0% found this document useful (0 votes)
3 views

CSS PRESENTATION

The document presents a study on the implementation and analysis of various visual cryptographic techniques aimed at protecting sensitive data, particularly in defense and space exploration sectors. It evaluates the effectiveness of these methods, highlighting the superiority of extended visual cryptography with general access structures for maintaining data integrity and confidentiality. The findings suggest that ongoing research is essential for refining these techniques and addressing emerging security challenges.

Uploaded by

crce.9598.ce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

CSS PRESENTATION

The document presents a study on the implementation and analysis of various visual cryptographic techniques aimed at protecting sensitive data, particularly in defense and space exploration sectors. It evaluates the effectiveness of these methods, highlighting the superiority of extended visual cryptography with general access structures for maintaining data integrity and confidentiality. The findings suggest that ongoing research is essential for refining these techniques and addressing emerging security challenges.

Uploaded by

crce.9598.ce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CRYPTOGRAPHY AND

SYSTEM SECURTIY
Presented By : Ryan D’Mello,
Aston Castelino and Janice DCruz
TABLE OF CONTENTS
Problem Statement
Objectives
Literature Review
Methodology
Result
Conclusion
References
Implementation and Analysis of Various Visual
Cryptographic Techniques for Sensitive Data Protection

Problem Statement
In today's digital age, safeguarding sensitive data, particularly in domains like defense
and space exploration, presents a pressing challenge due to increasing digitization. This
study aims to assess the efficacy of various visual cryptographic techniques in
protecting such data from unauthorized access and breaches. By exploring these
methods, the research endeavors to offer practical solutions for enhancing data security
in critical sectors reliant on digital platforms.
OBJECTIVES
To study and analyze various existing visual cryptographic techniques.

To assess the complexities and security measures of different visual


cryptographic methods.

To propose suitable visual cryptographic solutions for securing


sensitive data, particularly defense data.
LITERATURE REVIEW
Year Paper Title Description
Secure data sharing Explores a method combining visual cryptography and digital watermarking for secure

2016
data sharing in fog computing environments. This approach provides robust
using visual authentication mechanisms for communication between clients and servers, ensuring
cryptography and data integrity and confidentiality. By leveraging the discrete wavelength transformer
(DWT) for digital watermarking, the method enhances security measures while
watermarking method facilitating efficient data sharing in fog computing scenarios.

in fog computing.
Explores the efficacy of the Least Significant Bit (LSB) steganography method, which
encompasses various cryptographic schemes such as black and white cryptography,
Protecting gray-level visual cryptography, and color visual cryptography. By embedding secret

2015 documents using data within the least significant bits of digital images, this method ensures
imperceptibility to human observers while facilitating covert communication channels.
visual cryptography Through an in-depth analysis, the paper elucidates the robustness and applicability of
the LSB steganography technique across diverse scenarios, shedding light on its
potential applications in secure data transmission and covert communication.
LITERATURE REVIEW
Year Paper Title Description
Security enhancement Explores how visual cryptography and image steganography can work together to
improve security and enhance image quality. By combining these techniques, it aims
2016 in image steganography to strengthen data protection and hide sensitive information within images. Through
using neural networks analysis, it shows how visual cryptography and steganography complement each
other, enhancing data confidentiality and integrity. Additionally, the study discusses
and visual practical applications of this combined approach, suggesting advancements in covert
communication and secure data transmission.
cryptography
A visual cryptographic This paper explores the use of visual cryptography to secure medical data stored in

encryption technique cloud environments. It addresses the challenges of protecting sensitive patient

2013 for securing medical


records and diagnostic images. By employing visual cryptography techniques, the
paper aims to ensure data confidentiality, integrity, and secure access. It investigates
the benefits of visual cryptography in terms of cost-effectiveness, privacy
images enhancement, and secure sharing mechanisms for medical data.
METHODOLOGY
(2, 2) Visual Cryptography Halftone Visual Cryptography
Divides the input image into 2 Encodes secret binary pixels into
shares and decrypts using halftone cells for each share.
Boolean OR function.

(K, N) Visual Cryptography Extended Visual Cryptography


Creates meaningful shares to
Requires a minimum of k shares
reduce noise in traditional visual
out of n for decryption
cryptography.
IMPLEMENTATION
Phase 1
(2, 2) Visual Cryptography Scheme - Utilizes a random
key of black and white pixels to generate a cipher image, Phase 3
where each pixel expands into a 2x2 block, determining
Extended Visual Cryptography for General
the decrypted image using Boolean XOR function.
Access Structures Using Random Grids -
Enhances traditional visual cryptography by
Phase 2 incorporating a meaningful cover image to
each share, resolving the issue of noisy
(K, N) Secret Sharing Scheme - Employs the AES
random pixels, leading to clearer
algorithm for encryption, dividing the image into n
identification of each share and decrypted
shares and allowing decryption using any k shares with a
output image formation.
symmetric key, depicted through a workflow depicted in
a flowchart.
FLOWCHART
DISCUSSIONS
It was observed that the original image size was 2 kB, while the shares generated ranged
around 25 kB each, resulting in a final decrypted output of 10 kB. This disparity in file
sizes could potentially lead to a loss of information during data transfer, indicating a
limitation of the (k, n) cryptography scheme in terms of clarity and efficiency.

A comparative analysis of the three cryptographic algorithms revealed that while the (2,
2) visual cryptography scheme necessitates both shares for revealing the secret
information, the (k, n) scheme allows for efficient decryption using any k shares, even if
some are lost. However, to enhance security, the general access structure visual
cryptography method restricts the use of forbidden shares for secret image generation.
This comparison underscores the superior security offered by the extended general
access structure visual cryptography, positioning it as an effective solution for
safeguarding sensitive data.
CONCLUSION
In conclusion, the study highlights the significance of data security,
especially concerning the protection of sensitive information like defense
data. Through meticulous analysis, it was determined that extended visual
cryptography employing a general access structure emerges as the optimal
approach for maintaining data integrity and confidentiality. Additionally,
the incorporation of region incrementing techniques enhances security
measures, providing a robust framework against potential threats. Looking
ahead, ongoing research in this domain promises to further refine existing
methods and tackle emerging security challenges, thereby fortifying data
protection in various applications and sectors.
REFERENCES
[1] Abboud, A.J., 2015. Protecting documents using visual cryptography.
International Journal of Engineering Research and General Science, 3(2), pp.464-
470.

[2]Kester, Q.A., 2013. A visual cryptographic encryption technique for securing


medical images. arXiv preprint arXiv:1307.7791.

[3] Seethalakshmi, K.S., Usha, B.A. and Sangeetha, K.N., 2016, October. Security
enhancement in image steganography using neural networks and visual
cryptography. In 2016 International Conference on Computation System and
Information Technology for Sustainable Solutions (CSITSS) (pp. 396-403). IEEE.

[4] Gajul, S., Gite, A., Kedari, V. and Kumbhar, P., 2016. Secure data sharing using
visual cryptography and watermarking method in fog computing.
THANK YOU

You might also like