Information Technology BY A.Anil (006-09-5001) R.Gaurav Singh (006-08-5012)
Information Technology BY A.Anil (006-09-5001) R.Gaurav Singh (006-08-5012)
CERTIFICATE
This is to certify that the project report entitled Multipixel Visual Cryptography for Color Images is a bonafide work done by the students A.Anil and R.Gaurav Singh in partial fulfillment of the requirement for B.E 4/4 semister-2(IT) of Osmania University, Hyderabad during 2011-2012.
ACKNOWLEDGEMENTS
We are extremely grateful to our project guide for excellent guidance for the course of the project .We are grateful to our guide for providing all the possible help and constructive suggestions to sort out the problems that arose during the work.
We are grateful to the management and the principal of Vasavi College of Engineering for providing quality education with excellent infrastructure.
We are grateful to Mrs.N.Vasantha, H.O.D., Dept. of I.T., for her encouragement and guidance .We express our sincere thanks to her genial mentoring.
Abstract: Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Both transparent images/layers are required to reveal the information. Using secret sharing concepts, the encryption procedure encrypts a secret image into the so-called shares which are noise-like secure images which can be transmitted or distributed over an unsecure communication channel. Using the properties of the human visual system to force the recognition of a secret message from overlapping shares, the secret image is decrypted without additional computations and any knowledge of cryptography. Any visual secret information (pictures, text, etc) is considered as image and encryption is performed using simple algorithm to generate n copies of shares depending on type of access structure schemes. The simplest access structure is the 2 out of 2 scheme where the secret image is encrypted into 2 shares and both needed for a successful decryption. These shares are random dots without revealing the secret information. Visual cryptographic solutions operate on binary or binaries inputs. Therefore, natural (continuous-tone) images must be first converted into halftone images by using the density of the net dots to simulate the original gray or color levels in the target binary representation. Here, a halftone image is made up of a series of dots rather than a continuous tone. These dots can be different sizes, different colors, and sometimes even different shapes. Larger dots are used to represent darker, denser areas of the image, while smaller dots are used for lighter areas. Then, the halftone version of the input image is used instead of the original secret image to produce the shares. The decrypted image is obtained by stacking the shares together. Existing System: Images are manipulated by the attackers in the network. Confidential Images has no means to be secured when they are transmitted over the network.
In the traditional visual cryptography schemes, only one piece of image was encoded during encryption. And each of the shares that are generated was shown as a disorganized image. Due to the capacity of encrypted information, these schemes have few applications and because of the disorganized image share, they are easily suspected by hacker. The generated shares are not meaningful.
Proposed System:
Visual Cryptography for color images to generate two meaningful shares. Some filters are proposed for better visual quality of recovered image. The input image is decomposed into three channels of Cyan, Magenta and Yellow by using equation. Error Diffusion produces halftone of much higher quality than other halftone. Halftone is applied on each monochrome image. It is applied on each halftone channel to generate shares. There will be two shares for each halftone. A multi-pixel non-expanded scheme for color images introduced which can encode more than one pixel for each run resulting same size of shares as secret image. A new simple watermarking algorithm is proposed to generate meaningful shares. Decryption is achieved by stacking the shares. In case of black pixel, overlaying two rows of M1 results in four black bits, and reveals the information, where as for the white pixel, stacking the two rows of M0 results in two black and two white bits, and thus introduces noise.
Table of Contents
1. Motivation 2. Introduction 3. Secret Sharing Schemes 4. Experiment Result 5. Improvement Methods 6. Conclusion 7. Future Work 8. Reference
1 Motivation
The traditional secret sharing scheme can share secret among a group of members according to some formulas, such as polynomial or a set of equations. While surfing the Internet, we found a novel way to sharing a secret by embedding information into several images. To retrieve the concealed information, all we need to do is stake some of these images and then we will see the secret appear before our eyes. This puzzle-like structure attracts our attention, and we also eager to know the specific implementation methods. Therefore, we want to study and implement the visual secret sharing schemes.
p = 0.5
p = 0.5
p = 0.5
c1=
0 1
1 0
1
c0 =
0 0
amplitude of the two sound waves increases, and so does the volume. On the contrary, the volume decreases while the phase difference is . The transformation is illustrated below.
In the Fig.2.[2], a sequence of plaintext message (0 0 1 1) is transformed into share1 and share2 using the triangle wave cover sound. In the DHQ scheme, two shares are constructed with the employment of a wave of cover sound. Therefore, [log2n] cover sound waves are used while producing n shares. What is more, the scheme is only suitable for (2, n) ASS. Cadence ASS The scheme could be mapped to VSS. Instead of the volume in the DHQ, the number of cadences within a time unit is used to represent the information of a bit in this scheme. If the number of cadences is larger than the threshold, a 1 is embedded, and vice versa. In (t, n) ASS scheme, a variable r is added to control how many pulses compose a time unit. Considering a (2, 2)8, tow kinds of rhythms are produced by a cover sound wave. These two rhythms, such as Ra and Rb, would generate two voices at the last pulse.
The matrix [Ra Ra, Rb Rb] is used for embedding a 0, and [Ra Rb, Rb Ra] is for a 1. According to this principle, when playing the two shares shown below at the same time, a message (1 0 0 1) is revealed.
4 Experiment Result
Figure.6: shadow 1
Figure.7: shadow 2
The secret information is hidden into two shadows in Figure.6 and Figure.7. Put the two shadows together, the secret message could be recognized from the reconstructed image, which is in Figure.8. In the reconstructed image, a pixel is divided into four blocks. Two of the four blocks are randomly chosen to be black if the pixel should be white while all of the four blocks are colored black if the pixel should be black.
Figure.9: shadow 1
Figure.10: shadow 2
The secret information is hidden into two shadows in Figure.9 and Figure.10. What is the difference between these two shadows and Figure.6/Figure.7 is that these two shadows contain some information on its own, not only a picture of mosaic. Put the two shadows together, the secret message could be recognized from the reconstructed image, which is in Figure.11. In the shadows, a pixel is divided into four blocks. Two of the four blocks are randomly chosen to be black if the pixel should be white while three of the four blocks are randomly chosen to be black if the pixel should be black. However, after overlapping the two shadows, three of the four blocks are black if the pixel should be white while all of the four blocks are colored black if the pixel should be black. 2. Visual secret sharing with (2, 4) scheme:
Figure.12: shadow 1
Figure.13 shadow 2
The secret information is hidden into four shadows. Put arbitrary two of the four shadows, say, Figure.12 and Figure.13, together, the secret message could be recognized from the reconstructed image, which is in Figure.14. If three or four shadows are put together, the color of reconstructed image would be darker and the secret information in it would become clearer. Figure.15 is the reconstructed image after overlapping all of the four shadows.
Figure.16: shadow 1
Figure.17: shadow 2
Figure.18: shadow 3
The secret information is hidden into three shadows. Put all of the three shadows, Figure.16 and Figure.17 and Figure.18, together, the secret message could be recognized from the reconstructed image, which is in Figure.19. Attention. There would be no information leakage while putting only two of the three shadows together.
Figure.20: shadow 1
Figure.21: shadow 2
Figure.26: reconstructed 3
There is not only one secret image imbedded in the shadows. A hierarchical structure makes the secrets appear in a special time pattern. The first secret information, Figure.22, would be seen after putting the first two shadows, Figure.20 and Figure.21, together. Adding the third shadow, Figure.23, to Figure.22, the second secret information would be released, which is in Figure.24. In the end, the last shadow in Figure.25 is put on the second secret information image and then the final secret information would be seen in the last reconstructed image, Figure.26.
5 Improvement Methods
p = 0.25
p = 0.25
p = 0.25
p = 0.25
p=1
Figure 27. An illustration of inversing scheme T = s1 + s2 and T = s1 + s2 s1, s2 are two shares of a general (2,2) VSS schemes. s1 and s2 are another run of (2,2) shares. inv() denotes inversing operation. We can straightforwardly understand that only 1/2 white pixels will be reconstructed to a mix-color block. The others are perfectly white or perfectly black. After showing this (k, n) scheme that white pixels are almost perfectly reconstructed in addition to the perfect reconstruction of black pixels, they next show how to convert a perfect black (k, n)(with reversing) into a perfect white (k, n)-VCS with reversing. Thirdly, they show a perfect black VCS for any monotone access structure and to colored and grey level images.
6 Conclusion
In this final project, we survey and implement some visual secret sharing schemes on simple black and white images. The feature of VSS is indeed attractive. However, we also experience personally some dramatic weakness of VSS while coding the program. Fortunately, many promising new schemes are continuously proposed in order to solve the disadvantages of VSS / ASS. To sum up, following is a list of advantages and disadvantages: Advantages Interesting easily decode(using human eyes or ears) simple decode operations such as addition, XOR and inversing can be done on ability-restricted machines Disadvantages For VSS, position accuracy is required; for ASS, time accuracy. image contrast decreases (VSS) image expansion (VSS)
7 Future Work
Visual / audio cryptography is indeed an attractive field which is worth studying. In the future, we want to survey VSS schemes of gray scale and color images, and extend the capability of our program such that suitable for any kinds of input images. Besides, we can try to figure out some refinement methods for current weaknesses in VSS and ASS.
8 Reference
[1] M. Naor and A. Shamir, Visual cryptography, Advances in CryptographyEUROCRYPT94, Perugia, Italy, pp. 1-12, May 1994. [2] Y. Desmedt, S. Hou and J. Quisquater, Audio and optical cryptography, in Advances in Cryptology-Asiacrypt'98, Springer-Verlag LNCS, pp. 392-404. [4] Chen-Chi Lin, Chi-Sung Laih, and Ching-Nung Yang, "New audio secret sharing schemes with time division technique," Journal of Information Science and Engineering, Vol.19 No.4, pp. 605-614 [5] G. Ateniese, C. Blundo, A. De Santis, D. R. Stinson, Extended capabilities for visual cryptography Theoretical Computer Science, Vol. 250 , Pages: 143 161 [6] Ching-Nung Yang, New visual secret sharing schemes using probabilistic method Pattern Recognition Letters, Volume 25, Pages: 481 494, Year of Publication: 2004 [7] Ching-Nung YANG and Tse-Shih CHEN, Size-Adjustable Visual Secret Sharing Schemes, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2005 E88-A(9):2471-2474; doi:10.1093/ietfec/e88-a.9.2471 [8] Duong Quang Viet and Kaoru Kurosawa, Almost Ideal Contrast Visual Cryptography with Reversing, CT-RSA 2004, LNCS 2964, Springer, pp.353-365 (