Visual Cryptography: ARNOB BANIK (19BCE2488) VIJETA PRIYA (19BCB0077) Ranjan Kumar Goit (19bce2668)

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

VISUAL

CRYPTOGRAPHY
ARNOB BANIK(19BCE2488)
VIJETA PRIYA(19BCB0077)
RANJAN KUMAR GOIT(19BCE2668)
ABSTRACT
Here, we will describe
the fundamental aspects
of visual cryptography
01
INTRODUCTION
Here, we will describe
the research conducted
for this topic
02 OBJECTIVES
LITERATURE
SURVEY
TABLE OF 04 Here, we outline the
important functions of
Here, we will survey
research papers to delve
deep into visual
03 CONTENTS the topic

MISCELLANEOUS

05
cryptography
Here, we outline the
tasks to be done for the
upcoming review

TEAM MEMBERS

06 Teams members
contributing to the
project
01
ABSTRACT
ARNOB BANIK(19BCE2488)
ABSTRACT
• Services such as Online transactions and Social networking are an increasing target
demographic for customers. In this project we use visual cryptography for transactions and
network security. Simultaneously, there has been an increasing risk for protection against
hacker’s use are need of unfair gain by exploiting such systems. The end users are need to
protected from such users and their privacy is to be maintained.

• Visual cryptography is such a technique in which an image is ciphered into random images
(which cannot be read) when paired with secret images such that when they are paired
appropriately under a particular algorithm, the plaintext can be read.

• As social media is a vast platform, millions of users share their images online and the content
is often not secured resulting in large risk of cyber abuse and misuse. This can also be applied
in banks and military bases, where sensitive information is transferred and encryption if data is
necessary.

• But visual cryptography has its range of disadvantages: due to the fine resolution as well as
printing noise, it is not very quick to do exact superposition. In addition, many visual
cryptography applications have to print shares on paper on which the share needs to be
scanned. Noise can also be introduced by the print and scan system, which can make alignment
difficult.
CRYPTO QUOTE
If you reveal your secrets to the wind, you should
not blame the wind for revealing them to the trees.
-
Kahlil Gibran
INTRODUCTION
02
VIJETA PRIYA(19BCB0077)
INTRODUCTION
• Two Greek terms meaning "code prose" are used to extract the expression cryptography.
Through rearranging and deleting the original text, cryptography is the method of scrambling
the original text, organizing it in an almost unreadable way. Visual cryptography is a crypto
graphic technique that facilitates encryption of visual content (images, text, etc.) in such a way
that decryption can only be achieved by reading visual information. Visual cryptography,
degree associated rising cryptography technology, uses the characteristics of human vision to
rewrite encrypted photos.

• Visual cryptography, associated with the growing technologies of cryptography, uses human
vision features to rewrite encrypted images. Visual cryptography offers secure digital
transmission that is only used once. Unlike the complex algorithm used in other classical
cryptography, Visual Cryptographic is one of the latest techniques that provide information
security and uses the basic algorithm.
03
LITERATURE SURVEY
VIJETA PRIYA(19BCB0077) : 1 - 5
RANJAN KUMAR GOIT(19BCE2668) : 6 - 10
LITERATURE SURVEY
[1] Image Security using Visual Cryptography by Sangeeta Y. Bhuyan.Published 2015. Mathematics.

• Visual cryptography is a secret sharing technique because it divides an original picture into
image shares that, when layered on top of one another, disclose a concealed secret image. The
Visual Cryptography Scheme is a safe way for encrypting a secret text or picture by splitting it
into image shares. Visual cryptography approaches, in addition to numerous traditional
cryptographic systems, have been used for data and information security. The ability to
visually decipher the secret image by superimposing shares without calculation is a
distinguishing feature of the Visual Cryptography Scheme. A public key encryption technique
is also used to make visual cryptography picture exchanges more secure. The public key
encryption approach makes picture sharing so safe that it is extremely difficult for a third party
to decipher the secret image information without the necessary data, which is a private key.

[2] Chakraborty, Ujjwal; Pau, Jayanta l Kumar; and Mahapatra, Priya Ranjan Sinha (2010) "Design
and Implementation of a (2, 2) and a (2, 3) Visual Cryptographic Scheme," International Journal
of Computer and Communication Technology: Vol. 1 :Iss. 3 ,Article 11.

• M. Naor and A. Shamir pioneered visual cryptography in 1994. The main advantage of visual
cryptography is that it does not require any calculation at the decryption stage.
LITERATURE SURVEY
This cryptography may be used for key management, authorisation, message hiding,
authentication, and identification, among other things. An picture is encrypted into n shares in
a visual cryptography method, and at least k shares can disclose the real image when correctly
stacked; however, any ( k – 1) shares cannot reveal the original image. This is known as the 'k
out of n visual secret sharing issue.

[3] Archana B. Dhole, Prof. Nitin J. Janwe - An Implementation of Algorithms in Visual


Cryptography in Images - published at: "International Journal of Scientific and Research
Publications (IJSRP), Volume 3, Issue 3, March 2013 Edition".

• In Visual Cryptography, the image is split into shares, which are then given to the participants.
The picture is obtained by stacking the share images on the decryption side. The first model
was created solely for bi-level, binary, or monochrome pictures. Later, it was improved to
include color images such as grayscale and RGB/CMY images. Various approaches based on
color decomposition techniques are being explored for RGB/CMY images.

[4] N. Askari; H. M. Heys; C. R. Moloney-An extended visual cryptography scheme without pixel
expansion for halftone images. Published 2013.
LITERATURE SURVEY
• Visual cryptography is a secret sharing technique that employs pictures transmitted as shares
to disclose a hidden secret image when the shares are overlaid. Extended visual cryptography
constructs share pictures to include relevant cover images, allowing for the integration of
visual cryptography and biometric security approaches. In this work, we present a method for
processing halftone pictures that enhances the quality of the share images and recovered secret
image in an expanded visual cryptography scheme with the same size share photos and
recovered secret image as the original halftone secret image.

[5] T. Katoh and H. Imai, Some visual secret sharing schemes and their share size, Proceedings of
International. Conferences on Cryptology and Information Security, (1996) pp. 41–47.

• Visual secretsharing (VSS) schemes are used to protect the visual secret  n transparencies to different
participants so that k-1 or fewer of them have no informationabout the original image, but the image can
be seen by stackingk or more transparencies. However, the revealedsecret image of a conventional VSS
scheme is just black and white.The colored k out of n VSS scheme sharinga colored image is first
introduced by Verheul and Van Tilborg. In this paper, a new construction for the colored VSS schemeis
proposed. This scheme can be easily implemented on basis ofa black & white VSS scheme and get much
better block lengththan the Verheul-Van Tilborg scheme.
LITERATURE SURVEY
[6] Visual Secret Sharing Using Cryptography March 2014.International Journal of Engineering
Research 3(1):31-33. Shital B. Pawar.Prof.N.M. Shahane.

• The Visual Cryptography Technique (VCS) is a secret sharing scheme that focuses on secret image
exchange. The visual cryptography scheme's primary principle is to divide a secret image into a number
of random shares (printed on transparencies), each of which gives no information about the secret image
other than its size. By stacking the shares, the secret image can be rebuilt. This scheme's underlying
operation is a logical OR operation.

[7] Visual cryptography in single-pixel imaging Shuming Jiao, Jun Feng, Yang Gao, Ting Lei, and
XiaocongYuan .Vol. 28,Issue 5, pp. 7301-7313.(2020)

• For the first time, two innovative visual cryptography (VC) techniques are proposed by merging VC with
single-pixel imaging (SPI). The superposition of pixel intensities by a single-pixel detector in SPI is
analogous to the overlapping of visual key pictures in VC. In the first approach, opaque sheets are used
instead of transparent sheets to create QR-code VC. When similar illumination patterns are placed onto
several visual key images and a single detector is used to capture the total light intensities, the secret
image can be recovered. The secret image is shared by many illumination pattern sequences in the
second technique, and it can be recovered by projecting the visual key patterns onto identical items.
LITERATURE SURVEY
[8] P. Punithavathi& S. Geetha (2017) Visual cryptography: A brief survey, Information Security
Journal: A Global Perspective, 26:6, 305- 317, DOI: 10.1080/19393555.2017.1386249

• Visual cryptography is a new technique that addresses issues about picture privacy. It is a strong method
that combines the flawless ciphers and secret sharing of cryptography with those of raster graphics. During
encryption, visual cryptography separates the secret image into shares or shadows. The word "visual" in
visual cryptography refers to the fact that, during the decryption process, a user may view the recovered
secret using his or her visual system without the assistance of computers.

[9] Securing Digital Images Using visual Cryptography. January 2016.DOI:


10.18535/ijetst/v2i12.05.Authors: Prof. S. A. Murab Kirti P. Sahare

• Visual cryptography allows visual data (images, information, and so on) to be jumbled so that decoding
may be accomplished by a person with no decoding computation. In this paper, Data storing in halftone
images using conjugate arranged dithering (DHCOD) computation was demonstrated, which is an
improved adaption of the Information storing in halftone images utilizing conjugate mistake dissemination
technique (DHCED). This DHOCD computation is used to propose another three-stage visual
cryptography scheme. The DHCOD technique is used to conceal a twofold visual example in at least two
ordered dither halftone images, which might be from the same or other multi-tone images. In this paper,
this construct offers utilizing a fundamental visual cryptography model and then implant them into a cover
picture utilizing a DHCOD method, making the offers more safe and significant.
LITERATURE SURVEY
[10] New Coloured Visual Secret Sharing Schemes Ching-NungYang .National Dong Hwa University.

• A new colored VSS scheme construction was also proposed. Visual secret sharing (VSS) schemes are
used to protect the visual secret by sending n transparencies to different participants so that k - 1 or fewer
of them have no information about the original image, but the image can be seen by stacking k or more t.
The exposed hidden image of a traditional VSS scheme, on the other hand, is black and white. Verheul
and Van Tilborg are the first to introduce the colored k out of n VSS scheme that shares a colorful image.
OBJECTIVES
04
ARNOB BANIK(19BCE2488)
OBJECTIVES
• Our basic objective in the project is to encrypt images appropriately in social media. As social media is a
vast platform, millions of users share their images online and the content is often not secured resulting in
large risk of cyber abuse and misuse. This can also be applied in banks and military bases, where
sensitive information is transferred and encryption if data is necessary.

• They come up with a visual hidden sharing scheme where an image is split or divided into n shares such
that the image can only be decrypted by someone with all n shares, thus no information about the
original image can be revealed by someone with any n-1 shares. Each share is printed on a separate
transparency (which serves the secret key purpose) and decryption is done by overlaying the shares when
the original image is seen when all n shares are overlaid.

• Visual Cryptographic is one of the new techniques which provide information security and uses the
simple algorithm unlike the complex one used in other traditional cryptography. This allows visual
information like pictures to be encrypted in such a way that their decryption can be performed by human
visual system without any complex computation or algorithms. This is known as (k , n) VCS model
where k represents minimum no. of shares needed to decrypt the secret image and n is the total number
of shares generated by the visual cryptographic scheme.
OBJECTIVES

IN-DEPTH
We encrypt the message in the form of a picture
and decrypt it using the code acting as the
public key.
05
MISCELLANEOUS
RANJAN KUMAR GOIT(19BCE2668)
MISCELLANEOUS(EXPECTATION
S FOR REVIEW 2)

MODULAR IMPLEMENTATIO
DESIGN INNOVATION N
We expect to finish We describe the We design the codes
designing the project fundamental uses of for encryption and
including its detailed Cryptography in the decryption of the
architecture modern world message

EXISTING CONCLUSION
SYSTEM AND ITS We conclude the
DRAWBACKS project with a
verification report
Drawbacks of the
existing application
THANKS
Questions are welcome!

Information Security Analysis and Audit


Prof. Rajarajan G
Vellore Institute of Technology

CREDITS: This presentation template was created by Slidesgo,


including icons by Flaticon, and infographics & images by Freepik.
Please keep this slide for attribution.

You might also like