+ All Categories
Home > Technology > Visual Cryptography in Meaningful Shares

Visual Cryptography in Meaningful Shares

Date post: 14-Feb-2017
Category:
Upload: debarko-de
View: 258 times
Download: 1 times
Share this document with a friend
21
Mini Project on GENERATION OF MEANINGFUL SHARES IN VISUAL CRYPTOGRAPHIC SYSTEMS Presented By Uttari Chakraborty (200911117) Debarko De (200915026) Pratarshi Saha (200911075) Under the supervision of Mr. Sandeep Gurung (Associate Professor, CSE Dept., SMIT) DEPT. OF COMPUTER SCIENCE AND ENGINEERING SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY MAJITAR SIKKIM, 737136. Dated : 07/12/2012
Transcript
Page 1: Visual Cryptography in Meaningful Shares

Mini Project onGENERATION OF MEANINGFUL SHARES IN VISUAL

CRYPTOGRAPHIC SYSTEMS

Presented By

Uttari Chakraborty (200911117) Debarko De (200915026)

Pratarshi Saha (200911075)

Under the supervision of

Mr. Sandeep Gurung(Associate Professor, CSE Dept., SMIT)

DEPT. OF COMPUTER SCIENCE AND ENGINEERINGSIKKIM MANIPAL INSTITUTE OF TECHNOLOGY

MAJITAR SIKKIM, 737136.Dated : 07/12/2012

Page 2: Visual Cryptography in Meaningful Shares

CONTENTS

1.Introduction

2.Design Strategy

3.Test Plan

4.Implementation Details

5.Results and Discussions

6.Summary and Conclusion

Page 3: Visual Cryptography in Meaningful Shares

INTRODUCTIONVisual Cryptography combines perfect ciphers

and graphics

Input = Binary ImageOutput = 2 (or more) shares

Shares can be printed on transparent papers

Overlapping of shares reveals the secret

No computer participation is required

Can be decoded directly by the HVS

Page 4: Visual Cryptography in Meaningful Shares

AIM To implement Generation of meaningful shares in Visual

Cryptographic Systems

Page 5: Visual Cryptography in Meaningful Shares

Problem Definition•To share secrets without revealing the

message

•A third party cannot decrypt the message if he has less than the required number of shares

•The main areas of problem are-The contrasts of the output images are lower

than the original secret message

To make the shares completely unsuspicious

Page 6: Visual Cryptography in Meaningful Shares

Analysis of the Problem•To extract meaningful shares out of

various kinds of images•The schemes developed have a

disadvantage of contrast loss •Also the randomness of the shares make

them obvious•Hence, we have to develop a method to

conceal the shares inside meaningful images

Page 7: Visual Cryptography in Meaningful Shares

Solution Strategy•Partial images are generated of the secret

message by breaking the image into random parts

•Distribute these parts among random images which upon overlapping reveal the secret message

•These partial images are embedded in meaningful shares which make it difficult to detect any hidden image

Page 8: Visual Cryptography in Meaningful Shares

Literature SurveyVisual Cryptography and Shares

Visual Cryptography by Moni Naor and Adi Shamir, LNCS, Springer, Heidelberg (1994)

Different schemes for generation of sharesA Comprehensive Study of Visual Cryptography by Jonathan Weir and WeiQi Yan (Queen’s University Belfast, Belfast, BT7 1NN, UK)

Page 9: Visual Cryptography in Meaningful Shares

Design Strategy

Fig:- Steps involved in accomplishing the project

Page 10: Visual Cryptography in Meaningful Shares

TEST PLAN• Should work for any kind of image-

The algorithms used in this project work for any type, dimension or color model of image.

• Minimum contrast degradation-The PSNR of the algorithms is calculated to compare the unwanted contrast loss.

• Randomness in partial imagesAND operation is performed on the shares to check for randomness.

Page 11: Visual Cryptography in Meaningful Shares

IMPLEMENTATION DETAILS(2,2) SCHEME

WHITE SHARES: { } BLACK SHARES: { }• Each pixel is divided into 2 sub pixels• Thereby distorts the aspect ratio of the image• This scheme is seldom used

Page 12: Visual Cryptography in Meaningful Shares

(2,4) SCHEME

Problems

Contrast Ratio gets deviated from the original image and is almost half of that of the original image.

Page 13: Visual Cryptography in Meaningful Shares

PROPOSED SOLUTIONHALFTONING

Half toning is a method for creating the illusion of Continuous tone output in Binary Mode.

•Error diffusion is a type of halftoning in which Quantization Residual is distributed to neighboring Pixels that have not yet been processed.

•Error diffusion using FLYOD-STEINBERG ALGORITHM

Initialize w(x,y) to Image(x,y) If w(x,y)

> threshold

Print 0

Print 1

NoYes

Compute Errorw(x,y)-max

Forward Distribute Error

Page 14: Visual Cryptography in Meaningful Shares

Halftone Results

Original Gray Scale Image

Halftone ImageInput Image Output ImageHalftone

d

Comparison of (2,4) Scheme Output with and without Halftoning

Page 15: Visual Cryptography in Meaningful Shares

Colour Visual Cryptography

Input ImageOuutput Image

Page 16: Visual Cryptography in Meaningful Shares

RESULTS AND DISCUSSIONS

Page 17: Visual Cryptography in Meaningful Shares

COMPARISON OF ALGORITHMS

PSNR Ratio is used to find out the relative execution time of different algorithms. The formaula to calculate the PSNR is as given below:

Type of Image PSNR Value

Black & White Image without Halftoning

6.5715 dB

Black & White Image with Halftoning

7.3651 dB

Colour CMYK Images 7.4337 dB

Page 18: Visual Cryptography in Meaningful Shares

SUMMARY AND CONCLUSION• Thus, in this project we have implemented a new

type of cryptographic scheme which can decode concealed images without any computation.

• We have generated random parts of various types of images and embedded them in meaningful shares

• After generating shares using the cover image, we have overlapped those shares to get the decrypted output.

Page 19: Visual Cryptography in Meaningful Shares

REFERENCES•Visual Cryptography by Moni Naor and

Adi Shamir, LNCS, Springer, Heidelberg (1994)

•A Comprehensive Study of Visual Cryptography by Jonathan Weir and WeiQi Yan (Queen’s University Belfast, Belfast, BT7 1NN, UK)

Page 20: Visual Cryptography in Meaningful Shares

GANTT CHART

Project Gantt Chart

7 Aug 2012

11 Aug 2012

22 Aug 2012

15 Nov 2012

Problem Definition & Solution Formulatio

n Literature Survey

IMPLEMENTATION

Verification And Validation

Dcumentation

20 Oct 2012

Page 21: Visual Cryptography in Meaningful Shares

Thank You


Recommended