SlideShare ist ein Scribd-Unternehmen logo
1 von 21
-- Pallavi Khandekar
What is VC?
• Secret sharing scheme.

• Visual Cryptography (VC) was introduced by Moni
  Naor and Adi Shamir in Eurocrypt (1994).

• Used to encrypt written text/ pictures etc in a
  perfectly secure way.

• Decoding is done by human visual system,
  without any computation.
Secret Sharing Scheme
• Method of dividing a
  secret amongst a group
  of participants.           Share 1


• Each of the participants
  get a share of the         Share 2

  secret.
                             Share 1
• Sufficient number of          +
                             Share 2
  shares combined
  reveals the secret.
Example - k by n Scheme (k,n)

• Consider data D (text / image) divided into
   – n number of shares (D1, D2 …. Dn)
   – k or more shares when overlapped reveals
     information about the data
   – k-1 or fewer shares when overlapped reveal no
     information about the data


• If k = n then all participants are required to
  reconstruct the secret.
Preliminary Notations
• n = Group size

• k = Threshold

• m = number of pixels in a share. (loss in resolution
  from the original image to the recovered image)

• ɑ = the relative difference in the weight between the
  combined shares that come from a white pixel and a
  black pixel in the original image. Represents loss in
  contrast.
Preliminary Notations (contd..)
• C0 = Collection of n × m Boolean matrices for shares of
  white pixel.

• C1 = Collection of n × m Boolean matrices for shares of
  black pixel.

• V = ORed k rows.

• H(V) = Hamming weight.

• d = number in [1,m]
Example 2 by 2 scheme (2 subpixels)


Partition for black and white pixels in 2 by 2
scheme.
Example 2 by 2 scheme (2 subpixels)
This scheme can be explained by below values

• n=2                   • V1 = [1,1] or [1,1]


• m=2                   • H(V0 ) = 1


• k=2                   • H(V1) = 2


• V0 = [0,1] or [1,0]   • ɑ = H(V1) - H(V0 ) / m = 1/2
Implementation
• Platform: .Net Framework 3.5

• Language: C#

• Reason for selecting .Net:
   – Previous experience working on .Net.
   – It is optimal for developing and demonstrating application through UI.
   – .NET also has lot of support for image acquisition and manipulation.


• Other Platforms: Matlab, Python etc
DEMO
Technique Used
         White Pixel                Black Pixel



S0
                           S0


S1
                           S1




     0                 1        0                 1
Results for Text
Results for Image
Result for Image (contd..)
2 by 2 scheme with 4 sub pixels


Horizontal shares   Vertical shares   Diagonal shares
Results in 2 by 2 scheme (2 subpixels)
• The secret image I is encoded into Share1 & Share2 two
  shares.

• D is decoded by superimposing these two shares with 50%
  loss of contrast. (ɑ = ½)

• The decoded image is identified, although some contrast
  loss is observed.

• Due to pixel expansion the width of the decoded image is
  twice as that of the original image.
Advantages
• Simple to implement

• Decryption algorithm not required (Use a human Visual
  System). So a person unknown to cryptography can
  decrypt the message.

• We can send cipher text through FAX or E-MAIL.

• Lower computational cost since the secret message is
  recognized only by human eyes and not
  cryptographically computed.
Disadvantages
• The contrast of the reconstructed image is not
  maintained.

• Perfect alignment of the transparencies is troublesome.

• Due to pixel expansion the width of the decoded image
  is twice as that of the original image. Leads to loss of
  information due to change in aspect ratio.

• Additional processing is required for colored images.
Application
• Biometric security

• Watermarking

• Steganography

• Remote electronic voting

• Bank customer identification
   –   Bank sends customer a set of keys in advance
   –   Bank web site displays cipher
   –   Customer applies overlay, reads transaction key
   –   Customer enters transaction key
References
• http://en.wikipedia.org/wiki/File:Visual_crypto_animation_de
  mo.gif

• http://users.telenet.be/d.rijmenants/en/visualcrypto.htm

• http://www.cs.nccu.edu.tw/~raylin/UndergraduateCourse/Co
  mtenporaryCryptography/Spring2009/VisualCrypto.pdf
Thank you!

Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

Was ist angesagt? (20)

Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Edge linking in image processing
Edge linking in image processingEdge linking in image processing
Edge linking in image processing
 
Image compression
Image compressionImage compression
Image compression
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Singular Value Decomposition Image Compression
Singular Value Decomposition Image CompressionSingular Value Decomposition Image Compression
Singular Value Decomposition Image Compression
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Vector quantization
Vector quantizationVector quantization
Vector quantization
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Automatic Number Plate Recognition(ANPR) System Project
Automatic Number Plate Recognition(ANPR) System  Project Automatic Number Plate Recognition(ANPR) System  Project
Automatic Number Plate Recognition(ANPR) System Project
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Digital Image Processing: Image Segmentation
Digital Image Processing: Image SegmentationDigital Image Processing: Image Segmentation
Digital Image Processing: Image Segmentation
 

Andere mochten auch

Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
iaemedu
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
rupareliab14
 

Andere mochten auch (20)

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Vc pred
Vc predVc pred
Vc pred
 
Progre ppt
Progre  pptProgre  ppt
Progre ppt
 
Intro Watermarking
Intro WatermarkingIntro Watermarking
Intro Watermarking
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Steganography
SteganographySteganography
Steganography
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Digital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVDDigital Watermarking using DWT-SVD
Digital Watermarking using DWT-SVD
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 

Ähnlich wie Visual CryptoGraphy

Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
patisa
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
aya_hatem
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern Presentation
Daniel Cahall
 

Ähnlich wie Visual CryptoGraphy (20)

Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
Introduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural NetworksIntroduction to computer vision with Convoluted Neural Networks
Introduction to computer vision with Convoluted Neural Networks
 
Introduction to computer vision
Introduction to computer visionIntroduction to computer vision
Introduction to computer vision
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)Image compression 14_04_2020 (1)
Image compression 14_04_2020 (1)
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
notes_Image Compression.ppt
notes_Image Compression.pptnotes_Image Compression.ppt
notes_Image Compression.ppt
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
N017327985
N017327985N017327985
N017327985
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Digital Image Sharing Using NVSS
Digital Image Sharing Using NVSSDigital Image Sharing Using NVSS
Digital Image Sharing Using NVSS
 
Computer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathonComputer vision-nit-silchar-hackathon
Computer vision-nit-silchar-hackathon
 
Image Security
Image SecurityImage Security
Image Security
 
Deep Learning AtoC with Image Perspective
Deep Learning AtoC with Image PerspectiveDeep Learning AtoC with Image Perspective
Deep Learning AtoC with Image Perspective
 
Cahall Final Intern Presentation
Cahall Final Intern PresentationCahall Final Intern Presentation
Cahall Final Intern Presentation
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
06 cie552 image_manipulation
06 cie552 image_manipulation06 cie552 image_manipulation
06 cie552 image_manipulation
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Visual CryptoGraphy

  • 2. What is VC? • Secret sharing scheme. • Visual Cryptography (VC) was introduced by Moni Naor and Adi Shamir in Eurocrypt (1994). • Used to encrypt written text/ pictures etc in a perfectly secure way. • Decoding is done by human visual system, without any computation.
  • 3. Secret Sharing Scheme • Method of dividing a secret amongst a group of participants. Share 1 • Each of the participants get a share of the Share 2 secret. Share 1 • Sufficient number of + Share 2 shares combined reveals the secret.
  • 4. Example - k by n Scheme (k,n) • Consider data D (text / image) divided into – n number of shares (D1, D2 …. Dn) – k or more shares when overlapped reveals information about the data – k-1 or fewer shares when overlapped reveal no information about the data • If k = n then all participants are required to reconstruct the secret.
  • 5. Preliminary Notations • n = Group size • k = Threshold • m = number of pixels in a share. (loss in resolution from the original image to the recovered image) • ɑ = the relative difference in the weight between the combined shares that come from a white pixel and a black pixel in the original image. Represents loss in contrast.
  • 6. Preliminary Notations (contd..) • C0 = Collection of n × m Boolean matrices for shares of white pixel. • C1 = Collection of n × m Boolean matrices for shares of black pixel. • V = ORed k rows. • H(V) = Hamming weight. • d = number in [1,m]
  • 7. Example 2 by 2 scheme (2 subpixels) Partition for black and white pixels in 2 by 2 scheme.
  • 8. Example 2 by 2 scheme (2 subpixels) This scheme can be explained by below values • n=2 • V1 = [1,1] or [1,1] • m=2 • H(V0 ) = 1 • k=2 • H(V1) = 2 • V0 = [0,1] or [1,0] • ɑ = H(V1) - H(V0 ) / m = 1/2
  • 9. Implementation • Platform: .Net Framework 3.5 • Language: C# • Reason for selecting .Net: – Previous experience working on .Net. – It is optimal for developing and demonstrating application through UI. – .NET also has lot of support for image acquisition and manipulation. • Other Platforms: Matlab, Python etc
  • 10. DEMO
  • 11. Technique Used White Pixel Black Pixel S0 S0 S1 S1 0 1 0 1
  • 14. Result for Image (contd..)
  • 15. 2 by 2 scheme with 4 sub pixels Horizontal shares Vertical shares Diagonal shares
  • 16. Results in 2 by 2 scheme (2 subpixels) • The secret image I is encoded into Share1 & Share2 two shares. • D is decoded by superimposing these two shares with 50% loss of contrast. (ɑ = ½) • The decoded image is identified, although some contrast loss is observed. • Due to pixel expansion the width of the decoded image is twice as that of the original image.
  • 17. Advantages • Simple to implement • Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message. • We can send cipher text through FAX or E-MAIL. • Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed.
  • 18. Disadvantages • The contrast of the reconstructed image is not maintained. • Perfect alignment of the transparencies is troublesome. • Due to pixel expansion the width of the decoded image is twice as that of the original image. Leads to loss of information due to change in aspect ratio. • Additional processing is required for colored images.
  • 19. Application • Biometric security • Watermarking • Steganography • Remote electronic voting • Bank customer identification – Bank sends customer a set of keys in advance – Bank web site displays cipher – Customer applies overlay, reads transaction key – Customer enters transaction key
  • 20. References • http://en.wikipedia.org/wiki/File:Visual_crypto_animation_de mo.gif • http://users.telenet.be/d.rijmenants/en/visualcrypto.htm • http://www.cs.nccu.edu.tw/~raylin/UndergraduateCourse/Co mtenporaryCryptography/Spring2009/VisualCrypto.pdf

Hinweis der Redaktion

  1. The way we choose patter in each share is random.Co : all matrices obtained by permuting the columns of mentioned C0C1 : all matrices obtained by permuting the columns of mentioned C1
  2. As a part of project I have implemented 2 by 2 scheme with (2 sub pixels).And as I explained notations to you here are notation graphed for it
  3. Random class is used to generate 0 or 1This prevents for eves dropper from guessing the original pixel