Extended Embedded Visual Cryptography Schemes

Embed Size (px)

Citation preview

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    1/17

    UNDER THE GUIDANCE OFMRS. PUSHPA MOHAN

    BY:

    MD . A D NA N A HMA D 1HK 07CS041R ID D HIPR A TIM MITR A 1HK 07CS069

    NA SIR U D D IN A HME D 1HK 08CS05 2

    Embedded Extended Visual

    Cryptography Schemes

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    2/17

    Motivation

    In cryptography, encryption and decryption of text messages uses different

    types of cryptographic algorithms like RSA , Diffie Hellman, Hash

    algorithms.

    These algorithms are time-consuming.

    Our idea is to secure the messages from the third party following the processof encryption and decryption with low complexity and computational process.

    Our project is based on image cryptography (visual cryptography). In this no

    such kind of algorithms are used.

    In visual cryptography the transparencies are used to avoid the text from third

    party . Usually after decryption the image quality gets reduced and the size of the

    image is double the actual image. Our main focus is to improve the image

    quality and the size of the image.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    3/17

    Introduction

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    4/17

    Generation Of Transparencies

    Each white pixel in the original logo is split into two same size blocks that havehalf black and white pixels.

    When these two blocks are overlaid, they align exactly, so the result is a light-colored block (with half black and half white pixels).

    When these two blocks are overlaid, the result is completely black block.

    The decryption of images depends on the shares(trasparencies). But it reconstructsthe images with some losses in contrast and width of the images.

    In 2 out of 2 cryptography scheme, secret gray scale image is encoded. Each pixel(p) of secret image (SI) can be split into two sub-pixels in each share. If one of the

    pixel (p) is white, adjacent pixel is black. Each pixel has 50% probability of thegray scale colors.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    5/17

    Generation Of Transparencies

    Each pixel of the image is divided into smaller blocks. There are always thesame number of white (transparent) and black blocks.

    If a pixel is divided into two parts, there are one white and one black block. If

    the pixel is divided into four equal parts, there are two white and two blackblocks.

    If the pixels of layer 1 and 2 are inverted or opposite, the overlaid version willbe completely black. This is an information pixel.

    Binary values -1 is black and 0 is white.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    6/17

    Sharing Of

    Pixels

    White pixels contains

    no data whereas theblack pixels containsthe data.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    7/17

    HALFTONE VISUAL CRYPTOGRAPHY

    Sharing of images uses two basic principles. They are blue noise dithering and

    void and cluster algorithm.

    Let P = {1,2,.n} be a set of elements called participants, a visual

    cryptography scheme for a setPofnparticipants.

    Each participant inPreceives one share. Let 2Pdenote the set of all subsets of

    P and let GQualified= 2P and GForbidden = 2P, where GQualified

    GForbidden = .

    The void and cluster algorithm uses a filter to determine the locations of voids

    and clusters in the halftone images.

    The halftoning technique is used to convert the grey-scale image to binaryimage.

    In halftone VC, the original image for each share is divided into cells of size

    Q1Q2.

    The secret image is clearly generated but the relative contrast of the image will

    have 1/16th

    loss as compared to the original image. 10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    8/17

    Base Paper

    Algorithm

    HalftoningProcess

    Input: The c x d dithering matrix D and a pixelwith gray-level g in input image I.

    Output: The halftoned pattern at the position of

    the pixel

    For i=0 to c-1 do

    For j=0 to d-1 to do

    If g

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    9/17

    Base Paper

    Algorithm

    EmbeddingProcess

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    10/17

    Proposed Method

    In halftone reconstruction, the quality of the image gets reduced proportionally to the

    width of the image. Image quality depends upon the halftone cell size q.

    In our project, we are going to use compression and filters to improve the quality of the

    image.

    LZW data compression algorithm is a powerful technique for lossless data compression

    that gives high compression efficiency for images.

    Lossless compression reduces the number of secret information pixels, which have to

    be distributed homogenously in halftone shares and increases the quality of halftoneshares as well as reconstructed image and computing the complexity is also reduced.

    The process for compressing the gray scale image is done using the method of Error

    diffusion method.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    11/17

    Proposed Method

    The method used to implement is as per the following process:

    1. Select the grey-scale image.

    2. Apply the LZW compression technique for the grey-scale image.

    3. Prepare the dictionary for the gray scale images.

    4. In dictionary replace strings of characters with a Single code.5. Calculations are done by applying dynamic Huffman coding.

    6. In compression of grey-scale image select the secret Information pixels.

    7. Then generate halftone shares using error diffusion Method.

    8. Filter process is applied for the output grey-scale image.

    Filters are used to improve the quality of reconstructed image to minimize

    the noises for sharpening the input secret image.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    12/17

    Visual Cryptography using Error Diffusion

    To produce halftone shares that carry significant visual information, Zhou and Arce

    recently developed halftone visual cryptography (HVC) based on the principle of void

    and cluster dithering.

    Compared with EVC, the image quality of the shares is greatly improved and the

    reconstructed image contains much less cross interference from the shares.

    The void and cluster algorithm is used to choose the pixels, that are to be modified may

    make the positions of the modified pixels dependent on the original halftone image.

    In this HVC method, pixels that carry the secret image information are predeterminedbefore a halftone share is generated.

    Error diffusion is simple and widely used. Halftone methods improve the image quality

    and reduce the computational complexity.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    13/17

    Modules Used

    Interface design using Applet frame work

    Visual cryptography implementation

    Encoding

    Decoding

    Creating Transparencies

    Un-hiding Image from Transparency

    Testing and integration

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    14/17

    Conclusion

    The image quality depends on the halftone cell.

    Compression technique is used for lossless image quality and information. LZW

    method uses of technique that is dictionary based compression algorithm.

    The selection of minimum number of secret information pixels and non

    information pixels then becomes easier for the generation of halftone and shares.

    The quality of image is quite high as compared to the other techniques, security

    analysis is also little high. The computational complexity is minimized.

    In visual cryptography, the supported image formats are .PNG, .GIF and .JPEG.

    Visual cryptography is used in bank application, election voting etc.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    15/17

    Work Done And Work To Be Done

    Work done so far :-

    1. Designing of low level and high level design.

    Work to be done :-

    1. Implementation of all the remaining modules.

    2. Testing and integration.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    16/17

    Reference

    Feng Liu and Chuankun Wu , Embedded Extended Visual Cryptography

    Schemes , IEEE Transactionson information forensics and security, Vol.6, No.

    2, June 2011.

    10-05-2013CSE@HKBKCE

  • 7/30/2019 Extended Embedded Visual Cryptography Schemes

    17/17

    THANK YOU

    10-05-2013CSE@HKBKCE