Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Electronics, Shah and Anchor Kuttchi Engineering College, Mumbai, 400088, India
Abstract Cryptography is a technique used for secure transformation of information that is secret data in presence of
unauthenticated interceptor. Visual Cryptography Scheme is a method that converts secret data like images or written text
into binary images and then encodes them into n images, also called as shares of images. For decoding only some of the n
shares or all n shares are required which are stacked on each other. The purpose of this review paper is to make clear the
idea of visual cryptography schemes and continued work in the area.
1. Introduction
Peoples have always a passion of keeping secret information away from the others. As the world becomes more connected, the demand for sharing confidential information on internet is increasing rapidly. Secret information like Credit
card information, Bank transaction statements, personal data, passwords of any important account are transmitted over the
Internet conveniently. While transmitting secret information an important topic to consider is Security of data. Hackers
may hack the data from the weak links over the internet and may change that data. So, Confidentiality, Integrity and
Availability are basic information security goals.
As technology progresses, the need for sophisticated methods of protecting data has increased. One important technique
to protect secret data is Visual Cryptography Scheme (VCS). VCS was invented by Moni Naor and Adi Shamir in 1994
at the Eurocrypt Conference [1]. In k-out-of-n VCS, secret image is encoded into n shares of binary patterns. These shares
are distributed among n participants. Participant doesnt have idea about the share of other participants. Secret is revealed
by k or more participants by superimposing k shares. The secret cannot be revealed by superimposing less than n shares.
This paper introduces the visual cryptography schemes in section 2. Section 3 will describe the applications in the field
of Visual Cryptography. Section IV concludes the paper.
ISSN: 2395-0560
Original
Pixel
Pixel
Value
Share
1
Share
2
Share1 +
Share2
0
0
1
1
2.1.2. n-out-of-n VCS
In this scheme secret image is encoded into n shares. By superimposing i shares where i < n will not reveal any information of the secret image [2].
2.1.3. k-out-of-n VCS
In this scheme secret image is encoded into n shares out of which any k shares are required for decryption (k < n) [2].
The secret image is invisible if less than k shares are stacked together.
ISSN: 2395-0560
0 1 1 0
0 1 1 0
(1)
C1 =
0 1 1 0
1 0 0 1
(2)
To select location in share, for secret information pixel is random, which may introduces white noise and leads to poor
visual quality. Hence, void and cluster algorithm is applied to choose these pixel locations.
2.4. Colour VCS
Color VC allows the use of natural color images to secure some type of information. It helps to reduce the risk of alerting someone to the fact that information is hidden within it. In 1996, Naor and Shamir published an article [9], which contains several important changes from previous work. They use two opaque colours and one white colour for sub pixel in
share. The first difference from previous work is that, the order in which shares are stacked. The second difference is that
each participant have more than single share.
Y. C. Hou [10] proposed colour VC scheme, in which original secret image is decomposed into three color images, under subtractive model, namely, C(Cyan), M(Magenta) and Y(Yellow). The size of three images is equal to original image.
After that each colour image is transformed into halftone image. Randomly generated half black and white mask is selected, for example-. There
are six possible patterns of mask. According to selected mask, three halftone colour
shares are generated such that after stacking the three shares secret image is revealed. Shares generated by proposed
method of Hou are larger than original image, as secret pixel is represented by several colour subpixels. Number of these
subpixels is referred as pixel expansion. Therefore, Yang and Chen proposed another method which uses Additive colour
model.
_____________________________________________________________________________________________________________
2015, IRJIE-All Rights Reserved
Page -12
ISSN: 2395-0560
4. Conclusion
Internet is used in all the aspects for sharing data to reduce time consumption. Visual Cryptographic Schemes provide
security during such data transfer. Hence, to know about the different Visual Cryptographic Schemes and their applications
different papers based on it are studied in this review paper.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Moni Naor and Adi Shamir, Visual Cryptography, advances in cryptography-Eurocrypt, 1994, Lecture Notes in Computer Science,
Vol. 950, pp 1-12.
Debashish Jena and Sanjay Kumar Jena, A Novel Visual Cryptographic Scheme, International Conference on Advanced Computer
Control, pp. 207-211, 2009.
G. Ateniese, C. Blundo, A. De Santis and D. R. Stinson, Extended Capabilities for Visual Cryptography, Theoretical Computer
Science, Vol.250 (2001) 143-161.
Meera Kamath, Arpita Parab, Extended Visual Cryptography for color images using coding tables ,2012 International Conference on Communication, Information & Computing Technology (ICCICT), Oct. 19-20, Mumbai, India.
Emi Myodo, Shigeyuki Sakazawa and Yasuhiro Takishima, Visual Cryptography based on void-and-cluster halftoning technique.
In ICIP, pages 97-100, 2006
Emi Myodo, Shigeyuki Sakazawa and Yasuhiro Takishima, Halftone Visual Cryptography embedding a natural grayscale image
based on error diffusion technique. In ICME, pages 2114-2117, 2007.
Zhongmin Wand and Gonzalo R. Arce, Halftone Visual Cryptography through error diffusion. In ICIP, pages 109-112, 2006.
M. Naor and B. Pinkas, Visual authentication and identification Crypto, Lecture Notes Comput. Sci., vol. 1294, pp. 322340, 1997.
Moni Naor and Adi Shamir, Visual Cryptography II: Improving the contrast via the cover base. In Proceedings of the International
Workshop on Security Protocols, pages 197-202, London, UK, 1997. Springer-Verlag.
Neha Gupta, Manish Gupta, Abhishek Mishra. Journey of VCS from Black and White Images to Colored Images with their Performance Analysis, International Journal of Computer Applications (0975-8887), Volume 79-No 9, October 2013.
B.Srikanth, G.Padmaja, Dr.Syed Khasim, Dr.P.V.S.Lakshmi, A.Haritha. Secured Bank Authentication using Image Processing and
Visual Cryptography, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2432-2437.
C. Chang and H.Wu, A copyright protection scheme of images based on visual cryptography, Imag. Sci. J., vol. 49, no. 3, pp.
141150, 2001.
C. Wang, S. Tai, and C. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Trans. Fundamentals
Electronic Communication.
_____________________________________________________________________________________________________________
2015, IRJIE-All Rights Reserved
Page -13