A Proposed Model of Visual Cryptography Technique
Ms.Hiral Rathod Ms.Hiral Parmar
ABSTRACT: In digital era security is the most important issue and cryptography is one of the mathematical solution related aspects of Information Security like integrity, confidentiality, data security, entity data origin authentication and authentication. Visual cryptography is another new solution or technique which provides information security with the help of simple algorithm. Use of the visual cryptography is easier than complex algorithms used in different techniques like normal cryptography (Symmetric and asymmetric). Through this technique we allow visual information (pictures, text, etc) that will be encrypted
…show more content…
They demonstrated a visual secret sharing scheme, where an image is broken up into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original image. It uses two transparent images. One image that contains random pixels and the other image contain the secret information. It is almost impossible to get the secret information from one of the images. Both transparent images and layers are needed to reveal the information. The simplest way to implement Visual Cryptography is it should be print onto a transparent sheet into the two layers. Using a similar idea, transparencies can be used to implement a one-time pad encryption, where one transparency is a shared random pad, and another transparency acts as the cipher text.
Working Principal of Visual Cryptography: Each pixel of the images is separated into smaller blocks. There are two blocks which contains white and black color blocks.. If the pixel is divided into two parts, there is one white and one black block. Same way, If it is separated in four equal parts, two are white and two are black blocks.. Below is the figure 1 that uses the pixels that are separated into 4
…show more content…
One transparent image, layer 1 shown in figure 2, contains one of the six possible states. Layer 2 which is shown in figure 3 is identical to layer 1, except for the pixels that should be black (contain information) when overlaid which is shown in figure 4. These pixels have a state that is opposite to the same pixel in layer 1. If both images are overlapped, the areas with identical states will look gray, and the areas with opposite states will be black.
If the pixel states of layer 1 are genuinely (crypto secure) random, both empty and information pixels of layer 2 will also have fully random states. One cannot determine if a pixel in layer 2 is used to create a black or grey pixel, since we need the state of that pixel in layer 1 (which is random) to know the overlay result. If all requirements for true randomness are fulfilled, Visual Cryptography offers absolute secrecy according to the Information Theory.
Visual Cryptography is used to protect the sensitive data sent over the internet, here first of all sender can sent the random one or more image to receiver and if sender has the message he can select the layer 2 image with message itself. If the receiver gets the two layer image, he can retrieve the image without using complex
Then it passes through canny edge detection technique. It provides a binary image with wrinkle edges as shown in Fig. 4(a). The white pixels of the wrinkle area give information about wrinkle present in the facial image. In binary image, binary value 1 is used for white pixel, and binary value 0 is for black pixel. So, sum of the pixel values of wrinkle area in binary face image is directly proportional to wrinkle present in the face as shown in Fig. 4(b).
determine each pixel belongs to background or foreground. Wis the weights between the pattern and summationneurons, which are used to point out with which a pattern belongs to the background or foreground. They areupdated when each new value of a pixel at a certain position received by implementing the following function:Wt+1ib =fc(1−βNpn)Wib+MAtβ!(37)Wt+1i f=(1−Wt+1ib)(38)whereWtibis the weight between theith pattern neuron and the background summation neuron at timet,βisthe learning rate,Npnis the number of the pattern neurons of BNN,fcis the following function:fc(x)1,x>1x,x≤1(39)MAtindicates the neuron with the maximum response (activation potential) at frame t, according to:MAt1,f or neuron with maximum response0,otherwise(40)Function
Ever since data is in encrypted format, its probably difficult for attacker to decode it ; but this will ultimately lead to data owner to suffer in one or the other way. 6. In order to solve this problem metadata is stored for each server content into proxy server. 7. Suppose size of data stored in server 1 is 2GB and similarly size of data stored in server2 is 2 GB.
In our algorithm, we have already taken a good quality of image. 3) Binarize To binarize the image the ridges are denotted by black and furrow are denotted by the white.
This is done by calculating the hash value of the image, both before and after the image is
ASSIGNMENT # 3 Hashing Hashing is the renovation of a thread of characters addicted to a more often than not shorter fixed-length value or answers that stand for the innovative string. Uses of Hashes: If we discuss about the uses of hashing so we see many examples relevant to Hashing, some we described here in which alphabetical listing and retrieve substance in a database because the reason is that it is more rapidly to discover the substance with the help of hashed key HK then to discover. It using the innovative value it is also used in encryption algorithms.
Tallmadge created a system where numbers were substituted for commonly used words, names, and places to encode messages, and he provided a key to Washington, Woodhull, and Robert Townsend, or any other member of the spy ring to reference. Another tool used by the spy ring was invisible ink. This was supplied by Washington. The invisible ink was generally applied on the back of letters whose appearances were completely normal. To read the hidden message, the recipient would apply a chemical reagent.
In this cipher we make a key before encrypting the message so that it is a bit more secure. In this method the key shifts the alphabets according to its position. In this encryption the key needs to be known for the person decrypting it because there are about 26n possibilities where n is the number of letters in the string.
Biometric face recognition technology has received significant attention in the past several years to use human face as a key to security. Both law enforcement and non-law enforcement are its application. Face recognition system comprises of two Categories: verification and identification. Face Verification is Done in 1:1 match ratio. It is utilized to looks at a face pictures against a Template face pictures, whose identity being claimed.
Over time biometric encryption is used as a solution to biometric security threat(Cavoukian & Stoianov, 2007),(Jain, Nandakumar, & Nagar, 2008). Biometric encryption is either symmetric or asymmetric. The process in which a single key is used for the purpose of encryption and decryption is known symmetric encryption. Whereas, asymmetric encryption involves the use of two different but related keys-the encryption key, and decryption key However, some Information Communication Technology experts have criticised the fact that several agencies are deploying biometric technology in their operations.
Even when the text file and key both get hacked or interpreted by third party user it will open up text file which does not contain actual secret message until he knows what actually an Algorithm used he can’t retrieve the original secret message. This protects the data from being invisible and hence be secure during transmission. The user at receiving end uses an Algorithm of code to retrieve the actual secret message from the cover text using Matrix file as key. Key words: Steganography, cryptography, cover text 1. INTRODUCTION Steganography is the art or practice of concealing a message, image, or file within another message, image, or file.
It provides the security to avoid illegal copying of records through not allowing to be copied a record without the permission of the author. For example, A complete
Information transmission and exchange over shared channels such as Internet, Intranet…etc, becoming a more necessity for all fields in our daily life. It is therefore possible for any user to intercept the sensitive data that is transmitted over the shared channel. So information security and data encryption are becoming more and more important. Information encryption techniques have been an important and active research area from ancient time to nowadays, which involves a number of applications such as military communication, intellectual properties protection, information security, to name a few. One of the major purposes of data encryption is that one is able to encode data to be sent in such a way, that it is difficult for an unauthorized
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. There are lots of techniques used for data hiding; Steganography and Watermarking; Steganography is an ancient well-known technology which has many applications even in today’s modern society. It is the art and science of hiding a secret message within a cover media in such way that only intended recipient have knowledge about secret message and the extraction of it at its destination. Cover media can be image, audio, video, text and network. It is concerned with sending a secret message while hiding its existence.
Abstract— In recent years, video surveillance systems become more important to enhance the security and safety of people. These systems can use in various fields such as smart home, office, bank security, monitoring the traffic and in public like shopping malls, railway stations, airports and so on. By using this system, it offers realtime display of the monitoring scene and video playback. Besides that, more comprehensive and specific monitoring with no limit of the line-of-sight can be achieved. In this paper, a study of video surveillance system which focusing on using wireless sensor network has been done.