Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Visual Cryptography Using Color Palettes

ABSTRACT

Visual cryptography is a method for protecting image-based secrets that has a


computation-free decoding process. Visual cryptography is a cryptographic technique which
allows visual information (pictures, text, etc) to be encrypted in such a way that the decryption
can be performed by the human visual system without the aid of computers. As network
technology has been greatly advanced, much information is transmitted via the Internet
conveniently and rapidly. At the same time, the security issue is a crucial problem in the
transmission process.
In this project we proposed a visual cryptographic system using Color Palettes. In this DE
algorithm Encryption and Decryption provides solution for both individuals and corporations.
Using this encryption user can easily encrypt and decrypt text (messages), so you can send
emails from home or office in a safe way. The proposed method is a simple, practical and
effective cryptographic system.
The text information is encrypted and stored in the Color Palettes. Initially user has to
give the secret key in order to encrypt the text. Later, when the recipient decrypts the text, the
secret key he/she enters is and compared with the stored color palette. And, in case, the secret
key the recipient enters matches the stored key, encrypted message will be successfully
decrypted. If the recipient enters wrong key, he/she will get an error message "Wrong Secret
key".

INTRODUCTION

This software is designed for various levels of schools/Colleges. It is a complete solution


for managing a campus and thereby synchronizing the data to the website, in other words an
enhanced tool that assists in organizing the day-to-day activities including student performance
and other data staff data’s including staff appraisal and other academic data and management
activities covering every aspects of a campus from academic accounts and management.
MVC is proposing a methodology for successful implementation, which is extremely
flexible and will fulfill all the current needs as well as future requirements. With our ability to
fulfill your need of Computer Database, we hope to add your School in our list of satisfied
customers.

SYSTEM ANALYSIS
EXISTING SYSTEM
The existing system for this project the text information is encrypted by ASCII values,
or any special characters. In the existing system, didn’t use the safely sent the encrypted
information into the mail. The hackers easily access that information. The encrypted text is
didn’t restrict any secret key. So that information easily decrypted.

Disadvantages

Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel
expansion of each share image and the small contrast of the recovered secret image. In this
paper, we propose a step construction to construct VCS OR and VCSXOR for general access
structure by applying (2, 2)-VCS recursively, where a participant may receive multiple share
images.

The proposed step construction generates VCSOR and VCSXOR which have optimal pixel
expansion and contrast for each qualified set in the general access structure in most cases. Our
scheme applies a technique to simplify the access structure, which can reduce the average pixel
expansion (APE) in most cases compared with many of the results in the literature. Finally, we
give some experimental results and comparisons to show the effectiveness of the proposed
scheme.

 
 
PROPOSED SYSTEM
In the proposed for this project is using DE algorithms , the text information is encrypted
by color palette images. Each user has created individual account, and then they access their
required pages. The user’s password is converting into ASCII format and stored into the
database. So any hackers or admin also should not find out the particular user’s password details.
The user’s information is protected into specific secret key entered by user. The secret key is
converting into ASCII format and stored to database. Whenever the user has decrypted their
encrypted information, they should enter the correct secret key. And users send any secure
information, it was encrypted and its link only sent to the mail.

Advantages

We propose a secure display technique based on visual cryptography. The proposed


technique ensures the security of visual information. The display employs a decoding mask
based on visual cryptography. Without the decoding mask, the displayed information cannot be
viewed. The viewing zone is limited by the decoding mask so that only one person can view the
information. We have developed a set of encryption codes to maintain the designed viewing zone
and have demonstrated a display that provides a limited viewing zone.

The basic problem of visual cryptography by a visual variant of the k out of n secret
sharing problem: how can an original picture are encoded by n transparencies so that less than k
of them give no information about the original, but by stacking k of them the original can be
seen? They described a solution to this problem by a structure called k out of n secret sharing
scheme whose parameters directly correspond to quality and usability of the solution.

SYSTEM REQUIREMENTS
SOFTWARE SPECIFICATION
 Front End : PHP
 Back End : MYSQL
 Server : WAMP
 Operating System : Windows OS
 System type : 32-bit or 64-bit Operating System
 IDE : DREAMWEAVER
 DLL : Depends upon the title

HARDWARE REQUIREMENTS
 Processor : Intel processor 3.0 GHz
 RAM : 4 GB
 Hard disk : 1 TB
 Compact Disk : 650 MB
 Keyboard : Standard keyboard
 Mouse : Logitech mouse
 Monitor : 15 inch color monitor

SYSTEM STUDY

MODULES LIST

 Create Color Palette Image


 Encrypt the Text
 Send the encrypted text to Mail with web links
 Retrieve the web links from mail
 Decrypt the Text

MODULE DESCRIPTION

 Create Color Palette Image


In the module, small color images are created by PHP GD functions. Each text has
assigned to particular images. The color palette images and its relevant information are
stored into the database.
 Encrypt the Text

In this module the user has to register their name and their details. The registered
information will be stored in the database. User or administrator tries to check this site
and entered correct login username and password. After that, this application checks to
redirects the required pages for administrator as well as user. The user has entered their
important information, each text has convert to particular images. The images are
randomly allocated to each text. Then image names only stored to database.

 Send the encrypted text to Mail with web links


In this module the user enter the information, and then send to particular mail address.
User’s information is stored into the database for encrypted format. So web link with
information’s ID only sent to the mail. The mail has sent by SMTP protocol. This
process only worked on any online domain. Otherwise we will try to install the SMTP
protocol.

 Retrieve the web links from mail


In this module receiver is click this link, then open into this website. The receivers
enter the secret key, if it is check with database, after they will retrieve the decrypted
information.
 Decrypt the Text
In this module the user’s secret information are stored into the database, these
information displayed only color palette format. After the user is enter the secret key, if
there are compare with database, and the information is decrypted. Then the user is view
their information.
 Feedback

In this module, the user has to give their comments and feedback about this site.
This information will be watched by admin.

You might also like