.g. bio-metric characteristicssuch as Iris recognition, fingerprint)
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Banking Systems
But in any of the above verification methods, key elements likepassword or PIN number can be hacked and misused. So aproposed new method to shield the customer information andcheck details to avoid forgery during transmission over internet.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Visual cryptography
A visual cryptography design is a cryptographic approach thatuses visual information as input, encryption and decryption isdone by using human visual system.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Visual cryptography disadvantage
The disadvantage of visual cryptography design is thateven a normal person is capable to decipher the secretimage devoid of having any cryptographic information andcomputational tools.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded Visual Cryptography Scheme
Embedded Visual Cryptography Scheme (EVCS) uses graythreshold with morphological operation for securetransmission of bank check over the network.
Initially in this method apply gray threshold values withmorphological operation and then split the input originalimage into diverse number secret share images usingconventional visual cryptography system.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded Visual Cryptography Scheme
Embedded Visual Cryptography Scheme (EVCS) uses graythreshold with morphological operation for securetransmission of bank check over the network.
Initially in this method apply gray threshold values withmorphological operation and then split the input originalimage into diverse number secret share images usingconventional visual cryptography system.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Sozan Abdulla, University of Sulaimani,Iraq.
The proposed algorithm is for color image that presents asystem which takes three pictures as an input and generatestwo images which correspond to two of the three inputpictures. The decoding requires only selecting some subset ofthese two images, making transparencies of them, and stackingthem on top of each other, so the third picture is reconstructedby printing the two output images onto transparencies andstacking them together. The reconstructed image achieved insame size with original secret image.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Mizuho nakajima, Yasushi yamaguchi,University of Tokyo, Japan.
Same as the previous one, while the previous researchesbasically handle only binary images, those establishes theextended visual cryptography scheme suitable for naturalimages. Generally, visual cryptography suffers from thedeterioration of the image quality. Those researchers alsodescribes the method to improve the quality of the outputimages. The trade-off between the image quality and thesecurity are discussed and assessed by observing the actualresults of this method. Furthermore, the optimization of theimage quality is discussed.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
N.Askari, H.M.Heys, and C.R.Moloney,University of Newfoundland, Canada
In this research, they propose a method for processing halftoneimages that improves the quality of the share images and therecovered secret image in an extended visual cryptographyscheme for which the size of the share images and therecovered image is the same as for the original halftone secretimage. The resulting scheme maintains the perfect security ofthe original extended visual cryptography approach.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Shyamalendu Kandar, Arnab Maiti,University of Jadavpur, India
The shares are generatedusing random number. Theseparation of an input imageinto n number of shares isdone by adopting randomnumber generator, which isa new technique notavailable till date.Thismethod requires very littlemathematical calculationscompared with otherexisting conventionalmethods of visualcryptography on colorimages.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Young-ChangHou, National CentralUniversity, Taiwan
The proposed method does not only preserve the benefits ofblack and white image cryptography, which develops thehuman visual system to decipher secret images withoutmathematical calculations, but also have the backwardcompatibility with the earlier results in black and white visualcryptography, This method develop every pixel of a color secretimage into a 2x2 blocks in the sharing images and keep twocolor and two transparent pixels in the block.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Sagar Kumar, Kamalendra.Gadi, JaypeeInstitute of IT, India
In this research they propose a new way of performing colorvisual cryptography using wavelet technique. Wavelettechnique is used to convert the Color Image to Gray Image.The important feature of the Visual Cryptography is decryptiondoes not require any computer and it requires lesscomputational power. The proposed model secures only onesecret image this can be extended to secure multiple secretimages. The proposed model does not produce the image ofoptimal contrast which can be enhanced.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Working Principle
Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks
pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block
The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Working Principle
Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks
pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block
The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Working Principle
Each pixel in an input image sample is divided into twoblocks with equal numbers of black and white blocks
pixel information is separated into two shares, one shareholds the pixel information of white block and other holdsthe pixel information of black block
The pixel is divided again into four shares, two holds whiteblocks and remaining two contains black blocks and so on..
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Example of OR operation by HumanVisual System
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Visual cryptography technique
An art that supports several applications:
Transmitting military orders to soldier who may have nocryptographic knowledge
Watermarking and transmitting passwords
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Visual cryptography technique
An art that supports several applications:
Transmitting military orders to soldier who may have nocryptographic knowledge
Watermarking and transmitting passwords
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded visual Cryptography scheme(EVCS)
proposed to embed the secret shares of an image to hide intocover images
Input of an EVCS: Is the secret image and the originalshare images
Output of the share image should obey the following threeconditions:
1 Any qualified subset of the shares can recuperate thesecret image
2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image
3 the shares are expressive images
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded visual Cryptography scheme(EVCS)
proposed to embed the secret shares of an image to hide intocover images
Input of an EVCS: Is the secret image and the originalshare images
Output of the share image should obey the following threeconditions:
1 Any qualified subset of the shares can recuperate thesecret image
2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image
3 the shares are expressive images
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded visual Cryptography scheme(EVCS)
proposed to embed the secret shares of an image to hide intocover images
Input of an EVCS: Is the secret image and the originalshare images
Output of the share image should obey the following threeconditions:
1 Any qualified subset of the shares can recuperate thesecret image
2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image
3 the shares are expressive images
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded visual Cryptography scheme(EVCS)
proposed to embed the secret shares of an image to hide intocover images
Input of an EVCS: Is the secret image and the originalshare images
Output of the share image should obey the following threeconditions:
1 Any qualified subset of the shares can recuperate thesecret image
2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image
3 the shares are expressive images
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Embedded visual Cryptography scheme(EVCS)
proposed to embed the secret shares of an image to hide intocover images
Input of an EVCS: Is the secret image and the originalshare images
Output of the share image should obey the following threeconditions:
1 Any qualified subset of the shares can recuperate thesecret image
2 Any forbidden subset of shares cannot get any data of thesecret image other than the size of the secret image
3 the shares are expressive images
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:
Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image
Decryption:
Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internet
Image is partitioned into different secret sharesThen embedded the secret share into cover image
Decryption:
Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret shares
Then embedded the secret share into cover image
Decryption:
Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image
Decryption:
Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image
Decryption:
Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Proposed Method using EVCS
Encryption:Gray Threshold Value with Morphological operation(GTV+MO) for safe and secure transmission of bankcheque in the internetImage is partitioned into different secret sharesThen embedded the secret share into cover image
Decryption:Hold partly covered or stacked the embedded image to getthe original image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Block diagram of Proposed Approach
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Architecture of Proposed Approach
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Creating Secret share
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Construct the Cover Image usingDithering Matrices
The proposed method, create two cover images randomlyfor hiding the secret shares which are denoted as G1 andG2
The information of share images which are S1 and S2 arecovered by G1 and G2
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Construct the Cover Image usingDithering Matrices
The proposed method, create two cover images randomlyfor hiding the secret shares which are denoted as G1 andG2
The information of share images which are S1 and S2 arecovered by G1 and G2
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Construct the Cover Image usingDithering Matrices
The benefits of coveringimage is when the qualifiedsubsets are stacked, all thedata about the original shareimages models is covered.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.
1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.
2 Choose m positions in each t sub pixels to implant m subpixels
We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.
1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.
2 Choose m positions in each t sub pixels to implant m subpixels
We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.
1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.
2 Choose m positions in each t sub pixels to implant m subpixels
We choose the selected m positions that are used forimplanting the secret information as the embeddingpositions
In order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.
1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.
2 Choose m positions in each t sub pixels to implant m subpixels
We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the same
At this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
The input of this process is the Cover images shares, Secretimage shares and m which is the pixel expansion, Assume thesize of each covering share image is pxq Pixels.
1 Split each cover image to (pxq)/t shares, Each of themhas t sub pixels.
2 Choose m positions in each t sub pixels to implant m subpixels
We choose the selected m positions that are used forimplanting the secret information as the embeddingpositionsIn order to decipher the secret image only by mounting theshares over each other, the embedding positions of all thecovering is the sameAt this point when we stack the embedded shares the mpositions that not implanted by secret sub pixels afterstacking it appears black but the positions that areimplanted by secret sub pixels recover the secret image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
In case we choose the t = m the Embedded VisualCryptography Scheme deteriorates to be VisualCryptography Scheme because all the data about thecovering shares is covered by the secret sub pixels of theshare
there are t −m sub-pixels in the covering shares S1,S2,that protect the data about the original share images G1,G2and the remaining m sub-pixels carry the secret dataabout the secret image. Hence, the smallest secret imagepixel expansion is m + 1.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
In case we choose the t = m the Embedded VisualCryptography Scheme deteriorates to be VisualCryptography Scheme because all the data about thecovering shares is covered by the secret sub pixels of theshare
there are t −m sub-pixels in the covering shares S1,S2,that protect the data about the original share images G1,G2and the remaining m sub-pixels carry the secret dataabout the secret image. Hence, the smallest secret imagepixel expansion is m + 1.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Method of embedding the secrete imagein cover image
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion2 Dilation3 Opening4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion2 Dilation3 Opening4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion
2 Dilation3 Opening4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion2 Dilation
3 Opening4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion2 Dilation3 Opening
4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Operation using Erosion
Morphological Operation: It’s a tool used to extractimage components that could be used as a representationof the image shape
Basic Morphological Operators
1 Erosion2 Dilation3 Opening4 Closing
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Morphological Erosion
It’s typically applied to binary images or gray scale images. Theeffect of this operation is to erode or decrease the area of thewhite pixels within an image.
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Resultant of Applying MorphologicalOperation
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Combination of Gray Threshold andMorphological Operation
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Conclusion
To sum up...
1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated
2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result
3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network
4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Conclusion
To sum up...
1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated
2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result
3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network
4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Conclusion
To sum up...
1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated
2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result
3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network
4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
Conclusion
To sum up...
1 the proposed embedded visual cryptography system is usedfor safe transmission of bank cheque is clearly illustrated
2 The gray threshold value with morphological operationmethods are used to protect the most significant featuresof bank cheque image and get better the result
3 The embedded visual cryptography scheme is used totransfer the bank cheque in securely over the network
4 The proposed method can be extended by using gray andcolor bank cheque images apply for EVCS
Introduction
OnlineBanking
Visualcryptography
EmbeddedVisualCryptographyScheme
RelatedWorks
MaterialandMethods
WorkingPrinciple
ProposedMethod usingEVCS
Secretshare
Embeddingthe secreteimage incover image
ProposedMethodology-EVCS
Conclusion
References
For further Reading
Feng Liu, Wei Qi Yan, June 2014, Visual Cryptography forImage Processing and Security” Theory, Methods andApplications, Springer.
Sozan Abdulla, April 2010, New Visual CryptographyAlgorithm for Colored Image, Journal of Computing,volume 2, issue 4.
Mizuho Nakajima, Yasushi Yamaguchi, Extended VisualCryptography for Natural Images.
Young-ChangHou, 2003, Visual cryptography for colorimages, Pattern Recognition Society. Published by ElsevierScience Ltd.
Ankush V.Dahat, Pallavi V.Chavan, 2016, Secret SharingBased Visual Crytography Scheme using CMY Colorspace, Procedia Computer Science.