11 research outputs found

    Expressive Color Visual Secret Sharing with Color to Gray & Back and Cosine Transform

    Get PDF
    Color Visual Secret Sharing (VSS) is an essential form of VSS. It is so because nowadays, most people like to share visual data as a color image. There are color VSS schemes capable of dealing with halftone color images or color images with selected colors, and some dealing with natural color images, which generate low quality of recovered secret. The proposed scheme deals with a color image in the RGB domain and generates gray shares for color images using color to gray and back through compression. These shares are encrypted into an innocent-looking gray cover image using a Discrete Cosine Transform (DCT) to make meaningful shares. Reconstruct a high-quality color image through the gray shares extracted from an innocent-looking gray cover image. Thus, using lower bandwidth for transmission and less storage

    Survey on Biometric Image Sharing Using Cryptography and Diverse Image Media

    Get PDF
    Visual Secret Sharing Scheme is used to transmitting or delivering the secret images over the network. The VSS scheme has a major drawback that is it suffers from high transmission risk because the shares are like noise. As the shares are like noise that causes the attackers attention. In this paper we are using a natural-image based visual secret sharing (NVSS) scheme to reduce the transmission risk problem that occurs in VSS scheme. The NVSS scheme uses the natural images such as paintings, photographs etc as digital shares. As we are using the natural shares instead of noise like shares which reduces the transmission risk to certain limit. This scheme also uses the different media to transmit the shares

    Visual Cryptography in Biometrics Passport

    Get PDF
    Every human being is unique in their nature such as traits and physical symptoms so computer science is using the biometric f or perfect identification within large database. Visual cryptography scheme is a cryptographic technique, which allows visual information e.g. printed text, handwritten notes, and picture to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Biometric passport is a smart card technology product created by use of biometric data and computer chip f or authenticate identification of citizen of particular country. Current passport has certain shortcoming. In the is method it is proposed to convert scan images of retina, fingerprint and face in secret image and meaningful shares by use of visual cryptography. In this method wi th use of Visual Cryptography three biometrics i.e . retina image, fingerprint image and fa ce image encrypted in two meaningful shares when these two share stacking on one another fingerprint image revealed and that can be verified with on the spot live fingerprint image for perfect identification accuracy

    On Real-valued Visual Cryptographic Basis Matrices

    Get PDF
    Visual cryptography (VC) encodes an image into noise-like shares, which can be stacked to reveal a reduced quality version of the original. The problem with encrypting colour images is that they must undergo heavy pre-processing to reduce them to binary, entailing significant quality loss. This paper proposes VC that works directly on intermediate grayscale values per colour channel and demonstrates real-valued basis matrices for this purpose. The resulting stacked shares produce a clearer reconstruction than in binary VC, and to the best of the authors’ knowledge, is the first method posing no restrictions on colour values while maintaining the ability to decrypt with human vision. Grayscale and colour images of differing entropies are encrypted using fuzzy OR and XOR, and their PSNR and structural similarities are compared with binary VC to demonstrate improved quality. It is compared with previous research and its advantages highlighted, notably in high quality reconstructions with minimal processing

    A Self Recovery Approach using Halftone Images for Medical Imagery System

    Get PDF
    ABSTRACT Security has become an inseparable issue even in the field of medical applications. Communication in medicine and healthcare is very important. The fast growth of the exchange traffic in medical imagery on the Internet justifies the creation of adapted tools guaranteeing the quality and the confidentiality of the information while respecting the legal and ethical constraints, specific to this field. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by several different shares of binary images. It is hard to perceive any clues about a secret image from individual shares. The secret message is revealed when parts or all of these shares are aligned and stacked together. In this paper we provide an overview of the emerging Visual Cryptography (VC) techniques used in the secure transfer of the medical images over in the internet. The related work is based on the recovering of secret image using a binary logo which is used to represent the ownership of the host image which generates shadows by visual cryptography algorithms. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 -6375(Online) Volume 1 Number 2, Sep -Oct (2010), pp. 133-146 © IAEME, http://www.iaeme.com/ijcet.html , © IAEME 134 An error correction-coding scheme is also used to create the appropriate shadow. The logo extracted from the half-toned host image identifies the cheating types. Furthermore, the logo recovers the reconstructed image when shadow is being cheated using an image self-verification scheme based on the Rehash technique which rehash the halftone logo for effective self verification of the reconstructed secret image without the need for the trusted third party (TTP). IJCET © I A E M E International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 -6367(Print), ISSN 0976 -6375(Online) Volume 1, Number 2

    Development of Visual Cryptography Technique for Authentication Using Facial Images

    Get PDF
    Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption. Incurrent technology, most of visual cryptography areembedded a secret using multiple shares. Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares in proper sequence the original secret image revealed

    A Survey on Random Grid based Cryptography Schemes

    Get PDF
    A random grid based non-expanded Visual cryptography scheme used to generate meaningful as well as meaningless shares. First, analyze the distribution of pixels on the share image and stack image. A probability allocation method is introduced which is capable of producing the better visual quality in share image and stack image. With this method, it not only hide the secret image by using different cover images, but also visual quality of images is improve as needed. The important part is improvement of contrast of both secret and stack images to their theoretical maximum. This method is superior to past methods for visual secret sharing

    Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography

    Get PDF
    The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. Conventional visual cryptographic protocols offer solutions, particularly for color images, though they grapple with challenges such as high computational demands and reliance on multiple cover images. Additionally, they often require third-party authorization to verify the image integrity. On the other hand, visual cryptography offers a streamlined approach. It divides images into shares, where each pixel represented uniquely, thus allowing visual decryption without complex computations. The optimized multi-tiered authentication protocol (OMTAP), which is integrated with the visual sharing scheme (VSS), takes secure image sharing to the next level. It reduces share count, prioritizes image fidelity and transmission security, and introduces the self-verification of decrypted image integrity through asymmetric key matrix generators, thus eliminating external validation. Rigorous testing has confirmed OMTAP's robustness and broad applicability, thereby ensuring that decrypted images maintain their quality with a peak signal-to-noise ratio (PSNR) of 40 dB and full integrity at the receiver's end

    Design of data validation solutions using high density 2D colored codes and a (2,2) xor-based color interference visual cryptography scheme

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.A validação de dados nos sistemas de informação utiliza majoritariamente algoritmos criptográficos em sistemas que, geralmente, não utilizam materiais não eletrônicos como parte da infraestrutura do criptossistema. Nesse trabalho, foram desenvolvidos dois sistemas de armazenamento e recuperação de dados através da proposta de uma nova tecnologia de códigos de barra colorido bidimensional e de um novo esquema de criptografia visual. Os códigos de barras bidimensionais têm sido amplamente estudados, mas ainda continuam sem contar com um padrão que consiga transmitir alta quantidade de informação em pequenos espaços impressos. As aplicações desse modelo de transmissão tem como motivação a necessidade de armazenar (e recuperar) uma alta quantidade de informação em pequenas áreas impressas, como por exemplo, para utilização de dados criptográficos que sejam processados sem conexão e armazenados em pequenos espaços impressos, como os de caixas de remédios ou caixas de cigarros. O código de barras colorido 2D proposto nesse trabalho é chamado de High Density 2 Dimensional Code (HD2DC) e possui 8 diferentes tamanhos. O HD2DC permite a utilização de 5 ou 8 cores em cada tamanho e conta com o algoritmo de correção de erro Reed-Solomon com 3 diferentes níveis (10%, 20% e 30%). O HD2DC foi desenvolvido com o objetivo de ser um padrão de código de barras colorido 2D para operações de transmissão de grande quantidade de informações em pequenas ou médias áreas de impressão. Criptografia visual é uma técnica que cifra uma imagem secreta em duas ou mais imagens chave. A decodificação de qualquer esquema de criptografia visual depende do sistema visual humano e a maioria das propostas existentes consideram para a decodificação a utilização da sobreposição de duas ou mais lâminas físicas com n x n (n ≥ 2) pixels expandidos. O esquema de criptografia visual proposto nesse trabalho considera a utilização de duas imagens. A primeira é uma lâmina física feita por uma impressão colorida em Policloreto de Polivinila (PVC) transparente de 3 milímetros, enquanto que a segunda é uma imagem colorida apresentada na tela do visor de um smartphone. Ambas as imagens não geram expansão de pixels. A obtenção das melhores cores utilizadas nesse criptossistema foi realizada através de estudos físicos do comportamento da interferência de cor entre a tela do smartphone e a cor utilizada na impressão do PVC transparente. Essa nova proposta possui um alto nível de usabilidade para validação de dados em transações eletrônicas e conta com um custo muito baixo de implementação. Um sistema robusto de validação de dados é criado quando é combinada a criptografia visual proposta com o HD2DC. O HD2DC tem a capacidade de armazenar uma das imagens chave, no caso a que deve ser mostrada no visor do celular, essa arquitetura de codificação aumenta a percepção de segurança e explora a usabilidade do celular por meio da utilização da câmera e da tela como ferramentas para mostrar a imagem cifrada da criptografia visual.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Digital data validation generally requires that algorithms are ran into on cryptographic systems that, usually, do not use non-electronic devices as part of their information security infrastructure. This work presents two information storage and retrieval systems: a new colored two-dimensional barcode technology and a novel visual cryptography scheme. Two-dimensional barcodes have been a topic of research for several decades, but there is still no standard that stores and retrieves high amounts of data. Recently, new requirements have been imposed on applications that use 2D barcodes as a communication channel, such as the capability of storing information into a small printed area. This particular requirement is specially important for 2D barcodes that store cryptographic primitives to be processed off-line. This is the case of barcodes in products like cigarettes and medicines, which are used for data validation and product verification. The proposed 2D colored barcode is called High Density Two-Dimensional Code (HD2DC) and is currently one of the 2D barcodes with the highest data density. HD2DC can be generated in 8 different sizes, with 5 or 8 colors. To increase robustness, the system uses a Reed-Solomon error correction algorithm with 3 different levels: Low, Medium and High, which provide approximately 10%, 20% and 30% error correction, respectively. Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more images, which are called shares. These shares are printed on transparencies and superimposed (requiring a good alignment) to reveal (visually) the original secret image, i.e. without requiring any computation. Current visual cryptography schemes use at least 2 shares (transparencies) as keys. With respect to the secret image size, most of these schemes produce a n x n (n ≥ 2) size expansion of the shares and the decoded image. The proposed Visual Cryptography scheme, on the other hand, uses two shares and does not require a size expansion. The first share is a colored film printed on a Polyvinyl Chloride (PVC) surface of 3 millimeters, while the second share is a colored image displayed on a smartphone or tablet. In this work, we performed a physical evaluation of the color interference properties of these two shares (the printed PVC transparency and the image displayed on the mobile device) to find the most adequate color space to be used in the proposed cryptosystem. We also propose a strong validation system combining our Xor-Based Visual Cryptography scheme with HD2DC. HD2DC has the capability of storing the share that is shown on the mobile device display. This encoding architecture enhances security perception and explores the mobile device usability, using its screen to display a Visual Cryptography share

    Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images

    No full text
    [[abstract]]Most visual secret sharing (VSS) schemes need to encrypt a pixel of the secret image into m subpixels on the share; obviously, the shares are enlarged and so are the stacked images. A handful of studies try to solve the problem of pixel expansion, but little information is available on improving the visual effect of the stacked image. In addition, most of them do not mention how to deal with grey-level images. Since the secret is decoded by the human eye, the visual effect of the stacked image is an important issue in the study of the VSS scheme. This paper proposes two visual cryptographic methods to solve the problem of pixel expansion and to improve the visual effect of the stacked image at the same time. Unlike in previous studies, multiple pixels are simultaneously encoded each time. With the help of halftoning, the methods can be applied to encoding grey-level images. The experimental results show that these methods have a better visual effect on the stacked image compared with other researchers' methods. The methods are based on two basis matrices and hence can satisfy the security and contrast conditions required by the VSS scheme.[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]SSCI[[booktype]]紙本[[countrycodes]]GB
    corecore