• Nenhum resultado encontrado

A novel cryptographic technique under visual secret sharing scheme for binary images

N/A
N/A
Protected

Academic year: 2017

Share "A novel cryptographic technique under visual secret sharing scheme for binary images"

Copied!
12
0
0

Texto

(1)

Vol. 2(5), 2010, 1473-1484

A novel cryptographic technique under

visual secret sharing scheme for binary

images

B. Lakshmi Sirisha G. Sree Lakshmi

Lecturer, M.Tech Student

V.R. Siddhartha Engineering College V. R Siddhartha Engineering College Email: suravarapuls @yahoo.co.in Email: srilakshmialapati @yahoo.com

ABSTRACT- The traditional cryptographic techniques require decryption algorithm to decode the original information. This process requires computations and further increases cost of equipments making the technique inefficient. This paper briefly presents the visual cryptographic technique applied to image so that decryption can be performed by human visual system, without any decryption algorithm. A visual cryptography scheme encodes a black & white secret image into n shadow images called shares which are distributed to the n participants. The VC scheme is based on the no. of the shares and participants. The paper projects a new matrices with different shares and participants namely (3,6) & (4,4). The proposed scheme reduces the complexity by reducing the no. of shares with increased participants. This feature of the scheme improves the efficiency and makes the decoding system easy by printing out shadow images on transparencies and stacks them to visually reveal the secret image. The proposed scheme is developed using Matlab. The results are presented to validate the effectiveness of the proposed scheme. Keywords: Visual cryptography, visual secrete sharing, shares, participants

INTRODUCTION

To prevent digital contents from being intercepted by unauthorized parties is a critical demand in information security. With the increasing popularity of the internet, which makes possible the instant access or distribution of digital contents, such a demand becomes even more significant. Traditional cryptographic skills recommend plenty of solutions by encrypting the digital data into a cipher text that cannot be recognized by illegal intruders. Yet the decryption of the protected cipher text needs computations. Generally peaking, the cost or efficiency of the hardware/software performing the decoding computations is mostly proportional to the security of the encryption algorithm. Thus, when we demand a stronger security, the decoding devices/computations become more costly or inefficient.

(2)

than the grey level of a ”reconstructed” white one. In other words, the reconstructed image will be darker than the background of the image itself. In such a model [3], [4], [5] the recovered secret image can be darker or lighter than the background.

The organization of the paper as follows: Section I briefly gives the introduction and previous work related to the proposed work. Section II explains the visual secret sharing scheme.

II. VISUAL SECRET SHARING SCHEME

Introduction: In 1994, Naor and Shamir proposed a new technique called visual cryptography. The primary property of visual cryptography is using a method called stacking shares to recover secret messages. Stacking refers to layering the shares on top of one another. The secret owner or a dealer creates two or more shares for the secret message. Each cannot be used to reveal the secret alone. Receiving all of the shares, printing each share onto a transparency, stacking the transparencies and using human visual system, the secret message can be visible without any computation needed. In this way, visual cryptography has proven to provide perfect security. Furthermore, the technique can be applied to group secret system, which is using (k, n)-threshold visual secret sharing scheme in order to perform secret sharing, where k≤n. With (k, n)-threshold visual secret sharing scheme, the dealer or the secret owner can base a group of n participants to produce n shares for the secret message. Each participant in the group can have his own share. When recovering the secret message, only k or more transparency stacks are required without any computation. The secret message cannot be restored if less than k transparencies are used. Each pixel in the secret image is expanded to four sub pixels in each share that consist of white and black according to the patterns. The summary points of Naor and Shamir’s scheme

(1) The secret data can be divided into n parts. (2) Any k or more than k parts can recover the secret

3) Any k -1 or fewer than k parts cannot compute the secret data.

Fig.1: Naor and Shamir‘s visual cryptography model

II B. Visual cryptography scheme for binary Images-Implementation of ‘2 out of 2’ scheme:

(3)

Vol. 2(5), 2010, 1473-1484

belongs to the corresponding share image. In the decryption process the two corresponding shares are stacked together (using OR operation) to recover the secret pixel. Two share of a white secret pixel are of the same while those of a black secret pixel are complementary.

As Shown in Figure 1. Consequently a white secret pixel is recovered by a share with the stacked result of half white sub-pixels and a black secret pixel is recovered by all black. Using this basic VCS Scheme we can-not completely recover the white Secrete pixel which causes loss in contrast. In XOR based VCS scheme where the share images are superimposed using XOR operation which results in perfect reconstruction of both Black and white pixels as shown in Figure 2 and sub sampling a 2×2 share into a single pixel we get decrypted image of the same size as original secret image.

Fig.2: Comparison between OR and XOR based VCS

Example for 2 out of 2 scheme

Fig 3(a): original binary image

Fig 3 (b) share1 Fig 3 (c) share2

Fig 3 (d) Decrypted image using OR operation

Fig 3 (e) Decrypted image using XOR operation

(4)

2 out of 2 sharing matrixes:

S0=

1

0

0 1

S00 =

0 1

1

0

S1=

1 0

1 0

S11 =

0 1

0 1

S0,&S00 are complimented matrixes to reveal the black pixel, where as S1&S11 are same matrixes to reveal the white pixels. Using above matrixes we can produce 2 shares Individual shares cannot give any information. Two shares are stacked we can reveal the original output.

IIC. Possibilities for 2 out of 4 sharing scheme:

S0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

0

0

1

1

1

1

0

0

0

1

1

0

1

0

0

1

Using above matrixes we can produce 4 shares. Out of these 4 any two shares are stacked we reveal the original output less than two shares can not reveal any information.

II D. Possibilities for 3 out of 3 sharing scheme

S0=

1

1

0

0

1

0

1

0

0 1

1

0

S1=

1 1

0

0

1 0 1

0

1 0

0

1

Using above matrixes we can produce 3 shares. Only all shares are stacked we can reveal the original output.

III. PROPOSED VISUAL SHARING SCHEME

A. Possibilities for 3 out of 6 sharing scheme:

S0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

0

0

1

1

(5)

Vol. 2(5), 2010, 1473-1484

S0=

1 1

0

0

1 0 1

0

1 1

0

0

1 0 1

0

1 1

0

0

1 1

0

0

S1=

1

1

0

0

1

0

1

0

1

1

0

0

1

0

1

0

1

1

0

0

0

0

1

1

S0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

0

0

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

1

1

1

1

0

0

S0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

0

0

1

1

S0=

1 1 0 0

1 1 0 0

1 1 0 0

1 1 0 0

1 1 0 0

1 1 0 0

S1=

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

1

1

0

0

0

0

1

1

Using above matrixes we can produce 6 shares. Out of these 6 any three shares are stacked we reveal the original output less than three shares we can not reveal any information

.

B. Possibilities for 4 out of 4 sharing scheme:

s

0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

0

0

1

1

1

1

0

0

1

1

0

0

1

1

0

0

(6)

S0=

0 0 1 1

0 0 1 1

0 0 1 1

0 0 1 1

S1=

1

1

0

0

1

1

0

0

1

1

0

0

0

0

1

1

S0=

1 1 0 0

1 1 0 0

1 1 0 0

1 1 0 0

S1=

0

0

1

1

0

0

1

1

0

0

1

1

1

1

0

0

Using above matrixes we can produce 4 shares. Only all shares are stacked we can reveal the original output. .

IV. (K, N) - THRESHOLD VISUAL CRYPTOGRAPHY

A (k, n)-threshold visual cryptography scheme is a method to encode a secret image into n shadow images called shares. Such that any K or more K shares enable the “Visual” recovery of the secret image, but by inspecting less than K shares one cannot gain anyinformation on the secret image. The “visual” recovery consists of xeroxing the shares on to transparencies, and then stacking them. Any K shares will reveal the secret image without any cryptographic computation.

V. RESULTS

Case Studies:

a) An image with 512x512 pixels is taken for validating the scheme. Results for (2,2) scheme are shown in figs 4 b-d.

Fig 4(a): Original image Fig4 (b) Share1

original image

(7)

Vol. 2(5), 2010, 1473-1484

Fig4(c) Share2 Fig4 (d) stacked shares image

b)An image with 512x512 pixels is taken for validating the scheme. Results for (2,4) scheme are shown in figs 5 b-h.

Results for (2, 4) scheme:

Fig5 (a) OriginalImage Fig5 (b) Share1

Fig5(c) share2 Fig5 (d) Share3

share2

original image

share1

share2 share3

(8)

Fig5 (e) Share4 Fig5 (f) Stacked 1&2 shares

Fig5 (g) Stacked 3&4 shares Fig5 (h) Stacked1&2&3&4 shares

c) An image with 512x512 pixels is taken for validating the scheme. Results for (3,3) scheme are shown in figs 6 b-e.

Results for (3, 3) scheme

Fig6 (a) Original image Fig6 (b) Share1

share4

over lapped 12

over lapped image over lapped image

original image

(9)

Vol. 2(5), 2010, 1473-1484

Fig6 (c) Share2 Fig6 (d) Share3

Fig6 (e) Stacked 3 shares

d) An image with 512x512 pixels is taken for validating the scheme. Results for (3,6) scheme are shown in figs 7 b-j.

Results for (3, 6) scheme:

Fig7 (a) Original image Fig7 (b) Share1

share1

share3

over lapped image

original image

(10)

Fig7 (c) Share2 Fig7 (d) Share3

Fig7 (e) Share4 Fig7 (f) Share5

Fig7 (g) Share6 Fig7 (h) Stacked 1&2&3 Shares

Fig7 (i) Stacked 3&4&6 shares Fig7 (j) Stacked 5&2&1 shares

e) An image with 512x512 pixels is taken for validating the scheme. Results for (4,4) scheme are shown in figs 4 b-f.

share3 share3

share4

share5

share6

over lapped image

over lapped image

(11)

Vol. 2(5), 2010, 1473-1484

Results for (4,4)scheme

Fig8 (a) Original image Fig8 (b) Share1

Fig8 (c) Share2 Fig8 (d) Share3

Fig8 (e) Share4 Fig8 (f) Stacked all shares

VI. CONCLUSION

This paper presented a new visual sharing scheme with (3, 6) and (4, 4) for visual cryptography. The proposed scheme reduced the no. of shares for more participants compared to equal shares and participants proposed earlier papers. As the no. of shares is reduced, system complexity is reduced. Decoding becomes easy with less no. of shares.

original image

share1

share2

share3

share4

(12)

VII. ACKNOWLEDGEMENT

We wish to express our profound thanks toDr.K.SRI RAMAKRISHNA, PhDHead of the department E.C.E,and Dr.K.MOHAN RAOprinciple of V.R.Siddhartha Engineering College for providing necessary facilities to make this project success. We wish to express special thanks to S.N.V.GANESH Assistant professor of EEE Department.

VIII. REFERENCES

[1] M. Naor, A. Shamir, Visual cryptography, in: Eurocrypt’94, Lecture Notes in Computer Science, vol. 9 50, 1994, pp. 1–12. [2] A. Shamir, How to share a secret, Communications of ACM 22 (11) (1979) 612–613.

[3] W.-G. Tzeng and C.-M. Hu, a New Approach for Visual Cryptography, Designs, Codes and Cryptography, Vol. 27, No. 3, pp. 207– 227, 2002

[4] Visual Cryptography Schemes with Optimal Pixel ExpansionCarlo Blundo, Stelvio Cimato, and Alfredo De Santis

[5] A Secret Sharing Scheme for Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis 46th International SvmDosium Electronics in Marine. ELMAR-2004. 16-18 June 2004. Zadar. Croatia.

[6] Zhi Zhou, Gonzalo R. Arce , and Giovanni Di Crescenzo, “Halftone Visual Cryptography”, IEEE Transactions on image processing, vol. 15, no. 8, August 2006.

[7] Randomness in secret sharing and visual Cryptography schemes Annalisa De Bon, Alfredo De Santis Theoretical Computer Science

314 (2004) 351 – 374.

Imagem

Fig 3 (d) Decrypted image using OR operation

Referências

Documentos relacionados

O diagnóstico das patologias associadas ao ferro passa pelo hemograma, uma ferramenta essencial, e por testes séricos, como ferro sérico, saturação da transferrina, receptor solúvel

Trata-se, como diz Vico Manãs, de um instrumento de interpretação restritiva, fundada na concepção material do tipo penal, por intermédio do qual é possível

The efficacy of 28 individual or blended disinfectants against avian Salmonella enterica serovar Enteritidis and Escherichia coli strains was determined.. An in vitro test

Plasmodium infection. Regulation of iron homeostasis is a systemic response orchestrated in great part by hepcidin, and hemoglobinopathies have been linked to

[r]

Anexo Capítulo 1: Investigação - Desenvolvimento de formulações de gomas orais de prednisolona Anexo 1.1- Medicamentos com formas farmacêuticas semelhantes às gomas orais registados

The two points considered at the alternate sides, of the tangents through the diameter of the circle, and then the line joining these points divides the circle

At the first stage of the measurements results analysis, the gear wheel cast surface image was compared with the casting mould 3D-CAD model (fig.. Next, the measurements results