833 research outputs found

    Optimal Colored Threshold Visual Cryptography Schemes

    Get PDF
    Visual cryptography schemes allow the encoding of a secret image into n shares which are distributed to the participants. The shares are such that only qualified subsets of participants can visually recover the secret image. Usually the secret image consist of black and white pixels. In colored threshold visual cryptography schemes the secret image is composed of pixels taken from a given set of c colors. The pixels expansion and the contrast of a scheme are two measures of the goodness of the scheme. In this paper, we study c-color (k,n)-threshold visual cryptography schemes and provide a characterization of contrast-optimal schemes. More specifically we prove that there exists a contrast-optimal scheme that is a member of a special set of schemes, which we call canonical schemes, and that satisfy strong symmetry properties. Then we use canonical schemes to provide a constructive proof of optimality, with respect to the pixel expansion, of c-color (n,n)-threshold visual cryptography schemes. Finally, we provide constructions of c-color (2,n)-threshold schemes whose pixels expansion improves on previously proposed schemes

    On Real-valued Visual Cryptographic Basis Matrices

    Get PDF
    Visual cryptography (VC) encodes an image into noise-like shares, which can be stacked to reveal a reduced quality version of the original. The problem with encrypting colour images is that they must undergo heavy pre-processing to reduce them to binary, entailing significant quality loss. This paper proposes VC that works directly on intermediate grayscale values per colour channel and demonstrates real-valued basis matrices for this purpose. The resulting stacked shares produce a clearer reconstruction than in binary VC, and to the best of the authors’ knowledge, is the first method posing no restrictions on colour values while maintaining the ability to decrypt with human vision. Grayscale and colour images of differing entropies are encrypted using fuzzy OR and XOR, and their PSNR and structural similarities are compared with binary VC to demonstrate improved quality. It is compared with previous research and its advantages highlighted, notably in high quality reconstructions with minimal processing

    Two-out-of-two color matching based visual cryptography schemes

    No full text
    International audienceVisual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view

    Two Step Share Visual Cryptography Algorithm for Secure Visual Sharing

    Get PDF
    This paper re - examines the problem of visual secret sharing for general access structures by using visual cryptograms of random grids (VCRG). Given a binary or color secret image shared by a set of n participants with a strong access structure, we devise t wo effective algorithms to produce a set of VCRG so that the members in each qualified set can reconstruct the secret image by superimposing their sh ares, while those in any forbidden set cannot. The basic 2 out of 2 visual cryptography model consists of a secret message encoded into two transparencies, one transparency representing the cipher text and the other acting as a secret key. Both transparencies appear to be random dots when inspected individually and provide no information about the original clea r text. However, by carefully aligning the transparencies, the original secret message is reproduced. The actual decoding is accomplished by the human visual system. Our algorithms do not require any extr a pixel expansion, which is indispensable and grows exponentially as n increases in conventional visual cryptographic schemes

    Visual Cryptography in Biometrics Passport

    Get PDF
    Every human being is unique in their nature such as traits and physical symptoms so computer science is using the biometric f or perfect identification within large database. Visual cryptography scheme is a cryptographic technique, which allows visual information e.g. printed text, handwritten notes, and picture to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. Biometric passport is a smart card technology product created by use of biometric data and computer chip f or authenticate identification of citizen of particular country. Current passport has certain shortcoming. In the is method it is proposed to convert scan images of retina, fingerprint and face in secret image and meaningful shares by use of visual cryptography. In this method wi th use of Visual Cryptography three biometrics i.e . retina image, fingerprint image and fa ce image encrypted in two meaningful shares when these two share stacking on one another fingerprint image revealed and that can be verified with on the spot live fingerprint image for perfect identification accuracy

    A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction

    Get PDF
    Secret image sharing schemes have been extensively studied by far. However, there are just a few schemes that can restore both the secret image and the cover image losslessly. These schemes have one or more defects in the following aspects: (1) high computation cost; (2) overflow issue existing when modulus operation is used to restore the cover image and the secret image; (3) part of the cover image being severely modified and the stego images having worse visual quality. In this paper, we combine the methods of least significant bits construction (LSBC) and dynamic embedding with one-dimensional cellular automata to propose a new lossless scheme which solves the above issues and can resist differential attack and support parallel computing. Experimental results also show that this scheme has the merit of big embedding capacity

    Visual cryptography with cheating shares

    Get PDF
    Visual cryptography is a technique that applies the human visual system to decode encrypted information, such as text, image and number, without any sophisticated devices and computing capabilities. Therefore, compared with the traditional cryptography, it is apparent that it saves a large amount of time and money on devices and computations. Also, visual cryptography provides the convenience for humans to carry out decryption with a portal card which is significant to the business application. In the past decade, visual cryptography has been thoroughly researched not only on its contrast and subpixel expansion, but also on its applications. The main contribution of this thesis is the security of visual cryptography related to the dishonest shareholders. This is the first known work concerning this variety of potentially secure problem. In the previous papers, the shareholders are inherently honest. However, in the real world, it is impossible to guarantee that every shareholder would be honest forever(e.g., because of the interest of business or military, some shareholders might change to be the traitors). Therefore, a new method based on visual authentication[16] is proposed and the improvement is also made. In this thesis, we also review the previous papers on different fields of the visual cryptography

    Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

    Full text link
    Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems. We propose to use short-range acoustic communication for the initial pairing. Audio hardware is commonly available on existing off-the-shelf devices and can be accessed from user space without requiring firmware or hardware modifications. We improve upon previous approaches by designing Acoustic Integrity Codes (AICs): a modulation scheme that provides message authentication on the acoustic physical layer. We analyze their security and demonstrate that we can defend against signal cancellation attacks by designing signals with low autocorrelation. Our system can detect overshadowing attacks using a ternary decision function with a threshold. In our evaluation of this SDP scheme's security and robustness, we achieve a bit error ratio below 0.1% for a net bit rate of 100 bps with a signal-to-noise ratio (SNR) of 14 dB. Using our open-source proof-of-concept implementation on Android smartphones, we demonstrate pairing between different smartphone models.Comment: 11 pages, 11 figures. Published at ACM WiSec 2020 (13th ACM Conference on Security and Privacy in Wireless and Mobile Networks). Updated reference

    A review and open issues of multifarious image steganography techniques in spatial domain

    Get PDF
    Nowadays, information hiding is becoming a helpful technique and fetch more attention due fast growth of using internet, it is applied for sending secret information by using different techniques. Steganography is one of major important technique in information hiding. Steganography is science of concealing the secure information within a carrier object to provide the secure communication though the internet, so that no one can recognize and detect it’s except the sender & receiver. In steganography, many various carrier formats can be used such as an image, video, protocol, audio. The digital image is most popular used as a carrier file due its frequency on internet. There are many techniques variable for image steganography, each has own strong and weak points. In this study, we conducted a review of image steganography in spatial domain to explore the term image steganography by reviewing, collecting, synthesizing and analyze the challenges of different studies which related to this area published from 2014 to 2017. The aims of this review is provides an overview of image steganography and comparison between approved studies are discussed according to the pixel selection, payload capacity and embedding algorithm to open important research issues in the future works and obtain a robust method
    • …
    corecore