Professional Documents
Culture Documents
Development of Visual Cryptography Technique For Authentication Using Facial Images
Development of Visual Cryptography Technique For Authentication Using Facial Images
Abstract:Security in the real world is an important issue to be taken care and to be encountered with various aspects and preventive measures. In
the present era, whole major security concerns is the protection of this multimedia web is coming closer from text data to multimedia data, one
of the data. Image, which covers the highest percentage of the multimedia data, its protection is very important. These might include Military
Secrets, Commercial Secrets and Information of individuals. This can be achieved by visual Cryptography. It is one kind of image encryption.
Incurrent technology, most of visual cryptography areembedded a secret using multiple shares.
Visual is secret sharing technique used in visual cryptography which divides the secret image into multiple shares and by superimposing those
shares the original secret image is going to be revealed, but it create a threat when an intruder get shares with which the image is going to be
decrypted easily. However in these project work, an extremely useful bitwise operation is perform on every pixel with the help of key. The key
is provided by new concept of sterilization algorithm. Initially Red, Green and Blue channels get separated from image and are going to be
encrypted on multiple levels using multiple shares, convert an image into unreadable format and by combining all the shares i n proper sequence
the original secret image revealed.
Fig 1. Block Diagram of Extended Visual Cryptography X21= EMBEDDED (S2, C1) X22= EMBEDDED (S2,
C2)
77
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 9 76- 83
_______________________________________________________________________________________________
quantitative relation and image dimension of the provision black. Since a pair of sub elements out of four in each block
image. will constantly be of constant colour as a result of the
element of the key image, 5 hundredth of the key image is
maintained among the ultimate reconstructed image.
79
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 9 76- 83
_______________________________________________________________________________________________
illustration is used (Chao-Wen Chan and Yi-Da Chinese, Du-Shiau Tsai et al [19] devised a secret image sharing
2008). theme for true-colour secret photos. inside the projected
theme through combination of neural networks and variant
D-H key agreement protocols involve the derivation of the visual secret sharing, the quality of the reconstructed secret
shared secret data supported compatible D-H keys between image and camouflage photos square measure visually
the sender and recipient. the knowledge is then reborn into identical as a result of the corresponding original photos.
the cryptanalytic keying material for varied algorithms. A
variation of the Diffie-Hellman is employed for dynamic F. Liu et al, 2008 [20] developed a color visual
the shared secret knowledge into Associate in Nursing cryptography theme below the visual cryptography model of
impulsive quantity of keying materials (Manuel Mogollon, Naor and Shamir with no part growth. throughout this theme
2008). the foremost use of typically|this will be} this can be the increase inside the vary of colors of recovered secret
often to come back keep a copy with a disorder among the image does not increase part growth.
arrangement of digital footage. The equation (1) outlines the Zhengxin Fu, Bin Yu, 2009 [21] projected a subject
2 dimensional matrixes. The new technology which may be supported correlative matrices set and random permutation,
used for the visual cryptography is adaptational order a replacement construction of rotation visual cryptography
photography technique. By exploitation this system the theme (RVCS) has been given, which could be accustomed
decrypted image size is reduced and additionally the cipher four secret photos into two shares. For extending this
standard of secret writing image is improved. throughout theme for color image, exploiting color decomposition with
this technique the technique can get adaptational to the high distinction is needed.
information that's used (Nagaraj V. Dharwadkar, B.B.
Amberker and Sushil dominion Joshi, 2009). Pallavi V. Chavan, R.S. Mangurlkar, 2010 [22] given a
subject of secret sharing in terms of visual cryptography for
From the higher than context it's understood that visual color photos throughout that secret image is split into color
cryptography is also a subject throughout that the key shares (images). each share carries some knowledge that's
knowledge is transmitted whereas not obtaining decoded by undone instead and illegible by polo-neck eyes. The shares
others. square measure superimposed on by activity X-OR
operation to reveal original image; whereas the size remains
Tzung-Her Chen et al [11] offered the multiple image secret identical as that of the primary image. This theme area unit
writing schemes by rotating random grids, with none usually extended to induce multiple shares instead of
constituent enlargement and codebook discovered. till the generating two shares exclusively providing higher division
year 1997 visual cryptography schemes were applied to of secret.
completely black and white footage. initial coloured visual
cryptography theme had been developed by Verheul and Diamond State Prisand and Diamond State Santis, 2011
Van Tilborg [13]. [23] first projected a color model that hide black-and-white
secret image into color share photos. Their main goal is to
When lots of colors square measure there inside the key remain the expansion issue low inside the (n,t)-threshold
image the larger the size of shares will become. to beat this image secret-sharing theme, so as that the reconstructed
limitation Chin-Chen Chang Jiang, 2002 et al [16] image does not expand associate excessive quantity of. Here
developed a secret color image sharing theme supported n represents the number of share photos and t represents the
modified visual cryptography. This theme provides a lots of brink (stacking t or lots of share photos reveals the secret).
economical due to hide a gray image in many shares.
throughout this theme size of the shares is fixed; it does not Gopi Krishnan S I, LoganathanD ,2011 [24] given an image
vary once the number of colors showing inside the key scientific discipline theme supported visual cryptography for
image differs. theme does not would like any predefined natural photos. This projected theme depends on
Color Index Table. YCbCrcolor model. The cryptography and writing works
with the help of half-tone and inverse half-tone severally
to hide a color secret image into multiple colored photos it's and supported visual scientific discipline theme This new
desired that the generated camouflage photos contain less theme provides economical computation to induce key and
noise. For this purpose R.Youmaran, 2006 et al [17] made- cipher. The house taken to store the binary key image and
up associate improved visual cryptography theme for cipher image is lesser than original secret image. the height
concealing a coloured image into multiple coloured cowl and dimension of image maintained constant throughout the
photos. This theme provides improvement inside the signal strategy. The visual quality of recovered image is visually
to noise quantitative relation of the camouflage photos by acceptable with the inverse half-tone technique.
producing photos with similar quality to the originals.
MeeraKamath, ArpitaParab, AartiSalyankar, SurekhaDholay
For reducing part growth in color visual cryptography [25], 2012 projected a replacement VC theme for color
theme S. J. Shyu,2006 [18] steered a lots of economical photos exploitation purposeful shares. rather like the
colored visual secret sharing theme with part growth of [ prevailing schemes, the size of the shares created and final
log2c*m] where m is that the part growth of the exploited image once stacking square measure double the size of
binary theme. original image. However, the visual quality achieved by
80
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 9 76- 83
_______________________________________________________________________________________________
formula is higher. The Key Table and Image writing from currently on half growth. The approach of VCRG
procedure used considerably improves the protection by relieves the priority of half growth, withal its reconstruction
increasing the randomness. ability isn't perfect as VCS.
Chun-Yuan Hsiao, Hao-Ji Wang, 2012 [26] use the Pallavi Vijay Chavan, 2014 [31] prepare expressed
color model of Ateniese et al. to boost the image quality of throughout this paper describes the appliance of hierarchical
the reconstructed image of Chius image secret sharing visual cryptography to the authentication system.
theme. The aim behind is that a color part area unit usually usually|this will be} this can be often degree alternate
used either as a white or black one, therefore resolution the approach for fingerprint based authentication mechanism.
matter that the share photos do not manufacture (when Fingerprint based authentication mechanism have 2 major
stacked) enough black pixels for the reconstructed image. problems: vogue throughout authentication and non quality
The technical downside of this work is but and where to for several users. In projected system, the signature of
inject the color pixels so as that every the shares and someone is taken as input that is encrypted exploitation
additionally the reconstructed photos have top of the range. hierarchical visual cryptography. HVC divides input
Yuanfeng Liu, Zhongmin Wang, 2012 [27] projected HVC signature into four resultant shares. Among four shares, any
(Halftone visual cryptography) construction technique that 3 unit of measuring taken to return copy with key share.
will cipher a secret halftone image into color halftone Remaining share is two-handed over to the user and put
shares. the key image is at a similar time embedded into together the key share is placed on authentication system.
color halftone shares whereas these shares square measure each the shares seem in helter-skelter format however upon
halftone by affected vector error diffusion. The projected superimposition, the key is disclosed.
technique is in a very position to induce halftone shares
showing natural color photos with high image quality. Roberto Delaware Prisco and Alfredo Delaware Santis,
2014 [32] show that settled and random grid visual
ShyongJianShyu, Hung-Wei Jiang, 2013 [28] offer formal cryptography is strictly connected. As a consequence several
definitions to threshold multiple-secret visual scientific results renowned for the settled model is additionally used
discipline schemes, significantly -MVCS and -MVCS, among the random grid model and contrariwise. at intervals
exploitation exclusively superimposition with none further this literature papers that have an impact on random grid
operation in writing technique. General constructions for ignore results renowned for the settled model and
every schemes are designed exploitation the abilities of contrariwise.
science at intervals that the target functions unit of
measuring to chop back the half expansions with the Xiang Wang, Member, 2014 [33] this letter projected a
constraints satisfying the revealing, concealing and security lossless multi-secret visual cryptography technique
conditions at intervals the corresponding definitions. for a supported customary VC theme. The projected (k,k )and (
given setting of k ,n and s, which revealing list might k,n) LTVC and P-LTVC schemes will infix more tag
manufacture the tiniest half expansion and how will a footage what is more as a results of the key image. Stacking
revealing list have an effect on the resultant half expansion shares on reveals the key image, and folding up one in every
unit of measuring still challenges. of specific shares discloses the tag image. Compared with
totally different multi-secret theme, the foremost necessary
Young-Chang Hou, Shih-Chieh family, and Chia- advantage of LTVC and P-LTVC is that the embedding of
Yin carver,2013 [29] projected easy visual secret sharing tag footage doesn't lower the standard of the first secret
theme, not solely maintains the protection and half non- image. The experimental results illustrate that the stacking
expanding blessings of the random-grid technique, however results of LTVC and P-LTVC encompasses consequent
along permits for the assembly of purposeful share-images, distinction than that of previous labelled visual
whereas satisfying the wants of being straightforward to cryptography technique.
hold and simple to manage. Moreover, all pixels at intervals
the cover-image and put together the key image unit of Souvik Roy and P. Venkateswaran,2014 [34] throughout
measuring accustomed perform cryptography, that ensures this paper, a payment system for on-line trying is projected
that the excellence on the share-images and put together the by combining text based steganography and visual
stack-image will reach the theoretical most. this technique cryptography that gives client knowledge privacy and
along removes some more cryptography restrictions (e.g., prevents misuse of information at merchants facet. the
having to use only 1 cover-image, having to wish enough strategy cares solely with bar of fraud and customer
black pixels from the key image) that produces the information security. as compared to totally different
cryptography technique millions of versatile. The findings banking application that uses steganography and visual
show that our easy visual secret sharing is best than the cryptography.
strategy.
Ching-Nung principle, 2014 [35] throughout this paper, we
ShyongJianShyu, two013 [30] introduced a pair of novel tend to tend to tend to investigate the relation between
and effective VCRG-GAS algorithms to resolve the matter OVCS and XVCS. Our main contribution is to in theory
of visual secret sharing for binary and color footage. prove that the idea matrices of (k, n)-OVCS is employed in
throughout this paper the algorithms don't would really like
81
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 9 76- 83
_______________________________________________________________________________________________
(k, n)-XVCS. Meantime, the excellence is exaggerated doing the vital task in such degree setting is incredibly tough
2(k1) times. .so on unravel the matter, the cryptography techniques got to
be custom for the cloud setting. Some researchers with a
Biswapatilana 2014[36] projected a steganographic theme combination of authentication and cryptography have tried
to implant a secret message in every of the shares in to mitigate the abuse of any unreliable parties within the
random location throughout share generation section cloud. The identity primarily based authentication and
determined as stego share. Before stacking receiver will attribute-based authentication ar good samples of this class.
extract hidden message from stego share for checking Others tried to propose a model by secret writing and secret
authentication of shares. during this system no writing isolation from the storage service within the cloud.
verification share is needed to forestall cheating in Vc.
AkhilKaushik 2014[37] a current block cipher for two- Marius IulianMihailescu 2014[41] the affiliation of this hash
dimensional digital footage has been projected. The formula formula to the iterated hash perform is obvious, so if and
depends on parallel key approach and it's some special attack happens on the hash spherical perform, it implies
security feature of follow a further key to form it 0.5 degree attack of an identical kind, in numerous words with
addicted to the key writing key. throughout this formula, we an identical computation quality, on the iterated hash
tend to tend to tend to divide image into blocks and perform
scramble them to feature confusion. Then these blocks ar
any encrypted by suggests that of primary secret writing REFERENCES:-
key, followed by constituent level secret writing follow a [1]. M. Naor and A. Shamir, "Visual cryptography,"
secondary key. Hence, the key writing methodology Advances in Cry ptology - EUROCRYPT'94, Springer-
involves 3 levels of security then creating it plenty of Verlag,1995,Vol-950, pp.1-12.
durable against unauthorized attacks. [2]. J. Ida Christy and Dr. V. Seenivasagam, Construction
of Color Extended Visual Cryptographic Scheme
Using Back Propagation Network for Color Images,
Kai-Hui Lee and Pei-Ling Chiu 2014 [38] 20 12 International Conference on Computing,
proposes a VSS theme, (n,n)-NVSS theme, which can share Electronics and Electrical Technologies [IC CEET] 978-
a digital image follow varied image media. The media that 1-4673 -02 1 0-41 1 220 12 IEEE. pp.88-93.
embody n one indiscriminately chosen image ar timeless [3]. Himanshu Sharma , Neeraj Kumar, Govind Kumar Jha,
within the key writing section. Therefore, they're completely Enhancement of security in Visual Cryptography system
innocuous. in spite of the number of participants n will using Cover Image share embedded security algorithm
increase, the NVSS theme uses just one noise share for (CISEA), 978-1-4577-1386-6112011 IEEE, 2011,pp
sharing the key image. Compared with existing VSS 462-467.
[4]. Zhongmin Wang and Gonzalo R. Arce, Halftone visual
schemes, the projected NVSS theme will effectively trim
cryptography through error diffusion, IEEE Transaction
transmission risk and supply the only level of user on Information Forensics and security, ISBN 1-4244-
friendliness, each for sharesand for participants. 0481-9/06 2006 IEEE, pp.109-112.
[5]. Digital Image Processing Laboratory: Image Halftoning
FaraounKamel Mohamed 2014[39]proposed approach ar April 30, 2006, Purdue University, pp.01-07.
rst the parallel mode of operation for secret writing and [6]. J. K. Mandal and SubhankarGhatak, Constant Aspect
secret writing that cause nice performances improvement on Ratio based (2, 2) Visual Cryptography through
multi-processor platforms,and second, the selective space Meaningful Shares (CARVCMS). IEEE 1ST
deciphering specified any specic images space is International conference on communication and
Industrial application (ICCIA-2011 Paper ID 92),
deciphered whereas not information of the full ciphered-
December 2011, pp.01-04.
image. The approach is additionally terribly sturdy to [7]. MeeraKamath, ArpitaParab, Extended Visual
information deterioration or prying transmission, since any Cryptography for Color Images Using Coding Tables,
ciphered-data corruption can have an impression on entirely 2012 International Conference on Communication,
the corrupted block whereas not inuencing the key writing Information & Computing Technology (ICCICT),
results of previous or posterior blocks. Obtained results Mumbai, India 978-1-4577-2078-9/12 2011 IEEE. Vol.
show the hardiness and high performance degree of the 4, Issue. 5, Oct 2011, pp.39-46.
projected schema even with a non-optimized code. we tend [8]. Bin Yu, XiaohuiXu, Liguo Fang, Multi-secret sharing
to tend to tend to assume that higher performances is threshed visual cryptography, CIS Workshops 2007,
Harbin, 2007, pp.815-818.
achieved if hardware implementation is employed.
[9]. Yanyan Han and Haocong Dong, A Verifiable Visual
Cryptography Scheme Based on XOR Algorithm, 978-
Hussein Rahmani*, ElankovanSundararajan, Zulkarnain 1-4673-2101-3/12/$31.00 2012IEEE.
Md. Ali, Abdullah MohdZin 2014[40] projected cloud [10]. KulvinderKaur andVineetaKhemchandani Securing
computing wherever multi-tenancy, virtualization and Visual Cryptographic Shares using Public Key
outsourcing characteristics build it in danger of com Encryption, 978-1-4673-4529-3/12/$31.00c 2012 IEEE.
promising security aspects and there's no physical [11]. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei,
management on information at rest or information in Multiple-Image Encryption By Rotating Random
motion, the information is protected by storing Grids, Eighth International Conference on Intelligent
Systems Design and Applications, 2008, pp. 252-256.
cryptographically and giving the key management to the
approved party. However, finding a particular party for
82
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 9 76- 83
_______________________________________________________________________________________________
[12]. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, Information Forensics and Security, Volume: 8, Issue: 5,
Multi-Secrets Visual Secret Sharing, Proceedings of 2013, pp: 733 743.
APCC2008, IEICE, 2008, pp. 325335. [29]. Young-Chang Hou, Shih-Chieh Wei, and Chia-Yin Lin;
[13]. E. Verheul and H. V. Tilborg,Constructions And Random-grid-based Visual Cryptography Schemes
Properties Of K Out Of N Visual Secret Sharing IEEE Transactions on Circuits and Systems for Video
Schemes. Designs, Codes and Cryptography, 11(2), Technology, Issue: 99, 2013, pp. 195-199.
1997, pp.179196. [30]. ShyongJianShyu,Visual Cryptograms of Random Grids
[14]. C. Yang and C. Laih, New Colored Visual Secret for General Access Structures IEEE Transactions on
Sharing Schemes, Designs, Codes and cryptography, Circuits and Systems for Video Technology, Volume: 23
Vol-20, Springer, 2000, pp. 325335. , Issue: 3 2013,pp. 414 424.
[15]. C. Chang, C. Tsai, and T. Chen. A New Scheme For [31]. Pallavi Vijay Chavan , Signature Based Authentication
Sharing Secret Color Images In Computer Network, using Contrast Enhanced Hierarchical Visual
Proceedings of International Conference on Parallel and Cryptography 2014 IEEE Students Conference on
Distributed Systems, July 2000,pp. 2127, Electrical, Electronics and Computer Science,2014, pp.
[16]. Chin-Chen Chang, Tai-Xing Yu, Sharing A Secret Gray 205-211.
Image In Multiple Images, Proceedings of the First [32]. Roberto De Prisco and Alfredo De Santis, On the
International Symposium on Cyber Worlds (CW.02), Relation of Random Grid and Deterministic Visual
2002, pp. 300-304. Cryptography IEEE Transactions on Information
[17]. R.Youmaran, A. Adler, A. Miri , An Improved Visual Forensics And Security, Vol. 9, No. 4, April 2014, pp.
Cryptography Scheme For Secret Hiding, 23rd Biennial 182-201.
Symposium on Communications, 2006,pp. 340-343, [33]. Xiang Wang, Qing qi Pei, Hui Li, A Lossless Tagged
[18]. S.J. Shyu, Efficient Visual Secret Sharing Scheme For Visual Cryptography Scheme IEEE Signal Processing
Color Images, Pattern Recognition 39 (5), 2006, pp. Letters, Vol. 21, NO. 7, July 2014, pp. 255-259.
866 880. [34]. Souvik Roy and P. Venkateswaran Online Payment
[19]. Du-Shiau Tsai, GwoboaHorng, Tzung-Her Chen, Yao- System using Steganography and Visual Cryptography
TeHuang, A Novel Secret Image Sharing Scheme For 2014 IEEE Students Conference on Electrical,
True-Color Images With Size Constraint, Information Electronics and Computer Science, Bhopal, March
Sciences 179 32473254 Elsevier, 2009. pp. 122 129. 2014,Vol. 14(Issue 3), pp 28-36.
[20]. F. Liu1, C.K. Wu X.J. Lin , Colour Visual [35]. Ching-Nung Yang, Property Analysis of XOR-Based
Cryptography Schemes, IET Information Security, vol. Visual Cryptography IEEE Transactions on Circuits
2, No. 4, 2008,pp. 151-165. And Systems For Video Technology, Vol. 24, No. 2,
[21]. Zhengxin Fu, Bin Yu Research on Rotation Visual February 2014, pp. 189-197.
Cryptography Scheme International Symposium on [36]. Biswapatilana, Cheating Prevention in Visual
Information Engineering and Electronic Commerce, Cryptography using Steganographic Scheme 2014
2009,pp 533-536. IEEE,Vol. 4(Issue 5), pp 1724-1729.
[22]. Pallavi Vijay Chavan, R.S. Mangrulkar Encrypting [37]. AkhilKaushik , Digital Image Chaotic Encryption
Informative Color Image using Color Visual 2014 International Conference on Reliability,
Cryptography, Third International Conference on Optimization and Information Technology -ICROIT
Emerging Trends in Engineering and Technology, 978-0- 2014, India, Feb 6-8 2014, pp. 314-317.
7695-4246-1/10 $26.00 2010 IEEE DOI [38]. Kai-Hui Lee and Pei-Ling Chiu, Digital Image Sharing
10.1109/ICETET.2010.94, pp. 277-281. by Diverse Image Media IEEE Transaction on
[23]. Roberto De Prisco and Alfredo De Santis, Using Colors Information Forensics and Security,Vol.9,No.1,Jan
to Improve Visual Cryptography for Black and White 2014,pp.88-98.
Images, ICITS 2011, LNCS 6673, 2011, pp. 182-201. [39]. FaraounKamel Mohamed, A parallel block-based
[24]. Gopi Krishnan S I, Loganathan D., Color Image encryption schema for digital images using reversible
Cryptography Scheme Based on Visual Cryptography cellular automata Engineering Science and Technology,
Proceedings of 2011 International Conference on Signal an International Journal , Elsevier ,5 May 2014,pp 85-
Processing, Communication, Computing and Networking 94.
Technologies (ICSCCN 2011).Tamilnadu (India),21-22 [40]. HosseinRahmani*,ElankovanSundararajan, Zulkarnain
July 2011, pp. 399-404. Md. Ali, Abdullah MohdZin Encryption as a Service
[25]. MeeraKamath, ArpitaParab, Extended Visual (EaaS) as a Solution for Cryptography in Cloud, 4th
Cryptography for Color Images Using Coding Tables, International Conference on Electrical Engineering and
2012 International Conference on Communication, Informatics, ICEEI 2014,Science Direct, Volume 11,pp
Information & Computing Technology (ICCICT), Oct. 1202- 1210.
19-20, Mumbai, India 978-1-4577-2078-9/12 2011 [41]. Marius Iulian Mihailescu,24th DAAAM International
IEEE. pp. 189-195. Symposium on Intelligent Manufacturing and
[26]. Chun-Yuan Hsiao, Hao-Ji Wang, Enhancing Image Automation, 2013 , Science Direct publication 2014,pp
Quality in Visual Cryptography with Colors, 2012 1459- 1468.
IEEE, International Conference on Information Security
and Intelligence Control (ISIC),2012, pp.103 106.
[27]. Yuanfeng Liu, Zhongmin Wang; Halftone Visual
Cryptography with Color Shares, IEEE International
Conference on Granular Computing (GrC), ISBN 978-1-
4673-2310-9, 2012, pp. 746-749.
[28]. ShyongJianShyu, Hung-Wei Jiang; General
Constructions for Threshold Multiple-Secret Visual
Cryptographic Schemes IEEE Transactions on
83
IJRITCC | September 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________