Secret Sharing Using Visual Cryptography

Similar documents
An Application of Visual Cryptography To Financial Documents

Friendly Medical Image Sharing Scheme

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

The Misuse of RC4 in Microsoft Word and Excel

Split Based Encryption in Secure File Transfer

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

SecureMessageRecoveryandBatchVerificationusingDigitalSignature

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

A Secure Model for Cloud Computing Based Storage and Retrieval

Enhance data security of private cloud using encryption scheme with RBAC

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

SCAN-CA Based Image Security System

Safer data transmission using Steganography

MANY commercial products and methods have been

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

An Introduction to Cryptography and Digital Signatures

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality

Hill s Cipher: Linear Algebra in Cryptography

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Triple Security of Information Using Stegnography and Cryptography

SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK

Data Integrity by Aes Algorithm ISSN

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Fully homomorphic encryption equating to cloud security: An approach

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Image Processing Based Automatic Visual Inspection System for PCBs

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

A SOFTWARE COMPARISON OF RSA AND ECC

Steganography and Visual Cryptography in Computer Forensics

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Combine Use of Steganography and Visual Cryptography for Online Payment System

Security Evaluation of Robust Chaotic Block Cipher

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN

HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW

Signature Amortization Technique for Authenticating Delay Sensitive Stream

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

A Security Integrated Data Storage Model for Cloud Environment

Information Security in Big Data using Encryption and Decryption

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

Insight Guide. Encryption: A Guide

Encryption and Decryption for Secure Communication

ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURITY OBJECTS REGISTER

A Dynamic Approach to Extract Texts and Captions from Videos

Software Tool for Implementing RSA Algorithm

Efficient nonce-based authentication scheme for Session Initiation Protocol

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2

Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

IMAGE HALFTONE TECHNIQUE IN VISUAL SECRET SHARING

Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem

Cryptography Worksheet Polybius Square

Accessing Private Network via Firewall Based On Preset Threshold Value

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Secret Sharing based on XOR for Efficient Data Recovery in Cloud

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Final Project RSA Secure Chat Server CSC 290 Warren Fong

Savitribai Phule Pune University

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

Content Teaching Academy at James Madison University

Introduction to Encryption

Computer Security: Principles and Practice

International ejournals

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

Secure Large-Scale Bingo

Design of a Secure File transfer System Using Hybrid Encryption Techniques

IDRBT Working Paper No. 11 Authentication factors for Internet banking

MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Transcription:

International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 4, August 2014, PP 46-52 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Secret Sharing Using Visual Cryptography Renu Poriye M.Tech. (C.SE) Manav Rachna International University Faridabad renu.janagal@gmail.com Dr S. S Tyagi Head of Department Department of Computer Engineering Manav Rachna International University Faridabad Abstract: Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex process. Visual cryptography, is a secure process for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret easily. In this paper a visual cryptography scheme is proposed. This technique first encrypts the secret using a symmetric key and then divides the secret into shares. After piling of shares, secret does not appear, until the symmetric key is not known. This technique is proposed for binary images. Here the symmetric key used for encryption and decryption is a small binary image. Keywords: Visual Cryptography, (key, 2, 2)Visual cryptographic scheme, Encryption 1. INTRODUCTION In order to guard data and debase computation, Naor and Shamir introduces the concept of Visual cryptography. Main feature of visual cryptography scheme (VCS) is that it does not need mathematical computation to get the original secret. In VCS [1][9], visual information is chopped into n shares and distributed to n participants. At least p no. of shareholders can reveal the actual image if their shares are piled properly in proper orientation. But fewer than p shares gets no information about the secret. This is referred as p out of n VCS [2] and symbolically written as (p,n) VCS. The main problem of most visual cryptography scheme for binary image is that the decrypted image size is larger than original and also some security issues are present. The proposed VCS have tried to overcome both issue. The size of shares is same as original while security is provided using the concept of symmetric key encryption. We have also successfully implemented this scheme in Matlab R2009a. Here the proposed scheme is described in section-3. Result of implementation is shown in section-4. Comparison of new scheme with others is shown in section-5. Conclusion and Future work is described in section-6. 2. RELATED WORK Visual cryptography enrooted by M. Naor and A. Shamir, and they described general (p,n) VCS. When shares are merged using OR/XOR operation, grayed secret image recovered. Fig1. Shares used by Naor and Shamir in(2,2) VCS ARC Page 46

Renu Poriye & Dr S. S Tyagi They designed (2,2) VCS using 4 subpixels, it means one pixel of original image provokes 4 subpixels in each share. Hence share size is 4 times as original. Here are some induced share for their (2,2) scheme[5][9] Tai-wen Yue and Chian[13] introduces a modified scheme in which the share dimension is twice of riginal in horizontal direction while remains same in vertical direction. Its contrast is same as Naor and Shamir 2 out of 2 schemes Fig2. Shares used by Tai-wen and Suchen Chian[8] D. Jena and S. K. Jena proposed data hiding in halftone images using conjugate ordered dithering DHCOD)[5]. They considered security of shares [5] in visual cryptography. Firstly, shares are generated using basic scheme. Then these shares are watermarked [5] with some cover image using DHCOD [5]. The decryption is made by human visual system. Abhisek Parakh and Subhas Kak proposed a (2, 3) VCS based on recursive hiding scheme [1],[12]. All the above mentioned schemes increase the size of shares and loss visual fidelity. 3. THE SCHEME The proposed scheme consider security of image in terms of encrypting it with the help of symmetric key, hence if someone access all the shares in unauthorized way, he/she cann t decrypt it completely without symmetric key. This scheme manages security as well as decrypted images are of same size as original. The scheme is divided into three parts: Encryption of original image using symmetric key. Generation of Shares Decryption of Overlapped shares. 3.1. Encryption Process Divide images into blocks such that block size equals to key size. Each block is XORed with key and then placed again in its original position. Now, encrypted image is divided into shares using visual cryptography. 3.2. Share Generation To overcome the increasing size problem, following approach is used for share generation. By considering 4 pixel of input image at a time and then generating 4 output pixel for each share[8]. There are 16 cases which are in following 5 Categories. Shares and symmetric key is transmitted to the receiver. We can also divide the symmetric key into shares for more security. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 47

Secret Sharing Using Visual Cryptography Table1. Cases for share generation 3.3. Decryption Process At Receiver site, shares are combined and combined share is Divided into blocks such that block size equals to key size. Each block is XORed with key and then placed again in its original position. Now original secret image is recovered. 4. RESULT The above mentioned scheme is implemented into MATLAB R2009a. The results are as our expectation. Fig3(a). Original Secret Image (512 x 512) International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 48

Renu Poriye & Dr S. S Tyagi Fig3(b). Key (64 x 64) Fig3(c). Encrypted Image (512 x 512) Fig3(d). Share 1 (512 x 512) International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 49

Secret Sharing Using Visual Cryptography Fig3(e). Share 2 (512 x 512) Fig3(f). Overlapping Share 1 & Share 2 (512 x 512) International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 50

Renu Poriye & Dr S. S Tyagi 5. COMPARISON Fig3(g). Decrypted Image (512 x 512) The existing Visual Secret Sharing schemes increases size of decrypted image and security gets ruined if someone has access to all shares. The proposed scheme improves with respect to size and security with a limitation of aspect ratio of original image cannot be maintained. Table2. Comparison of proposed scheme with other vcs No. of Pixel Original Image Each share of Naor and Shamir (2,2) Scheme Each share of Basis (2,2) Scheme 100 400 200 100 Security Not Secure Secure until all shares are not intercepts 6. CONCLUSION & FUTURE WORK Secure until all shares are not intercepts Each Share of Proposed VCS More than all VCS until key is not known. As conclusion it can be said that; visual information where size and security is more concerned, the proposed visual cryptography scheme is undoubtedly fine and fantastic to use. But, this scheme increases some kind of computation at time of encryption and decryption. This scheme is best suitable for pictures having secret in the form of text. This scheme can be extended for colored images and for hiding multiple secrets. Instead of symmetric key, stream cipher can be applied for encrypting image. ACKNOWLEDGEMENTS We are thankful to technical staff of the Manav Rachna International University. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 51

Secret Sharing Using Visual Cryptography REFERENCES [1] Wu C., Chen L., A study on visual cryptography, Master s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. [2] Sirisha B. L., Lakshmi G. S., A novel cryptographic technique under visual secret sharing scheme for binary image, International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp: 1473-1484. [3] Yu B., Xu X., Fang L., Multi-secret Sharing Threshold Visual Cryptography Scheme, International Conference on Computational Intelligence and Security, 2007 [4] Parakh A., Kak S., A Recursive Threshold Visual Cryptography Scheme, Dept. of Computer Science, Oklahoma State University. [5] Jena D., Jena S. K., A Novel Visual Cryptographic Scheme, IEEE,2008, pp. 207 211. [6] Kessler G. C., An Overview of Cryptography - http://www.garykessler.net/library/crypto.html. 28 April 2013. [7] Pal J. K., Mamdal J. K., Gupta K. D., A (2, N) Visual Cryptographic Technique For Banking Applications, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010. [8] Weir J., Yan W. Q., Sharing Multiple Secrets Using Visual Cryptography, IEEE, 2009 [9] Naor M., Shamir A., Visual cryptography, Advances in Cryptology EUROCRYPT 94. Lecture Notes in Computer Science,1995,(950):pp. 1-12. [10] Mandal, J.K.; Ghatak, S. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC), Electronic System Design (ISED), 2011 International Symposium on, On page(s): 329 334 [11] Mandal, J.K.; Ghatak, S. Secret image / message transmission through meaningful shares using (2, 2) visual cryptography (SITMSVC), Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 268 [12] Katta S., Recursive Information Hiding in Visual Cryptography, 2010 [13] Yue T. W., Chiang S., A Neural Network Approach for Visual Cryptography. Proceedings of the IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN 00).pp. 1-2. [14] Chakraborty U., Paul J. K., Mahapatra P. R. S., Desigan and Implementaion of a (2,2) and a (2,3) Visual cryptographic scheme. IJCCT Vol.1 Issue 2,3,4; 2010. International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Page 52