A Simple Scheme For Visual Cryptography: Abstract-Here An Algorithm Is Proposed To
A Simple Scheme For Visual Cryptography: Abstract-Here An Algorithm Is Proposed To
A Simple Scheme For Visual Cryptography: Abstract-Here An Algorithm Is Proposed To
AbstractHere an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six pixels is generated for the considered two consecutive pixels. Thus we get six pixels instead of eight pixels in the shares corresponding to two pixels in the original image. As a result two pixels (8-6 = 2) in the share are reduced corresponding to two pixels of original image.
Keywords-Secret share;pixel share;complement pixel share;
Suppose we have an original image of resolution 150100 i.e. aspect ratio =height: width=3:2, then the resolution of each of the produced image share is 300150 i.e. aspect ratio=2:1 thus we get shares of resolution 300150 instead of 300300 which is the size of the other implementation of the (2,2) secret sharing problem. Here the proposed scheme is described in section- 4. Results of the proposed scheme are given in section- 5. Comparison of the proposed scheme with other algorithms is done in section- 6. II. SOME BASIC DEFINITIONS
I.
INTRODUCTION
Let us first understand some definition of visual cryptography. Secret Share:In visual cryptography the visual information (image) that is to be encrypted, is broken into number of images which are collection of black and white pixels. Each of the images is called secret share. It is impossible to get any of information about the original image from this secret share individually. Here each pixel of original image corresponds to some fixed number of pixels in each share. That fixed number of pixels is called pixel share. (k, n) secret sharing problem:In this problem, n secret shares from the original image are generated but if k of the shares are stacked properly, the original information of the image can be revealed. We cannot get any information about the original image from k1 shares. Here both k and n are positive integer. (n, n) secret sharing problem:In this problem, n secret shares are generated from the original image and all of n shares are required to decrypt the hidden information. We cannot get any information about the original image from any n-1 shares. Here also n must be positive integer. (2, 2) Secret Sharing problem:Here we generate 2 secret shares from the original image and it is impossible to reveal any information about the encrypted image from any one of the shares. After stacking properly, the two shares produce the information of the encrypted image.
Now a day the transmission of data through computer networks is increasing rapidly. So the security of the transmitted data becomes mandatory. Cryptography is the desired technique to provide security of the transmitted data. There are two processes in cryptography. Encryption is the first process in which the plain text or readable text is converted into cipher text or unreadable text. The second process is called decryption process in which the cipher text or unreadable text is converted to plain text or readable text. To encrypt data, we apply an encryption algorithm at the sender end and to reveal the data at the receiving end, we apply a decryption algorithm. So in cryptography we have to use an encryption as well as a decryption algorithm. But we need to consider the situation where there is no option to use the decryption algorithm during the decryption process. In Visual cryptography mainly visual information is encrypted using encryption algorithm but here there is no need of decryption algorithm to revel the visual information. Here the decryption process is done simply by human visual system. During the encryption process we simply add some noise in the original image to hide the original information and during the decryption process we reduce the noise to unhide the original information. In the proposed scheme, we implement the (2, 2) sharing problem i.e. two shares are generated from the original image. Aspect ratio of the produced image shares is broken. But the size of the shares is reduced compare to the other implementation of the (2, 2) secret sharing problem. Thus size of the generated shares is taken as parameter of the encryption.
Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
136
III.
RELATED WORKS
Shami and Naor have given the algorithm to implement the (2, 2) secret sharing scheme [1].In their scheme four pixels are generated from a single pixel of the original image. Among the four pixels two pixels are white and two pixels are black. Since we have to make 2 pixels black out of 4 pixels so there are 4C2=6 pixel shares. During the encryption process each pixel of the original image is scanned separately. If the scanned pixel is black then we choose one of the six pixel shares as shown in fig- 1.Then we put the selected pixel share in one of the share to be generated and simultaneously put the complement pixel share of the selected pixel share in the other share. Again if the scanned pixel is white then one pixel share from the six pixel shares of the fig-1 is selected and put the selected pixel share in both the shares. Original pixel Pixel shares After stacking
two consecutive pixels row wise, the following four cases arise. Case 1:- Both the pixels are black. Case 2:- Both the pixels are white Case 3:-First pixel is black and second pixel is white. Case 4:- First pixel white and second pixel black. Now let us consider the following pixel shares
Above we have 20 pixels shares which will be used to generate the two shares .Now above mentioned four cases are discussed. Case 1:In this case both the pixels are black. We choose randomly one of the 20 pixel shares and place it in the first image share and simultaneously we put the complement of the chosen pixel share in the other image share so that when these two image shares are stacked properly, the area generated by the pixel shares becomes black. In the above shown pixel shares 1 and are complement to each other as if we stack them properly they produce a complete 23 black pixel area. Similarly 2 and 12, 3 and 13, 4 and 14, 5 and 15, 6 and 16, 7 and 17, 8 and 18, 9 and 19, 10 and 20 are complement to each other. Original Pixel Case 1. Pixel shares 1 11 After stacking two pixel shares
Debasish Jena and Sanjay Kumar Jena introduced DHCOD algorithm to hide image data [2]. In their proposed scheme, there are two phases of encryption. In the first phase original image is split into two shares. Then in the second phase watermarked shares are generated using DHCOD algorithm. In this phase a cover image is used. Share 1 Share 2
Embedded cover image Embedded cover image
Secret image
Tai-Wen and Suchen Chiang have used Neural Network to implement visual cryptography [3]. All the above mentioned algorithms work only for binary images. Algorithms on visual cryptography are also proposed for gray scale image[5,10] and color images[6,8,9]. IV. THE SCHEME
Case 2.
In this scheme we consider two consecutive pixel rows wise instead of considering a single pixel in the original image. During share generation, since we are considering
Case 2:In this case both the pixels are white. So we choose randomly one of the pixel shares among the 20 pixel shares. Then the selected pixel share is put in both the share. Now
Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
137
when we stack the image share, the area generated by this two pixel shares becomes gray (not black) or semi white. Case 3:In this case first pixel is black and the second pixel is white. Here we construct the 23 matrix as follows
Case 4:In this case first pixel is white and the second pixel is black. Here also we construct the 23 matrix as follows...
(a)
(a) (b) Figure 8. (a) Process 1 of breaking 23 matrix. (b) Process 2 of breaking 23 matrix.
(b) Figure 5. (a) Process 1 of breaking 23 matrix. (b) Process 2 of breaking 23 matrix.
Group-2
In this case we choose one of the groups between Group-1 and Group-2. Suppose we have chosen Group-2. Now we choose one of the pixel share among F .Now we choose one pixel share from D and corresponding pixel share from E. If we choose first pixel share of D then we have to choose first pixel share of E. Now we put the selected pixel share from F in both the share .The selected pixel share from D is put in the first share and corresponding selected pixel share from E is put in the second share.
Now again we choose one of the groups between Group1 and Group-2. Suppose we have chosen Group-1. Now we choose one of the pixel shares among A .Now we choose one pixel share from B and corresponding pixel share from C is selected .If we choose first pixel share of B then we have to choose first pixel share of C. Now we put the selected pixel share from A in both the share and selected pixel share from B is put in the first share and corresponding selected pixel share from C is put in the second share.
+
Third pixel of D Third pixel of E
+
Second pixel of F After stacking After stacking
After stacking
After stacking
After concatenation After concatenation Figure 7. Structure of pixel share related to case-3. Figure 10. Structure of pixel share related to case-4.
Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
138
V.
RESULTS
VI.
COMPARISON
The implementation of the algorithm is done by using c language taking a binary image of resolution 200200 and we get the result as desired, i.e. we get two shares of resolution 400300 each. And the two shares are nothing but constituting an image of black and white dotted pattern. When the generated shares are stacked properly then the original information which was encrypted is revealed.
The algorithm which was proposed by Shamir and Naor to implement (2, 2) secret sharing problem raises the size (resolution) of the generated shares. But in the above algorithm size (resolution) of the generated shares is reduced. In case of Shamir and Naor implementation of (2,2) secret sharing problem the size(resolution) of the share is increased twice of the original image in both horizontal and vertical direction but in case of above described algorithm the size of the image share is increased twice in vertical direction but increased 1.5 multiple in horizontal direction. Also visual fidelity is enhanced in the described algorithm. In the table given below shows the improvement of size of the share in our proposed scheme.
Table 1. Comparison between Shami and Naor scheme and our scheme.
Original Shami Naor Tai-Wen and Suchen Chiang Jena and Jena Proposed scheme
Share
Increase(%)
1 1 1 1
4 2 2 or 4
Figure 11. (A)Original image (B)Share 1 (C)Share 2 (D)Stacking of share 1and share 2.
The chart given below compares the proposed scheme to the other eschemes with respect to the increase(%) of the original image.
500 Shami and Naor 400 300 200 100 0
Figure 12. Bar chart showing comparison of proposed scheme with others scheme.
Tai Wen and Suchen Chiang Jena and Jena(First) Jena and Jena (Second) Proposed Scheme
(D) Resolution=400300
Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010
139
VII. CONCLUSION
[8]
The proposed scheme mainly reduces the number of pixels in the generated shares. But the aspect ratio of the shares is broken. In future works we would like to maintain the aspect ratio of the generated shares. ACKNOWLEDGMENT The authors are grateful to the Department of Computer Science, University of Kalyani for providing the resources to wok in such an interesting field. REFERENCES
[1] M.Naor and A. Shamir Visual cryptography. Advances in Cryptology EUROCRYPT 94. Lecture Notes in Computer Science, (950):112, 1995. Debasish Jena, Sanjay Kumar Jena A Novel Visual Cryptography Scheme,2008. Tai-Wen Yueand and Suchen Chiang A Neural Network Approach for Visual Cryptography, IJCNN'00,2000. Data Communications and Networking-Behrouz A.Forouzan fourth edition. Mizuho Nakajima and Yasushi Yamaguchi Extended Cryptography for Natural Images. Visual
Hao Luo, Faxin Yu, Jeng-Shyang Pan and Zhe-Ming Lu Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding, 8th International Conference on Intelligent Systems Design and Applications, Vol. 3, pp. 431-436. Young-Chang Hou Visual cryptography for color images, Recognition,Volume:36,Issue: 7, July, 2003, pp. 1619-1629. Pattern
[9]
[10] Carlo Blundo, Alfredo De Santis, and Moni Naor, Visual cryptography for grey level images Volume 75,Issue 630 November 2000, Pages 255-259.
[2]
[3]
[4]
[5]
[6]
Nagaraj V . Dharwadkar, B . B . Amberker , Sushil Raj Joshi Visual Cryptography for Color Image using Color Error Difusion ICGST GVIP Journal ISSN:1687-398X,Volume 10,Issue 1,February 2010. Feng Liu, ChuanKun Wu,XiJun Lin, A new denition of the contrast of visual cryptography scheme, Information Processing Letters(2010),doi:10.1016/j.ipl.2010.01.003.
[7]
Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], 3-5 August 2010