IMAGE ENCRYPTION USING DIVERSE IMAGE MEDIA

Transcription

IMAGE ENCRYPTION USING DIVERSE IMAGE MEDIA
Progress In Science and Engineering Research Journal
ISSN 2347-6680 (E)
IMAGE ENCRYPTION USING DIVERSE IMAGE MEDIA
Dipali D. Batane1,Anagha M. Bhunje2, Poornima B. Chavan3 , Anjali S. Kothule4, M.D.Shelar5
1,2,3,4
U.G. Scholars, 5Assistant Professor
Department of Computer Engineering, VPCOE, Baramati, India
Abstract: This paper gives idea about sharing the digital
Index Terms: Visual Secrete Sharing Scheme, Visual
image without affecting its privacy. It proposes possible
Cryptography, Transmission Risk Problem, Natural
ways to hide the noise-like share and reduce transmission
Shares.
risk problem for sharing.The idea of the visual
cryptography is to split a secret image into two random
I. INTRODUCTION
shares (printed on transparencies) with each participant
holding one or more shares. The basic principle of the
In day to day life information is increasingly
visual cryptography scheme (VCS) was first introduced by
important and gets more value when shared with
Naor and Shamir [1]. VSS is visual secret sharing scheme
others. Due to networking and communication media,
which mainly focuses on sharing secret images. Visual
it is used to share the important information like
Secret Sharing Scheme suffers from the transmission risk
images, audio, video, pictures easily. Hackers tried to
problems.
access unauthorized data. To solve this problem
Natural image based visual secret sharing scheme reduces
certain techniques are used. Today, in computer-aided
this problem of transmission. In that secret images are
environment sharing visual secrets images has
transferred through various carriers to protect the secret
becomes an important issue today. Secret images can
and participant also. The proposed natural image based
be various types such as handwritten documents,
visual secret sharing scheme can transmit one digital
photographs and others. Visual cryptography[1] is a
image or printed image and noise like share over n-1
technique that encrypts a secret image into n shares
natural shares. The natural images may be in printed or
with each participant holding one or more shares.
in digital form. Regardless of the number of participants
the value of n increases, the NVSS scheme uses only one
Visual Secret Sharing scheme (VSS) is implemented
noise share for sharing the secret image. It proposes a
to hide secret images that are either printed
useful concept and method for using unaltered images as
transparencies or are encoded and stored in digital
shares in a VSS scheme Natural image is a combination
of printed and digital image. Natural image and printed
image generate one noise like share. The noise-like share
is based on these natural shares and the secret image. The
form [1]. Visual secret sharing is a technique used to
deliver and transmit secret images. They satisfy the
security requirement for protecting secret content, but
proposed approach gives an excellent solution for solving
they suffer from transmission risk problem because
the transmission risk problem for the VSS schemes. The
holding noise like shares will cause hacker’s
unaltered natural shares are different, thus reducing the
suspicion and share may be intercepted. The shares
transmission risk problem.
can be defined as the noise-like pixels or display low
quality images.VSS scheme use a unity carrier for
Corresponding Author: [1]
1.
Ms. Anagha M. Bhunje. U.G. Scholars: Department of
sharing images.
Computer Engg, VPCOE, Baramati, India.
To solve this problem, Natural image based Visual
Email Id: [email protected]
2.
Ms. Dipali D. Batane, Ms. Poornima B. Chavan , Ms.
Secret Sharing(NVSS) is proposed. NVSS scheme
Anjali S. Kothule, U.G. Scholar. Department of Computer
uses diverse media for sharing digital images. The
Engg,
VPCOE,
Baramati,
[email protected],
India,
Email
Id:
[email protected]
3.
diverse media contains
handwritten documents,
[email protected],
photographs, digital images, printed images, painted
Prof. M. D. Shelar, Assistant Professor, Department of
pictures and so on. The NVSS scheme can share a
Computer Engg, VPCOE, Baramati, India
digital secrete image over n-1 arbitrary natural
© 2015 PISER Journal
http://.piserjournal.org/
PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal
Page(s) 045-048
Progress In Science and Engineering Research Journal
ISSN 2347-6680 (E)
images and one share. Instead of altering the content
share image is generated randomly and other two
of natural images, the NVSS scheme extracts features
share images are based on the first share image and
from each natural share. These unaltered natural
the two coding tables designed using this scheme.
shares are greatly reducing the interception possibility
of these shares. The noise- like
share can be
concealed by using data hiding techniques. It can
also be increase security level during transmission
phase. It proposes a useful concept and method for
using unaltered images as shares in a VSS scheme.
2] Conventional Secret Sharing Scheme
Conventional visual secret sharing schemes [1]
generate the noise-like shares and after that divide the
noise like shares and transmit at the receiver side.
Conventional visual secret sharing scheme suffers a
management problem. It also suffers from a pixel
encryption/decryption
expansion problem; in pixel expansion the size of
algorithm for the (n,n)-NVSS scheme. The algorithms
recovered image is different as compare to original
are applicable to digital and printed images. The
image.
NVSS scheme is user friendliness. But also reduces
3]Halftone Visual Cryptography Scheme
transmission risk and enhances the security of
Extended visual cryptography [4] is proposed
participants and shares.
recently to construct meaningful binary images as
In
this
paper,
develop
II. LITERATURE SURVEY
shares using hypergraph colourings.The drawback of
Extended Visual Cryptography is that the visual
The concept of Visual cryptography (VC which is a
quality is poor. So Halftone visual cryptography
new way by which the image can be secured; here
proposed
image is nothing but the plain text proposed by Naor
halftoning. The proposed method generates visually
and Shamir [1]. This image is divided into n pieces
halftone shares carrying important visual information.
which are called as shares. These shares are
The generated visual quality is better than any
transmitted to the participants. The participants can
available VC schemes.
decode the encrypted image by orderly stacking the n
shares which will reveal the secret image. Any person
without computer knowledge can also decode the
cipher text by human vision which will be lucrative
for security and defense. The shares are the secret key
k that is basically distributed to n participants, the
secret can be reconstructed only if the k shares are
stacked together. The display quality of recovered
to
achieve
visual
cryptography
via
4] Extended visual cryptography Scheme
Extended visual cryptography scheme[5] is proposed
to overcome the management problem. In this scheme
n natural images and one secret image are used.
Extended visual cryptography scheme adds cover
image on each share so that it is easy to maintain for
both sender and receiver. It is easy to know that in
which cover which image is hidden.
images is poor.
Kai Hui
Lee And Pei Ling Chiu[1] proposed
Conventional Visual secret sharing scheme hides the
secret image in shares ,but at the time of hiding secret
image in share it will arouse suspicion to hacker that
there is some hidden image in shares .
Various Visual Cryptography techniques
It is mainly useful for receiver to extract secret image
by combing it with cover image. This approach is
used to clarify the pixel expansion problems. This
scheme is mainly used for binary secret images.
5]Color Visual Cryptography Scheme
Color visual cryptography (VC)[8] encrypts a color
secret message into color halftone image shares
1] (3,3)-Visual Secret Sharing Scheme
.Color visual cryptography Scheme consists of two
(3, 3)-visual secret sharing scheme [7], which can be
parts, error diffusion and second one is pixel
used to embed three secret messages into three shares
synchronization. These two methods mainly used for
and improve security. In this scheme, the first main
color images. Error diffusion is an algorithm for
© 2015 PISER Journal
http://.piserjournal.org/
PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal
Page(s) 045-048
Progress In Science and Engineering Research Journal
ISSN 2347-6680 (E)
halftone image generation and synchronization is
a.
used to improve the contrast of shares. This scheme
Step 1: Traverse through entire input image array.
develops encryption method algorithm for creating
Step 2 : Read individual pixel color value (24-bit).
meaningful shares.
Step 3: Split the color value into individual R, G and
Grayscaling
B 8 Values
III. THE PROPOSED SCHEME
BACKGROUND
In NVSS (Natural image Based Visual secret sharing
scheme), digital secret image over n-1 randomly
b = pix & 0xff;
g = (pix >> 8) & 0xff;
r = (pix >> 16) & 0xff;
Step 4: Calculate the gray scale component (8-bit) for
natural images and one share. This approach extracts
given R, G and B pixels using a conversion
features from each natural share. These unaltered
formula.
natural shares are greatly reducing the interception
gs = (r + g + b) / 3;
possibility of these shares. The generated noise like
Step 5: Compose a 24-bit pixel value from 8-bit gray
shares can be concealed by using data hiding
scale value .
techniques
Step 6: Store the new value at same location in output
to
increase
security
level
during
transmission of information. In this technique secret
image
image and meaningful shares are taken as input,
feature extraction algorithm and encryption algorithm
b. Threshoding
to obtain noisy share are applied .Further more
Step 1: Traverse through entire input image array.
security purpose, the noisy share are embedded with
Step 2: Read individual pixel color value (24-bit) and
carrier image and steganography technique is applied
to get a stego image. Applying decryption and
desteganography, the recovered secret image is
obtained.
A. Implementation
convert it into gray scale.
Step 3: Calculate the binary output pixel value
(black or white) based on current threshold.
Step 4: Store the new value at same location in output
Image.
In this section the feature extraction module is
described. Feature images are extracted from the
natural shares. Simultaneously the printed and digital
images are applicable to the feature extraction
process. Then the image preparation and pixelswapping modules are used.
Feature Extraction Module
Gray scaling includes black, white and also some
shades of gray. Thresholding is the simplest method
Fig 1. Encryption Process Of NVSS Scheme [ref]
of image segmentation. From a gray scale image,
thresholding can be used to create binary images In
Password generation, calculate the number of black
and white pixels. Then generate one key. This key is
used for the encryption. When a large amount of
noise clusters together, the image is severely
disrupted; this makes it impossible for the naked eye
to identify it. The pixels-swapping process is used to
cope with this problem.
c. Hide the Noise –Like Share
Steganography
Steganography is a process to transmit any kind of
information without arousing suspicion. To avoid the
transmission risk problem, the share S is concealed
behind cover media so that it wouldn’t be detected by
naked eyes. Generally the cover media is larger than
the noisy share.
© 2015 PISER Journal
http://.piserjournal.org/
PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal
Page(s) 045-048
Progress In Science and Engineering Research Journal
d.
ISSN 2347-6680 (E)
Step 5:Stegnography technique is applied for hiding
Encryption
In the encryption phase, the n -1 feature images
noisy share. In this technique, noisy share is hided
(F1………Fn-1) combined with the secret image
behind the carrier image.
Execute the XOR operation to generate one noise-
IV.CONCLUSION
like share S with 24-bit/pixel color depth.
In this paper, NVSS (n,n) scheme is used to solve
Step 1.
Traverse through the entire input image
transmission risk problems using diverse media. In
array.
the NVSS (n,n) scheme uses ,only one noise share is
Step 2. Read individual pixel value.
used for sharing the secret image. The advantage of
Step 3.
NVSS scheme is user friendliness and maintains the
Assume the initial value of the password is
zero.
security. Features are extracted from natural images
Step 4. If x=y=0, then calculate black pixels.
using feature extraction algorithm. Recovered images
Step 5. If x=y=1, then calculate white pixels.
are obtained using Encryption and Decryption
Step 6. Add password value into the black and white
algorithm. Security level is maintained using data
pixels to
hiding technique. Noise like share can be hide using
Obtain first password value.
steganography technique. By using steganography
Step 7. Generate the password using three images.
techniques, secret images can be hide in carrier
images that are halftone gray images and true-color
B. Software Implementation
images.
REFERENCES
[1].
[2].
[3].
[4].
[5].
Fig.2.Software Design [ref]
[6].
Step 1: The NVSS scheme can share secret image
over n- 1 randomly choosen natural shares and one
[7].
[8].
share.
Step 2: The NVSS scheme extract the features from
M. Naor and A. Shamir, “Visual cryptography”, in
Advances in Cryptol-ogy,vol. 950. New York, NY, USA:
Springer-Verlag, 1995,pp. 1-12.
P. L. Chiu and K. H. Lee, “A simulated annealing algorithm
for general threshold visual cryptography schemes,” IEEE
Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001,
Sep. 2011.
K. H. Lee and P. L. Chiu, “An extended visual cryptography
algorithm for general access structures,” IEEE Trans. Inf.
Forensics Security, vol. 7,no. 1, pp. 219–229, Feb. 2012.
Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual
cryptography,”IEEE Trans. Image Process., vol. 15, no. 8,
pp. 2441–2453,Aug. 2006.
F. Liu and C. Wu, “Embedded extended visual
cryptography schemes,”IEEE Trans. Inf. Forensics Security,
vol. 6, no. 2, pp. 307–322, Jun. 2011.
T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high
quality and small shadow size visual secret sharing scheme
based on hybrid strategy for grayscale images,” Digit.
Signal Process., vol. 21, no. 6,pp. 734–745, Dec. 2011.
Pei-Fang Tsai,Ming-Shi Wang “A (3,3) Visual Secrete
Shaing scheme for hididng three secrete data”
InKoo Kang, Member, IEEE, Gonzalo R. Arce, Fellow,
IEEE,
and Heung-Kyu Lee, Member, IEEE,” Color
Extended Visual Cryptography Using Error Diffusion”
the natural shares by performing the operations like
Grayscaling, Thresholding etc.
Step 3: With the help of Chaos sequence generator,
based upon the sequence generated from thresholded
image swap the pixels of secrete image.
Step 4:In Encryption
process ,.Noisy Share is
generated.
© 2015 PISER Journal
http://.piserjournal.org/
PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal
Page(s) 045-048