Visual form of text, image, audio, video etc.


Visual Cryptographybased Gray Share Generation                                DonaT Jose                                                                                  Sunder V               Department of Computer Science                                     Asst.Professor (Dept ofComputer Science)                 Adi Shankara Institute of Engineering                                        Adi Shankara Institute ofEngineering                And Technology, Kalady                                                             And Technology, Kalady                        Abstract-Visualcryptography plays a very crucial role for security of image based secret.Visual cryptography encrypts the image in to shares and in decryption processall shares are stacked together to reveal the secret image. This paperproposing a new scheme for color share generation. In this scheme R, G and Bcomponent is extracted from color image then apply gray share generationalgorithm on R component and make n number of R gray shares then all shares arecombine with B and G component to make color shares.

At decryption side B and Gcomponent is extracted from all shares and then combine all r gray share tomake r component and after that all R, G and B is combined to revealed thesecret image. Decrypted secret image has same size as original secret image.Keywords -Visualcryptography, color image, pixel expansion, secret image, hierarchical visualcryptography, share.                                                                                                                                                          I.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

           INTRODUCTION       Data security is very important becausemost of our data is travelled over internet. Many techniques have been proposedand developed for security of our data. Secret data will be in the form of text,image, audio, video etc. Visual cryptography plays a important role for imagesecurity. In this technique image is encrypted in to number of shares and atdecryption side all or some of the shares are overlapped with each other toreveal the secret image. We apply visual cryptography to encrypt color imageinstead of grayscale image or binary image.

In this paper color image is takenas an input to the system then we extract the R, G, and B component from colorimage. After extraction phase gray share generation algorithms is applied ononly R component and generate n number of R gray shares. In next step wecombine B and G component with all generated R gray shares to make colorshares. In decryption process we extract the B and G component from all sharesto make R gray shares then all R gray shares goes to gray share generationalgorithm and generates R component. After this step R component is combinewith B and G component to reveal the original secret image. Here we apply grayshare generation algorithm on R component and generates the shares and then combinewith B and G components to make color shares so the security of secret image isincreased by many fold.                                                                                                                                                        II.

           METHODOLOGY       This paper proposed a new scheme forcolor share generation using visual cryptography. Fig 1 shows color sharegeneration flow. In this flow color image is taken as input to the system thenwe decompose the R, G and B component. After this we have applied gray sharegeneration algorithm on R component and generate n number of R gray shareswhere n= 2, 4, 8… The generated R gray shares are combined with B and Gcomponent to make color share. Fig 1 shows the encryption process. Fig 2 showsgray share generation algorithm. In this algorithm first take empty mask whichhas same size as R component and fill up the empty mask with zeros.

Then applysystematic randomization with key and generation final key mask. In thisequation, n is the key value which is already delivered to transmitter andreceiver side. Based on the result of equation raw and column value is filledup by 0 and 1 by this way final key mask is generated.                                                                                                                                                                                                                                                       X=1-2n2Nowthe final key mask is XORed with R component and makes R gray shares. Afterthis step R gray shares are combined with B and G component to make colorshare.Fig 3 shows color share combination flow.

In this flow B and G componentis extracted from all color shares. Then all R gray shares are fed as input tothe gray share generation algorithm. At this stage all r gray shares and finalkey mask is XORed with each other to make R component. After this step Rcomponent is combine with B and G component to reveal the original color image.                                                                                                                                                                III.           CONCLUSION       This paper proposed a new color sharegeneration scheme using visual cryptography. In this scheme color image isencrypted in to n number of shares. Here gray share generation algorithm isapplied on R component and then n number of R gray shares are generated then all shares are combined with B, and Gcomponent to make color share so  thegenerated shares are highly secured.

The revealed secret image has same sizesoriginal image and visual quality is also maintained.    Visual Cryptographybased Gray Share Generation                                DonaT Jose                                                                                  Sunder V               Department of Computer Science                                     Asst.Professor (Dept ofComputer Science)                 Adi Shankara Institute of Engineering                                        Adi Shankara Institute ofEngineering                And Technology, Kalady                                                             And Technology, Kalady                        Abstract-Visualcryptography plays a very crucial role for security of image based secret.Visual cryptography encrypts the image in to shares and in decryption processall shares are stacked together to reveal the secret image.

This paperproposing a new scheme for color share generation. In this scheme R, G and Bcomponent is extracted from color image then apply gray share generationalgorithm on R component and make n number of R gray shares then all shares arecombine with B and G component to make color shares. At decryption side B and Gcomponent is extracted from all shares and then combine all r gray share tomake r component and after that all R, G and B is combined to revealed thesecret image. Decrypted secret image has same size as original secret image.Keywords -Visualcryptography, color image, pixel expansion, secret image, hierarchical visualcryptography, share.

                                                                                                                                                          I.           INTRODUCTION       Data security is very important becausemost of our data is travelled over internet. Many techniques have been proposedand developed for security of our data. Secret data will be in the form of text,image, audio, video etc. Visual cryptography plays a important role for imagesecurity.

In this technique image is encrypted in to number of shares and atdecryption side all or some of the shares are overlapped with each other toreveal the secret image. We apply visual cryptography to encrypt color imageinstead of grayscale image or binary image. In this paper color image is takenas an input to the system then we extract the R, G, and B component from colorimage. After extraction phase gray share generation algorithms is applied ononly R component and generate n number of R gray shares. In next step wecombine B and G component with all generated R gray shares to make colorshares. In decryption process we extract the B and G component from all sharesto make R gray shares then all R gray shares goes to gray share generationalgorithm and generates R component.

After this step R component is combinewith B and G component to reveal the original secret image. Here we apply grayshare generation algorithm on R component and generates the shares and then combinewith B and G components to make color shares so the security of secret image isincreased by many fold.                                                                                                                                                        II.           METHODOLOGY       This paper proposed a new scheme forcolor share generation using visual cryptography. Fig 1 shows color sharegeneration flow. In this flow color image is taken as input to the system thenwe decompose the R, G and B component. After this we have applied gray sharegeneration algorithm on R component and generate n number of R gray shareswhere n= 2, 4, 8… The generated R gray shares are combined with B and Gcomponent to make color share. Fig 1 shows the encryption process.

Fig 2 showsgray share generation algorithm. In this algorithm first take empty mask whichhas same size as R component and fill up the empty mask with zeros. Then applysystematic randomization with key and generation final key mask. In thisequation, n is the key value which is already delivered to transmitter andreceiver side. Based on the result of equation raw and column value is filledup by 0 and 1 by this way final key mask is generated.                                                                                                                                                                                                                                                       X=1-2n2Nowthe final key mask is XORed with R component and makes R gray shares. Afterthis step R gray shares are combined with B and G component to make colorshare.Fig 3 shows color share combination flow.

In this flow B and G componentis extracted from all color shares. Then all R gray shares are fed as input tothe gray share generation algorithm. At this stage all r gray shares and finalkey mask is XORed with each other to make R component. After this step Rcomponent is combine with B and G component to reveal the original color image.                                                                                                                                                                III.           CONCLUSION       This paper proposed a new color sharegeneration scheme using visual cryptography.

In this scheme color image isencrypted in to n number of shares. Here gray share generation algorithm isapplied on R component and then n number of R gray shares are generated then all shares are combined with B, and Gcomponent to make color share so  thegenerated shares are highly secured. The revealed secret image has same sizesoriginal image and visual quality is also maintained.                                                                                                                                                                   IV.           REFERENCES1InKoo Kang, Gonzalo R. Arce and   Heung-Kyu Lee, “color extended visual cryptography using errordiffusion”, IEEE, 2009.2Xiao-Yi Liu, Ming-Song Chen, and Ya-Li Zhang,” A New Color Visual CryptographyScheme with Perfect Contrast”, International Conference on Communications andNetworking in China, IEEE, 2013.

3Shubhra Dixit, Deepak Kumar Jain and Ankita Saxena, ” An Approach for SecretSharing Using Randomised Visual Secret Sharing”, IEEE,2014.4J. Ramya,B.

Parvathavarthini, “An Extensive Review on Visual CryptographySchemes”, IEEE,2014.                                                                                                                                                               IV.           REFERENCES1InKoo Kang, Gonzalo R. Arce and   Heung-Kyu Lee, “color extended visual cryptography using errordiffusion”, IEEE, 2009.2Xiao-Yi Liu, Ming-Song Chen, and Ya-Li Zhang,” A New Color Visual CryptographyScheme with Perfect Contrast”, International Conference on Communications andNetworking in China, IEEE, 2013.3Shubhra Dixit, Deepak Kumar Jain and Ankita Saxena, ” An Approach for SecretSharing Using Randomised Visual Secret Sharing”, IEEE,2014.4J. Ramya,B.

Parvathavarthini, “An Extensive Review on Visual CryptographySchemes”, IEEE,2014.

x

Hi!
I'm William!

Would you like to get a custom essay? How about receiving a customized one?

Check it out