Progress In Science and Engineering Research Journal ISSN 2347-6680 (E) IMAGE ENCRYPTION USING DIVERSE IMAGE MEDIA Dipali D. Batane1,Anagha M. Bhunje2, Poornima B. Chavan3 , Anjali S. Kothule4, M.D.Shelar5 1,2,3,4 U.G. Scholars, 5Assistant Professor Department of Computer Engineering, VPCOE, Baramati, India Abstract: This paper gives idea about sharing the digital Index Terms: Visual Secrete Sharing Scheme, Visual image without affecting its privacy. It proposes possible Cryptography, Transmission Risk Problem, Natural ways to hide the noise-like share and reduce transmission Shares. risk problem for sharing.The idea of the visual cryptography is to split a secret image into two random I. INTRODUCTION shares (printed on transparencies) with each participant holding one or more shares. The basic principle of the In day to day life information is increasingly visual cryptography scheme (VCS) was first introduced by important and gets more value when shared with Naor and Shamir [1]. VSS is visual secret sharing scheme others. Due to networking and communication media, which mainly focuses on sharing secret images. Visual it is used to share the important information like Secret Sharing Scheme suffers from the transmission risk images, audio, video, pictures easily. Hackers tried to problems. access unauthorized data. To solve this problem Natural image based visual secret sharing scheme reduces certain techniques are used. Today, in computer-aided this problem of transmission. In that secret images are environment sharing visual secrets images has transferred through various carriers to protect the secret becomes an important issue today. Secret images can and participant also. The proposed natural image based be various types such as handwritten documents, visual secret sharing scheme can transmit one digital photographs and others. Visual cryptography[1] is a image or printed image and noise like share over n-1 technique that encrypts a secret image into n shares natural shares. The natural images may be in printed or with each participant holding one or more shares. in digital form. Regardless of the number of participants the value of n increases, the NVSS scheme uses only one Visual Secret Sharing scheme (VSS) is implemented noise share for sharing the secret image. It proposes a to hide secret images that are either printed useful concept and method for using unaltered images as transparencies or are encoded and stored in digital shares in a VSS scheme Natural image is a combination of printed and digital image. Natural image and printed image generate one noise like share. The noise-like share is based on these natural shares and the secret image. The form [1]. Visual secret sharing is a technique used to deliver and transmit secret images. They satisfy the security requirement for protecting secret content, but proposed approach gives an excellent solution for solving they suffer from transmission risk problem because the transmission risk problem for the VSS schemes. The holding noise like shares will cause hacker’s unaltered natural shares are different, thus reducing the suspicion and share may be intercepted. The shares transmission risk problem. can be defined as the noise-like pixels or display low quality images.VSS scheme use a unity carrier for Corresponding Author: [1] 1. Ms. Anagha M. Bhunje. U.G. Scholars: Department of sharing images. Computer Engg, VPCOE, Baramati, India. To solve this problem, Natural image based Visual Email Id: [email protected] 2. Ms. Dipali D. Batane, Ms. Poornima B. Chavan , Ms. Secret Sharing(NVSS) is proposed. NVSS scheme Anjali S. Kothule, U.G. Scholar. Department of Computer uses diverse media for sharing digital images. The Engg, VPCOE, Baramati, [email protected], India, Email Id: [email protected] 3. diverse media contains handwritten documents, [email protected], photographs, digital images, printed images, painted Prof. M. D. Shelar, Assistant Professor, Department of pictures and so on. The NVSS scheme can share a Computer Engg, VPCOE, Baramati, India digital secrete image over n-1 arbitrary natural © 2015 PISER Journal http://.piserjournal.org/ PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal Page(s) 045-048 Progress In Science and Engineering Research Journal ISSN 2347-6680 (E) images and one share. Instead of altering the content share image is generated randomly and other two of natural images, the NVSS scheme extracts features share images are based on the first share image and from each natural share. These unaltered natural the two coding tables designed using this scheme. shares are greatly reducing the interception possibility of these shares. The noise- like share can be concealed by using data hiding techniques. It can also be increase security level during transmission phase. It proposes a useful concept and method for using unaltered images as shares in a VSS scheme. 2] Conventional Secret Sharing Scheme Conventional visual secret sharing schemes [1] generate the noise-like shares and after that divide the noise like shares and transmit at the receiver side. Conventional visual secret sharing scheme suffers a management problem. It also suffers from a pixel encryption/decryption expansion problem; in pixel expansion the size of algorithm for the (n,n)-NVSS scheme. The algorithms recovered image is different as compare to original are applicable to digital and printed images. The image. NVSS scheme is user friendliness. But also reduces 3]Halftone Visual Cryptography Scheme transmission risk and enhances the security of Extended visual cryptography [4] is proposed participants and shares. recently to construct meaningful binary images as In this paper, develop II. LITERATURE SURVEY shares using hypergraph colourings.The drawback of Extended Visual Cryptography is that the visual The concept of Visual cryptography (VC which is a quality is poor. So Halftone visual cryptography new way by which the image can be secured; here proposed image is nothing but the plain text proposed by Naor halftoning. The proposed method generates visually and Shamir [1]. This image is divided into n pieces halftone shares carrying important visual information. which are called as shares. These shares are The generated visual quality is better than any transmitted to the participants. The participants can available VC schemes. decode the encrypted image by orderly stacking the n shares which will reveal the secret image. Any person without computer knowledge can also decode the cipher text by human vision which will be lucrative for security and defense. The shares are the secret key k that is basically distributed to n participants, the secret can be reconstructed only if the k shares are stacked together. The display quality of recovered to achieve visual cryptography via 4] Extended visual cryptography Scheme Extended visual cryptography scheme[5] is proposed to overcome the management problem. In this scheme n natural images and one secret image are used. Extended visual cryptography scheme adds cover image on each share so that it is easy to maintain for both sender and receiver. It is easy to know that in which cover which image is hidden. images is poor. Kai Hui Lee And Pei Ling Chiu[1] proposed Conventional Visual secret sharing scheme hides the secret image in shares ,but at the time of hiding secret image in share it will arouse suspicion to hacker that there is some hidden image in shares . Various Visual Cryptography techniques It is mainly useful for receiver to extract secret image by combing it with cover image. This approach is used to clarify the pixel expansion problems. This scheme is mainly used for binary secret images. 5]Color Visual Cryptography Scheme Color visual cryptography (VC)[8] encrypts a color secret message into color halftone image shares 1] (3,3)-Visual Secret Sharing Scheme .Color visual cryptography Scheme consists of two (3, 3)-visual secret sharing scheme [7], which can be parts, error diffusion and second one is pixel used to embed three secret messages into three shares synchronization. These two methods mainly used for and improve security. In this scheme, the first main color images. Error diffusion is an algorithm for © 2015 PISER Journal http://.piserjournal.org/ PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal Page(s) 045-048 Progress In Science and Engineering Research Journal ISSN 2347-6680 (E) halftone image generation and synchronization is a. used to improve the contrast of shares. This scheme Step 1: Traverse through entire input image array. develops encryption method algorithm for creating Step 2 : Read individual pixel color value (24-bit). meaningful shares. Step 3: Split the color value into individual R, G and Grayscaling B 8 Values III. THE PROPOSED SCHEME BACKGROUND In NVSS (Natural image Based Visual secret sharing scheme), digital secret image over n-1 randomly b = pix & 0xff; g = (pix >> 8) & 0xff; r = (pix >> 16) & 0xff; Step 4: Calculate the gray scale component (8-bit) for natural images and one share. This approach extracts given R, G and B pixels using a conversion features from each natural share. These unaltered formula. natural shares are greatly reducing the interception gs = (r + g + b) / 3; possibility of these shares. The generated noise like Step 5: Compose a 24-bit pixel value from 8-bit gray shares can be concealed by using data hiding scale value . techniques Step 6: Store the new value at same location in output to increase security level during transmission of information. In this technique secret image image and meaningful shares are taken as input, feature extraction algorithm and encryption algorithm b. Threshoding to obtain noisy share are applied .Further more Step 1: Traverse through entire input image array. security purpose, the noisy share are embedded with Step 2: Read individual pixel color value (24-bit) and carrier image and steganography technique is applied to get a stego image. Applying decryption and desteganography, the recovered secret image is obtained. A. Implementation convert it into gray scale. Step 3: Calculate the binary output pixel value (black or white) based on current threshold. Step 4: Store the new value at same location in output Image. In this section the feature extraction module is described. Feature images are extracted from the natural shares. Simultaneously the printed and digital images are applicable to the feature extraction process. Then the image preparation and pixelswapping modules are used. Feature Extraction Module Gray scaling includes black, white and also some shades of gray. Thresholding is the simplest method Fig 1. Encryption Process Of NVSS Scheme [ref] of image segmentation. From a gray scale image, thresholding can be used to create binary images In Password generation, calculate the number of black and white pixels. Then generate one key. This key is used for the encryption. When a large amount of noise clusters together, the image is severely disrupted; this makes it impossible for the naked eye to identify it. The pixels-swapping process is used to cope with this problem. c. Hide the Noise –Like Share Steganography Steganography is a process to transmit any kind of information without arousing suspicion. To avoid the transmission risk problem, the share S is concealed behind cover media so that it wouldn’t be detected by naked eyes. Generally the cover media is larger than the noisy share. © 2015 PISER Journal http://.piserjournal.org/ PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal Page(s) 045-048 Progress In Science and Engineering Research Journal d. ISSN 2347-6680 (E) Step 5:Stegnography technique is applied for hiding Encryption In the encryption phase, the n -1 feature images noisy share. In this technique, noisy share is hided (F1………Fn-1) combined with the secret image behind the carrier image. Execute the XOR operation to generate one noise- IV.CONCLUSION like share S with 24-bit/pixel color depth. In this paper, NVSS (n,n) scheme is used to solve Step 1. Traverse through the entire input image transmission risk problems using diverse media. In array. the NVSS (n,n) scheme uses ,only one noise share is Step 2. Read individual pixel value. used for sharing the secret image. The advantage of Step 3. NVSS scheme is user friendliness and maintains the Assume the initial value of the password is zero. security. Features are extracted from natural images Step 4. If x=y=0, then calculate black pixels. using feature extraction algorithm. Recovered images Step 5. If x=y=1, then calculate white pixels. are obtained using Encryption and Decryption Step 6. Add password value into the black and white algorithm. Security level is maintained using data pixels to hiding technique. Noise like share can be hide using Obtain first password value. steganography technique. By using steganography Step 7. Generate the password using three images. techniques, secret images can be hide in carrier images that are halftone gray images and true-color B. Software Implementation images. REFERENCES [1]. [2]. [3]. [4]. [5]. Fig.2.Software Design [ref] [6]. Step 1: The NVSS scheme can share secret image over n- 1 randomly choosen natural shares and one [7]. [8]. share. Step 2: The NVSS scheme extract the features from M. Naor and A. Shamir, “Visual cryptography”, in Advances in Cryptol-ogy,vol. 950. New York, NY, USA: Springer-Verlag, 1995,pp. 1-12. P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011. K. H. Lee and P. L. Chiu, “An extended visual cryptography algorithm for general access structures,” IEEE Trans. Inf. Forensics Security, vol. 7,no. 1, pp. 219–229, Feb. 2012. Z. Zhou, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography,”IEEE Trans. Image Process., vol. 15, no. 8, pp. 2441–2453,Aug. 2006. F. Liu and C. Wu, “Embedded extended visual cryptography schemes,”IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 307–322, Jun. 2011. T. H. N. Le, C. C. Lin, C. C. Chang, and H. B. Le, “A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images,” Digit. Signal Process., vol. 21, no. 6,pp. 734–745, Dec. 2011. Pei-Fang Tsai,Ming-Shi Wang “A (3,3) Visual Secrete Shaing scheme for hididng three secrete data” InKoo Kang, Member, IEEE, Gonzalo R. Arce, Fellow, IEEE, and Heung-Kyu Lee, Member, IEEE,” Color Extended Visual Cryptography Using Error Diffusion” the natural shares by performing the operations like Grayscaling, Thresholding etc. Step 3: With the help of Chaos sequence generator, based upon the sequence generated from thresholded image swap the pixels of secrete image. Step 4:In Encryption process ,.Noisy Share is generated. © 2015 PISER Journal http://.piserjournal.org/ PISER 18, Vol.03, Issue: 02/06 March – April ; Bimonthly International Journal Page(s) 045-048
© Copyright 2024