Term Paper
Term Paper
Abstract - The meaningful shares are desired in based on encrypting the secret image into ‘n’ shadow
visual cryptography (VC) because they look images and someone having all the ‘n’ images can
natural with increased efficiency and low threat decrypt the message. This scheme was known as ‘k’
of inkling of secret encryptions. The meaningful out of ‘k’ visual secret sharing.
shares are also helpful in dealing with the
management problem of the conventional VC. After further research on visual cryptography, it was
The traditional user-friendly RG-based VCs extended to k out of n visual secret sharing [3]. In
gives advantage of no pixel expansion and no this type of secret sharing someone having any k (or
need for codebook design in generating more) shares out of n shares can decrypt the message
meaningful shares. The current user-friendly but is not visible if less than k shares are stacked
RG-based VCs did not support the general (k, n) together. The original encryption problem is known
threshold VC and in these complementary shares as 2 out of 2 visual secret sharing. The encryption is
may be required. In this paper, a generalized RG- done with the help of the various algorithms and the
based VC with meaningful shares is proposed decryption is done with human visual system in the
and it is compared with the existing meaningful visual cryptography.
share generation algorithm. The proposed The secret images is composed of black and white
scheme inherits the good features of RG-based pixels. The black pixels are denoted by ‘1’ which
existing algorithms. The new feature of the represents opaqueness and white pixels are denoted
proposed scheme is that it supports the (k, n) by ‘0’ which represents darkness.
threshold and provide adaptive visual quality.
Shamir proposed a (k, n) threshold visual secret
sharing in 1979 [5] by encrypting the secret into a
I. Introduction constant coefficient of a random (k-1) degree
Visual Cryptography is the cryptographic technique polynomial. According to Shamir’s scheme the
which is used for encrypting the secret image into secret image can be reconstructed perfectly by using
shadow images so that no one, other than the desired LaGrange’s interpolation. Shamir’s polynomial-
recipient can understand the image information. The based scheme has the advantage that the secret can
shadow images are also called as shares, we can get be recovered lossless. This scheme requires only k
the input image after stacking these shares. There are shares for the reconstruction of distortion-less secret
two types of shares in VC i.e., meaningful shares and image.
non-meaningful shares.
Naor and Shamir [9] first introduced the visual
As the internet is growing very rapidly the digital cryptography in the year 1984.VC is the secret
images can be easily transmitted, obtained, and sharing scheme that allows the decryption without
manufactured by the various tools available on the any computation. In general (k, n) threshold VC
internet. Security of the images becomes a major scheme the secret image is divided into n shares and
concern as the sensitive information is hidden inside we get the decrypted by stacking any k or more than
these images. We can protect the sensitive k shares while any k-1 or less shares did not give any
information from the malicious behaviour in clue about the secret image [9]. There are various
transmission by securing these images. The security applications [12] of VC such as information hiding,
of these images can be ensured with cryptography. watermarking [13], data appending, cyber-crime,
Visual Cryptography is defined as the method of authentication, and identification and transmitting
encoding a secret image into ‘n’ shadow images so passwords.
that the information hidden inside the images cannot The next we will review the random grid-based VC
be used by some unauthorized user. The first visual and after that we introduce our proposed scheme.
cryptography technique was introduced by Moni
Naor and Adi Shamir in 1994.Their scheme was
After Naor and Shamir had introduced the VC, many it can be used in other applications apart from
researchers started finding the problems associated VCs.In this paper we have proposed a meaningful
with VC such as contrast, different formats, and RG-based VC scheme which supports (k, n)
pixel expansion. Random grid (RG)-based VC may threshold VC and it also supports adaptive visual
become the alternative method to overcome the quality. The proposed scheme is compared with one
drawbacks of halftone visual cryptography (HVC) the threshold meaningful RG –based VC given by
Yan et.al.
and extended visual cryptography (EVC). RG-based
VC is used as it has no pixel expansion and no
codebook design is required in this scheme. AFRI
and Keren [1] first proposed the RG-based VC.
According to their scheme the secret image is
encrypted into two meaningless RGs. Kafri and
Karen proposed three algorithms for encrypting the
image into RGs.A secret pixel is taken from the
secret binary image and is encrypted into the
subpixel in each of the two RGs.The sub pixels are
selected randomly form the two columns under the
certain secret pixel. There is the random selection so
that each column is selected with 50% probabilities.
Figure 2- RG based (2,2) scheme application
In that fashion the first subpixel is assigned to RG1
and the followed-up pixel is assigned to RG2 this
process follows up till the last pixel of the secret
image. So, it confirmed that individual share cannot
give any clue about the secret image. When we stack
these shares the black pixels will cover the white
pixels, and the white pixel will decode into the black II. Literature Review
or white pixel with 50% probabilities. This scheme In Visual Cryptography given the image or message,
is known as RG-based (2,2) VC. The size of the n transparencies are generated so that the original
shares is same as that of the secret image. There is image (message) is visible if any k of them are
some loss of contrast in the revealed image but we stacked together. The image remains hidden if fewer
can clearly identify the image. than k transparencies are stacked together. Each
pixel appears within n modified versions (known as
shares) per transparency. The shares are a collection
of m black and white subpixels arranged closely
together. The structure can be described as an n × m
Boolean matrix S. The structure of S can be
described thus: S = (sij)m × n where sij = 1 or 0 i.f.f.
the jth subpixel of the ith share is black or white. The
important parameters of the scheme are: m: the
number of pixels in a share. This represents the loss
in resolution from the original image to the
recovered one. α: the relative difference in the
weight between the combined shares that come from
Figure 1- RG based (2,2) VC secret pixel encryption a white and black pixel in the original image, i.e., the
loss in contrast. γ: the size of the collection of C0
and C1. C0 refers to the sub-pixel patterns in the
Previous RG-based VC does not support meaningful shares for a white pixel and C1 refers to the sub-
shares. Chen and Tsao [17] proposed a friendly RG- pixel patterns in the shares for a black pixel.
based (2,2) VC to exploit meaningful shares in VC.
Chen and Tsao ‘s scheme use the complementary
shares to achieve adjustable visual quality. This
method is not applicable for (k, n) threshold where 1.Visual Cryptography and its Types
k<n. a. Traditional Visual Cryptography
The main motivation of this paper is to propose a Secret sharing [1] is a method by which a secret can
threshold RG-based meaningful VC in which there be distributed between a group of participants,
is no pixel expansion and no codebook design so that whereby each participant is allocated a piece of the
secret. This piece of the secret is known as a share. cryptography schemes suffer mainly because of
The secret can only be reconstructed when enough pixel expansion (any pixel in the original image is
shares are combined. While these shares are expanded during the encryption process to an m×m
separate, no information about the secret can be matrix of pixels) and loss of contrast. A simple
accessed. That is, the shares are completely useless example of (2,3)-EVCS is presented. In this, they
while they are separated. Within a secret sharing refer to a corresponding VCS [1] of an EVCS [8],
scheme, the secret is divided into several shares and we mean a traditional VCS that have the same access
distributed among n persons [2][3]. When any k or structure with the EVCS. Generally, an EVCS takes
more of these persons (where k ≤ n) bring their a secret image and original share images as inputs,
shares together, the secret can be recovered. and outputs shares that satisfy the following three
However, if k - 1 persons attempt to reconstruct the conditions:
secret, they will fail. Due to this threshold scheme,
we typically refer to such a secret sharing system as 1) Any qualified subset of shares can recover the
a (k, n)-threshold scheme or k-out-of-n secret secret image;
sharing. 2) Any forbidden subset of shares cannot obtain any
information of the secret image other than the size
of the secret image;
Algorithm
IV. Implementation
Algorithm:
Input: A binary secret image S and a cover image C
both with M*N pixels, the threshold parameters
(k,n) and light transmission parameters w0 ,w1
,where 0<w0≤w1<1.
STEP2: Set 𝑏̃1= S (i, j), repeat step 3 for k-2 times,
i.e. for p=1, 2, k-2, to generate pixels b1, b2…….
bk-2, 𝑏k-1; where bx and 𝑏̃x denote the temporary
pixels x=1, 2…., n-1, n.
VI. References