07 Chapter1
07 Chapter1
INTRODUCTION
The Internet is fast becoming indispensable in our daily lives. The Digitalization has the
greatest potential to alter the way we live. In today’s era of the digitalized world, security is an
important concern. Security problems start to become apparent when information is being
delivered from node to node over the network. The number of threats has been increasing at a
wider rate, therefore, strong security techniques need to be deployed. Cryptography is one of the
prime techniques for providing information security. In traditional cryptographic methods,
enormous computational power and complicated algorithms are common, taking much time and
money to encode and decode a secret message. This chapter starts with an overview of
cryptography along with an introduction to the idea of visual cryptography. This research work
major focuses on secret sharing concepts using visual cryptographic aspects. Its characteristics,
various research challenges, and practical applications have been discussed here. A number of
researchers have already dug a lot in this area, but still, some open challenging research issues
need more exploration. All these critical issues which motivated us for this research work have
been discussed along with the other key points. The problem statement and the key objectives of
this research work along with research formulation have been described in details. The scope of
this research work and organization of the complete thesis have been given at the end of the
chapter.
1.1 Cryptography
Cryptography is concerned exclusively with message confidentiality. It was first
introduced when humans need a secret language for communication. It is the practice and study
of techniques for protecting the information, or message from being read. To ensure secrecy in
the communication of military leaders, diplomats and protecting information in many types of
civilian systems, encryption techniques have been used. In recent decades, the cryptography field
has expanded beyond confidentiality concerns. It includes techniques for message integrity
checking, sender/receiver identity authentication, digital signatures and secure computation,
among several others. Advancement in the traditional method of cryptography has led to the
invention of many new distinct types of technologies such as network cryptography, visual
cryptography, etc.
Today our lives are completely digitalized and security of personal information has
become an integral part of nearly everyone’s daily life. Nearly all our confidential information
has been stored in the databases of the government, banks, health care services and many others
public parties. Cryptography is used to protect the right to privacy and the right to communicate
confidentially.
Cryptography is not only used for protection of data from hackers, but it is also utilized
for providing the user authentication during communication. Symmetric cryptography,
Asymmetric cryptography, and hash functions have been commonly popular types of
cryptography for applying it to several security problems. For referring the process of encryption
and decryption following common terms have mostly been used in literature:
Plain Text: Plain text refers to the text which needs to be encrypted.
Encipher / Encryption: It is the process of converting the plain text into cipher text form
by means of a predetermined system key.
Decipher / Decryption: The process by which conversion of enciphered text to the
equivalent plain text is possible with the help of a system key.
Cryptanalysis: It refers to the attempt made for the conversion of encrypted messages to
plain text without initial knowing the encryption algorithm and/or key employed in the
encryption.
Key: It is usually a sequence of random binary digits used at the setup time in the
cryptosystem for the purpose of encrypting or decrypting the text. Sometimes the same
key is also used for producing another keys for the system.
In the past eras, various encryption methods of traditional cryptography have been used
to protect the information. The protection of visual information (e.g., sensitive picture,
handwritten notes, digital data and printed text, etc.) is a challenging security issue. It has
become an area of prime concern since last two decades after the digitalization of the world has
begun. Secret image sharing is an important research area that combines methods and
techniques, both from cryptography and image processing. It helps in protecting the visual
information.
Naor et al.[1] introduced the technique of VC in which the binary image is decomposed
into n number of shares. Figure 1.1 shows an example of share creation and recovery of a secret
image using visual cryptography. In the scheme of , shares when stacked over one another
reveals the original secret image. Naor scheme is quite suitable for a binary image. The shares
created in the original image are determined by randomly selecting pairs of sub-pixel matrices for
black and white pixels [2].
Figure 1.1: Original image, Halftone, Share 1, Share2 and Decrypted image
Visual cryptography technique is very intuitive to the user. However, it is surprising that
within the last two decades since its inception by Naor and Shamir only a few suggestions have
been made to apply it to practical problems. Naor and Pinkas [6] presented a technique to use
visual cryptography in order to protect online transactions against manipulation and Chaum et al.
[7] suggested to apply it for verification of the correctness of the outcome of an election.
In order to secure online money transfers, the user gets a numbered set of transparencies,
from the transaction server. The server sends a visual message containing the transaction data to
the user's screen, and it is encoded via visual cryptography. If the user puts the transparency with
a certain number on top of the encoded image screened person can see the message contained
within the image. When the server receives the right TAN it executes the transaction, otherwise
not. In this way, one can make banking transaction more secure in nature.
Similarly, Luo et al. [8] also explore the usage of watermarks within visual cryptography.
A digital image copyright scheme based on visual cryptography has been presented by Hwang
[9]. Embedding VC based watermarking into products is an effective way of preventing
cheating, especially in the domains where already get benefits from the use of watermarking.
Because of difficulties such as adjustment, size, and costs of special equipment, these
suggestions did not lead to applications that are used for serious purposes. But in the future,
further developments of the ideas presented in different approaches, as well as new ideas, could
spread practical applications of visual cryptography. VC in conjunction with modern day image
hatching techniques would allow the extension of VC into the currency domain, such as within
the banking industry. The use of shares within the secure printing industry should also be
considered. Scanning a share into a computer system and then digitally superimposing its
corresponding share could also be considered.
Despite the security nature of the scheme for secret sharing, VC shares lacks in security.
Many VC schemes have the problem of the artifact itself in the generated shares.
Previous related research has observed the possibility of VC cheating through different
methods. Attackers are able to complete both cheating and modification of the VC
process without being noticed by VC participants. The various factors affect the VCS
scheme before applying for any practical application, e.g. pixel expansion, contrast, no.
of shares generated, and type of shares. The major work of this thesis is focusing towards
effectively improving the security of shares created in visual cryptography based schemes
for secret sharing. Therefore the main research question of this thesis is focusing to
improve the effectiveness of VC secure share generation along with its application for
authentication in practical usage. By raising this research question and reviewing
previous related works, experiments of utilizing bit level based processing as well as
chaotic map features has been proposed.
Among the different kinds of VC, there are five significant VC schemes which are
commonly investigated and discussed [26] that are as follows: Traditional VC, Extended VC,
Dynamic VC, Color VC and Progressive VC. Traditional visual cryptography is the basic VC
scheme which utilizes only black and white pixels to encrypt binary images while the VC shares
are the random pictures without obviously visible and semantic information.
Despite the distinct encryption process in different types of VC, the basic idea of VC
encryption in all types has been based on pixel expansion. Pixel expansion indicates that one
pixel of the original secret image is represented by a number of sub-pixels in its corresponding
region on VC shares [26]. One pixel is represented by a randomly selected group of sub-pixels.
Thus, same pixels in the original secret image are possibly split into sub-pixels in the different
arrangement, which subsequently leads to the randomness of the appearance of the whole share.
Moreover, the color of a specific pixel on VC shares is determined by the predefined expansion
rules of VCS.
As for the decryption process, there are two kinds of VC revealing operations, namely,
XOR and OR. The revealing result of using XOR is better than that of OR which is, however
commonly used as the simplicity of its implementation. In OR operation, VCS result is perceived by
human visual system [1] [28]. On superimposed VC secret image, light regions are represented by
groups of white and black sub-pixels, while dark regions are filled up with only black sub-pixels.
The contrast of the light regions and dark regions is easily identified by HVS [29].
The aim of the secret sharing scheme is to improve the way secret information of highly
sensitive nature can be shared with the use of information and communication technologies and
cost effective decoding technique. Therefore, all over the world governments have been devising
their security plans to make this objective successful. Lots of interest has been generated in
accomplishing the objective of secure secret sharing due to economic and environmental issues.
Few motivating factor to work in the area of VCS has been listed hereunder.
As a powerful technique for information security, VC indicates the possibility of visually
protecting crucial secrets from the view of secret sharing [30] [26]. Therefore, VC is a
preferable security scheme for the protection of confidential documents such as bank
vault password, personal account access password, and many others.
The main advantages of VC can be seen in three aspects. The first one is that VC secret is
revealed by using only VC shares which are convenient to carry with, unlike other
cryptography methods which require complicated computations and powerful computers
for the decryption process. VC concentrates on using images as the media for
transmission of secret information. Compared to encrypt the plain text, images appear to
be more flexible in conveying secret content and have larger information storage.
The foremost benefit of using visual cryptography is that it saves excess efforts in
cryptanalysis on the part of the authorized users wanting access as no mathematical
computations are involved and decryption can be easily performed using the basic human
visual system.
With all these outstanding benefits in information hiding and great potential in the
development of both theory and application, VC has become one of the most promising
security methods in secret sharing.
As the whole process of VC is based on VC shares, the security and protection of genuine
VC shares would be required to make sure the successful revealing of the secret.
However, based on the analysis of encryption and decryption mechanism of VC, cheating
attempts are proven to be effective in VC authentication.
The lack of a strong authentication result in the loss of confidential material. In 2015,
Statistics produced by the Moscow-Pullman Daily News cites that Sensitive information
was compromised for somewhere between 4 million and 14 million federal employees. A
Study conducted by Gemalto, identity theft accounts for 64 percent of all data breaches
globally. The joint study by Assocham and Ernst & Young states the mobile platform
faces the greatest risk with mobile fraud slated to grow by 60 -65 percent in the next
decade in India alone.
With such a wide range of security applications, it is going to be quite interesting and
helpful to have VCS in security domain as prime technique. There is a need for efficient
and low-cost practical application for authentication using VCS.
1.8 Objectives
The following objectives have been set to achieve the proposed goals described above in
the problem definition:
Detailed study of various existing visual cryptography schemes for all types of images.
Development of a new algorithm on visual cryptography based approach to solve the
existing drawbacks of different techniques along with experimental verifications.
Development of secure and more general scheme for sharing the secret message.
Analyze the visual similarity between the original image and the encrypted share images
so as to check the vulnerability of shares.
The objective of the work is to find an optimal method for ensuring the security of secret
message in all the generated shares, along with high contrast reconstructed secret message. The
contributions of this thesis are a set of studies, modifications to the existing algorithm and
analysis of the designed proposed algorithms.
Along with authentication, issue of generation of secure share is equally important. This
research is based on using applicable methods for VC shares security and set up the analysis of
designing a VC scheme from the view of features.
The research work carried out here shows the findings of the literature related to visual
cryptography, its applications, and how visual cryptography can be applied in traditional form to
ensure the security of data. Different approaches have been validated and compared on the basis
of the number and type of secret images, pixel expansion after encoding, different type of
generated shares (meaningful, random, hatched, etc.).[32].
To have more insights in this area, traditional visual cryptography and random grid
technique (identified from above work) have been applied for detecting the fraud candidate.
Further, a novel authentication technique using bit plane based encryption has also been
suggested [33]. All these three mentioned techniques have been compared for their suitability.
Specifically, applicable methods for VC secure share generation in this thesis include
chaotic theory. Past research has investigated the suitability of using chaos into VC shares for
secure share scheme. To be specific, there are several benefits of using chaos theory in
authentication [34] [35]. Firstly, different from using a pseudo-random number for encryption
matrices, multiple 1-D maps can be used into shares, thereby simplifying the process of uniform
random number generation. In addition, cheaters can hardly get the information of the secret
from the prediction of the secret in shares. Further, using map has the advantage of encoding a
large scale of information into a controllable set of shares.
A chaotic system is very sensitive to changes in input parameters. Using the VC shares
generation with chaos facilitates the process to stop the artifact of the content in the shares. The
chaotic map related part of this thesis mainly concentrates on improving the share generation
algorithm process to be more practical for VC secure share. The research of a 1-D chaotic map
for the VC scheme in this thesis is due to the similarity between the need of VC secure shares
and that of a chaotic map, which is explained in chapter 4 and 5.
After analyzing the various traditional techniques and their applicability, now, our
research mainly focused on progressive visual secret sharing (PVSS) scheme which has added
advantage over the traditional approach of secret sharing schemes[37]. Here, the major efforts
have been done in the direction of secure shares generation with PVSS. The idea of progressive
visual secret sharing has been extended further by introducing logistic chaotic maps in the
algorithm for generating secure shares. After modification, the algorithm is named as Chaos
based PVSS (CB-PVSS) [38]. An improvement has also been suggested in existing block based
schemes and the modified block based scheme is named as Chaos based block progressive visual
secret sharing (CB-BPVSS) [39]. General block based scheme nature is (2, n). Further, Block
based scheme has been extended to support threshold based (k,n) block recovery using the
progressive paradigm [40]. Details of all this work have been explained in further chapters
mainly in chapter 3, 4 and 5.
Chapter 2 presents the literature survey done from the beginning for VCS. It discusses the
foundation of visual cryptography and developments in this area of research till date. This
chapter briefly outlines the different schemes proposed by the researchers in this area of study.
Here, a study of implementing VC using random grids and both OR & XOR operations with
respect to both binary and grayscale images along with different performance measures in the
VCs schemes has also been presented. In this work, the main focus is on the deterministic and
probabilistic models of visual cryptography. Performance analysis of all the existing visual
cryptographic based schemes and their features has been analyzed with a view of better insight
about the scheme and its limitation.
Chapter 3 deals with the suggestion of a novel authentication scheme called Bit-level based
visual cryptography and its implementation for the verification of a person’s identity. It also
provides a comparison of the proposed scheme with the existing techniques for authentication as
well as with other visual cryptography techniques. A design of authentication system has been
proposed for both registrations and authentication phases. At the end of the chapter,
implementation of the scheme has been discussed all the results are shown as comparison with
the existing schemes, under different types of attacks and of different file formats.
Chapter 4 consists of the cryptanalysis of progressive visual cryptography and its improvement
using chaos based random number generation. Results have been shown to exemplify the
working and observations have been made during different stages of testing the algorithms. It
also describes the role of random number generator in progressive secret sharing schemes. It
states the results at the end in a tabular and graphical form highlighting the evaluation
parameters, which can then be used as performance metrics for the same.
Chapter 5 discusses the idea of block based progressive visual cryptography and its
improvement using a chaotic map to solve the secret artifact disclosure in corresponding blocks
of the scheme. Further, a novel threshold based block recovery of the image has been suggested
to extend block based progressive scheme from (2, n) to (k, n). Experimental results, showcasing
the performance and security of designing schemes have been highlighted. The last chapter 6,
i.e. the conclusion and future direction, analyze the results, previously stated in the thesis and
hence, our observations along with scope for future work in this area. Lastly, all the references
used throughout report have been listed.