+ All Categories
Home > Documents > Algebraic Visual Cryptography

Algebraic Visual Cryptography

Date post: 06-Apr-2018
Category:
Upload: srichitra-bharath
View: 227 times
Download: 0 times
Share this document with a friend
20
03/07/12 Visual Secret Sharing 1
Transcript
Page 1: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 1/20

03/07/12 Visual Secret Sharing 1

Page 2: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 2/20

INDEX

1. Visual Secret Sharing –Definition

2. Schemes in Visual Secret Sharing

3. Concept of Pixel Expansion and Contrast

4. Objective of the proposed scheme

5. Overview of the proposed scheme.

6. Proposed algorithm for videos

7. Verification of shares with the POB number system.

8. Advantages of the proposed scheme.

9. Comparison with the known results in literature.

03/07/12 Visual Secret Sharing 2

Page 3: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 3/20

VISUAL SECRET SHARING

ecurity of visual data is important issue in the design

of the communication systems.

ata hiding techniques and Visual Secret Sharing are

used to introduce confidentiality and security when

visual data are transmitted through unsecured

communication channels.

03/07/12 Visual Secret Sharing 3

Page 4: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 4/20

VISUAL CRYPTOGRAPHY

03/07/12 Visual Secret Sharing 4

Page 5: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 5/20

PIXEL EXPANSION & CONTRAST

Two important factors used to determine the efficiency of any 

cryptographic schemes are Pixel Expansion and Contrast.The difference measure between a black and a white pixel in the

reconstructed image is called contrast .

The number of sub-pixels that each pixel of the original image is

encoded into on each transparency is termed  pixel expansion.

03/07/12 Visual Secret Sharing 5

[

0101

] [0110

1001

1010

[[ ]]]

Expansion = 2Contrast=(2-

1)/2=0.5

[

Page 6: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 6/20

CONTD..

ny loss of information during reconstruction phase

leads to the reduction in the quality of the recovered

image. This is called Contrast.

Pixel expansion refers to the number of subpixels in

the generated shares that represents a pixel of the

original input image.

03/07/12 Visual Secret Sharing 6

Page 7: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 7/20

OBJECTIVES OF THE

PROPOSED SCHEME

ixel expansion must be zero

uality of the secret image should be retained in the recovered image.

he size of the share should not reveal the original size of the secret.

oseless encryption.

orrupted shares should be clearly identified before using them for decryption.

utomatic modification of shares so that if the shares are hacked after a period of 

time they should be invalid.

03/07/12 Visual Secret Sharing 7

Page 8: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 8/20

OVERVIEW OF THE

ALGORITHM

earranged

Image

03/07/12 Visual Secret Sharing 8

Image Reshape

d Image

Encrypte

d Image

Share 1 Share k Share n

Permutation Modification Generation

 Association

1,2,.., k k, ……..,n

Page 9: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 9/20

DECRYPTION OF THE SHARES

tep 1: permutation matrices are defined in such a way thatthere exists only one 1 in each row and column.

tep 2: Taking the positions of 1 each row will result in K x

1 matrix for each permutation matrix. Also the each

column generator matrix to each of the shares. This

results the concept that only if k shares of secret image is

obtained it will be able to generate the generator matrix.

03/07/12 Visual Secret Sharing 9

Page 10: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 10/20

ENCRYPTION OF VIDEOS

03/07/12 Visual Secret Sharing 10

Frame Generation

Selection of 

I-frame

Difference from I -frame to

other frames

Threshold>no. of 

difference

Store the

difference in I-

frame’s log file

Encrypt the currentI-frame

Take current frame

as next I-frame

NOYES

Page 11: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 11/20

VERIFICATION OF ENCRYPTED

SHARES

n cryptography, a secret sharing scheme is verifiable if auxiliary information is

included that allows players to verify their shares as consistent.

n verifiable secret sharing (VSS) the object is to resist malicious players, such as

(i) a dealer sending incorrect shares to some or all of the participants, and

(ii) participants submitting incorrect shares during the reconstruction protocol.

n standard secret sharing, the dealer is assumed to be honest.

03/07/12 Visual Secret Sharing 11

Page 12: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 12/20

POB NUMBER SYSTEM FOR

VERIFICATION.

ermutation Ordered Binary (POB) Number System takes two nonnegative integral

parameters, n and r, where n >=r. The system is denoted by POB(n, r). In this number system, we represent all integers in the range 0, . . . ,n!/(n-r)! r! -1, as a binary string,

say

= bn-1, bn-2, bn-3, ….., b2, b1,b0 of length n and exactly r 1’s

ach digit of this number, say, bj is associated with its position value, given by

 j * j!/pj! (j-pj)! Where pj = ∑pi ‘i’ from 0 to j

he original values are obtained V(B)

(B) = ∑bj * j!/(j-pj)!pj! ‘j’ from 0 to n-103/07/12 Visual Secret Sharing 12

Page 13: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 13/20

ALGORITHM - POB

enerate POB-number corresponding to a given POB-value. In a POB(n, r) number system, if a POB-value,

value is given, the algorithm generates POB(n,r)

number :B such that V (B) = value.

nput : Three numbers: n; r and value with r <= n and

0 <= value <= n!/r!(n-r)!

utput: The POB-number B = bn-1bn-2 …. b003/07/12 Visual Secret Sharing 13

Page 14: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 14/20

ADVANTAGES OF THE

PROPOSED SCHEME

imple coding

ixel expansion is little with this scheme. When the k and

n values are higher pixel expansion is considerably low.

ontrast is maintained

olor darkening phenomenon is also considered with this

scheme.

03/07/12 Visual Secret Sharing 14

Page 15: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 15/20

COMPARISONS WITH THE KNOWNRESULTS IN THE LITERATURE.

1 :the pixel expansion of colour (k, n)-VCS under the visual cryptography model

of Naor and Shamir 

2 : whether or not the construction is based on the halftone technique

3 : whether or not the increase in the number of colours of the recovered secret

image will increase the pixel expansion.

4 : whether or not the colour model of the construction considers the colour 

darkening phenomenon during stacking of pixels with the same colour.

5 : whether or not the recovering of the secret image requires the assistance of 

computing devices.03/07/12 Visual Secret Sharing 15

Page 16: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 16/20

COMPARISONS WITH THEKNOWN RESULTS IN THE

LITREATURE.Constructions C1 C2 C3 C4 C5

Ours 0 No No Yes yes

Cimato et al. N/A No Yes No No

Hou and TU 1 Yes No Yes No

Shyu et al. Log c * m No Yes No No

 Yang and chen 1 No No No No

Liu Wu lin 1 No No Yes No

  Yang and liah Cm No Yes No No

03/07/12 Visual Secret Sharing 16

Page 17: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 17/20

COMPRESSION RATES

AS N AND K SHARES INCREASES PIXEL EXPANSIONCOMES DOWN TO ZERO..

03/07/12 Visual Secret Sharing 17

Page 18: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 18/20

APPLICATIONS

roviding high level security for Closed Circuit Television footages and

perfect recovery.

toring vital financial documents multiple servers where each server 

stores only a part of the information.

ecuring video chat applications

powerful encryption utility that brings military strength encryption with just one

click.

edical a lications Xra ima e of a atient.

03/07/12 Visual Secret Sharing 18

Page 19: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 19/20

REFERENCES

di Shamir, How to Share a Secret, Communications of the ACM, Vol. 22, no. 11,

pp. 612-613, Nov. 1979.

ohsen Heidarinejad, Amirhossein Alamdar Yazdi and Konstantinos N. Plataniotis

“Algebraic Visual Cryptography Schemes for Images” (2008).

oni Naor and Adi Shamir -Visual Cryptography (1994).

. Sreekumar and Dr. S. Babu Sundar –”An efficient secret sharing scheme for n

out of n scheme using POB –number system”.

xis Communications-H.264 Video compression standard.New possibilities within

video surveillance.(2008)03/07/12 Visual Secret Sharing 19

Page 20: Algebraic Visual Cryptography

8/2/2019 Algebraic Visual Cryptography

http://slidepdf.com/reader/full/algebraic-visual-cryptography 20/20

 THANK YOU

03/07/12 Visual Secret Sharing 20


Recommended