3 10 1 PB
3 10 1 PB
1. Electrical Engineering Department, Faculty of Science and Engineering, University of Nusa Cendana, Jl Adisucito,
Penfui, Kupang, 85000, Indonesia
2. Mathematics Department, Faculty of Science and Engineering, University of Nusa Cendana, Jl Adisucito, Penfui,
Kupang, 85000, Indonesia
Abstract
The advance of computer security technology has led to the invention of many cryptography
algorithms. Visual Cryptography is a cryptography technique that needs no cryptographic
computation in decoding. To encode a secret image, the image is encrypted to several transparent
shares. In order to retrieve the secret image shares are stacked on top of each other. This paper
describes a technical implementation of this algorithm on a square black and white image for VC2,2
Scheme and VC3,3 Scheme. The result shows that the model works well with an image that contains
text.
7
Jurnal Media Elektro , Vol. 1, No. 1, April 2012 ISSN 9772252- 669007
white sub-pixels, with Thus, if for a given white pixel from the original image
every share is picked up from C0, condition (1) ensures
m = 2n-1 (1) that the pixel will be greater than the threshold d and
recognized as white once k shares stacked. For black pixel
A matrix S (size n x m) is used to describe the structure opposite condition holds if for every share S is chosen
using the rule described in equation (2) from C1. Those properties are called contrast, whereas
property (3) is called security, because it is not possible to
{ (2) decide whether the pixel is black or white when less that n
shares are available.
The solution of this model is stored in two matrices (C 0, In a VC2,2 case, the secret image is encrypted into two
C1). To construct C0 and C1 in this implementation, we shared image and both shares are required in decryption
simplify the rules in [2], such that: process. While according to equation (1), using 2 subpixels
1. For any matrix S in C0 the “or” all required per pixel in the original image is enough, in this
shares will satisfy H(V)<m implementation, each pixels in the original image will be
2. For any S in C1 the “or” V of any k of then rows encrypted into 4 subpixels to maintain the aspect ratio of
of S will satisfy H(V) = m the image. C0 and C1 are generated by randomly picking
3. For any subset of required shares, the “or(s)” of the shares in Figure 1. When the pixel in the original
some or all the subset will contain same image is white the same subpixels from the same shares
matrices with same frequency. will be used for C0 and C1. Opposite condition is applied
for a black pixel.
8
Jurnal Media Elektro , Vol. 1, No. 1, April 2012 ISSN 9772252- 669007
( )
( ) { (3)
( ) Image Creation
Share
Share11 Share
Share22
In the description process, human eyes will interpret the
gray area (H(v) <m ) as white pixel and the black area as Encrypted Images
Encrypled images
black pixel.
Extending the model of VC2,2 we can generate C0 and C1
matrices for VC3,3 where the secret images is encrypted Figure 3 Encryption Process
into 3 shares. Each pixel will be encrypted into m =23-1=4.
Start
[ ]
For i,j=0:m
[ ] (4)
Gray Scale Image
Read Pixels
GS
The or-ed of the three rows in C1 will have H(v) = 4 GS(i,j)
which is equal to m, while in C0 will have H(v) = 3 which
is less than m. These properties satisfy condition (1) and
(2). Furthermore the or-ed of less than three rows in C0
and C1 will have same H(v) which satisfy condition (3). GS(i,j)>128 Y BW(I,j)=1
9
Jurnal Media Elektro , Vol. 1, No. 1, April 2012 ISSN 9772252- 669007
Figure 7 and figure 8 shows the result of encryption and 3 in Figure 7 look random for human sight and by having
decryption in VC3,3 schemes. Share 1, share 2 and share only one share, one can not reveal the original image.
10
Jurnal Media Elektro , Vol. 1, No. 1, April 2012 ISSN 9772252- 669007
Share 2 Share 3
11
Jurnal Media Elektro , Vol. 1, No. 1, April 2012 ISSN 9772252- 669007
4. Discussion 5. Summary
The result shows that the model works perfectly in images In this paper we have discussed the implementation of
that contain text. The contrast between the white pixel and Visual Cryptography technique in a BW image. We
black pixel in the decrypted image is easily construct two implementations for VC2,2 and VC3,3
distinguishable by human eyes. In non-text images, the schemes.
contrast between black and white pixels in the decrypted
is not very clear for human sight. The model works properly for images that contain text.
For non-text images, the contrast of black and white
The low quality of the original BW image is the main pixels is not very obvious for human sight due to the low
factor of the problem in non-text images. Converting a quality of BW image.
grayscale pixel into a BW image decreases the quality of
the image to 1/28 of the original image. Adding noise to
the white pixel is damage the quality even more. REFERENCES
The result shown in section 3 also confirms that brute [1] William Stalling. 2011 Network Security Essential:
force attack for visual cryptography cost more than doing Application and Standards, Prentice Hall.
so in other cryptography technique. Most technique uses [2] M. Naor and A. Shamir. 1994. Visual Cryptography.
the key that much smaller than the message. Here the in Proc. Advances in Cryptology. vol. 950, LNCS,
attackers have to deal with the key that actually bigger pp. 1-12.
than the original message. [3] G. Ateniese, C. Blundo, A. De Santis, and D.R.
Stinson. 1996. Visual Cryptography for General
Figure 5 and Figure 6 shows that the 250x250 pixel Access Structures. Inf. Comput. vol. 129, no. 2, pp.
original image is encrypted into two 500x500 pixel 86-106.
shares. When an attacker only have one share, to revealed [4] C.-N. Yang and C.-S. Laih. 1999. Some New Types
the original image he need 2(500)(500) tries, or have the key of Visual Secret Sharing Schemes. in Proc. Nat.
strength of 250000 bit key. Moreover for general k x k Computer Symp. vol. 3, pp. 260-268.
pixel secret image in VC2,2 scheme the attacker need [5] W.-G. Tzeng and C.-M. Hu. 2002. A New Approach
24(k)(k) tries. The number will expand exponentially when for Visual Cryptography. Design, Codes and
we add more shares and or use larger image. Cryptography. 27,207-227.
12