Professional Documents
Culture Documents
PPT
PPT
Secret sharing scheme. Visual Cryptography (VC) was introduced by Moni Naor and Adi Shamir in Eurocrypt (1994). Used to encrypt written text/ pictures etc in a perfectly secure way.
Share 2
Share 1 + Share 2
Preliminary Notations
n = Group size k = Threshold m = number of pixels in a share. (loss in resolution from the original image to the recovered image) = the relative difference in the weight between the combined shares that come from a white pixel and a black pixel in the original image. Represents loss in contrast.
H(V0 ) = 1
H(V1) = 2 = H(V1) - H(V0 ) / m = 1/2
V0 = [0,1] or [1,0]
Implementation
Platform: .Net Framework 3.5
Language: C#
Reason for selecting .Net:
Previous experience working on .Net. It is optimal for developing and demonstrating application through UI. .NET also has lot of support for image acquisition and manipulation.
DEMO
Technique Used
White Pixel Black Pixel S0
S0
S1
S1
Horizontal shares
Vertical shares
Diagonal shares
Advantages
Simple to implement Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message. We can send cipher text through FAX or E-MAIL. Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
Disadvantages
The contrast of the reconstructed image is not maintained. Perfect alignment of the transparencies is troublesome. Due to pixel expansion the width of the decoded image is twice as that of the original image. Leads to loss of information due to change in aspect ratio. Additional processing is required for colored images.
Application
Biometric security Watermarking Steganography Remote electronic voting Bank customer identification
Bank sends customer a set of keys in advance Bank web site displays cipher Customer applies overlay, reads transaction key Customer enters transaction key
References
http://en.wikipedia.org/wiki/File:Visual_crypto_animation_de mo.gif http://users.telenet.be/d.rijmenants/en/visualcrypto.htm http://www.cs.nccu.edu.tw/~raylin/UndergraduateCourse/Co mtenporaryCryptography/Spring2009/VisualCrypto.pdf