SlideShare une entreprise Scribd logo
1  sur  30
Image-based Security
Adri Jovin J J, M.Tech., Ph.D., B.G.L.,
Assistant Professor (Sl. Gr.), Department of Information Technology
Sri Ramakrishna Institute of Technology
VC???
VC
Visual Cryptography
24-05-2021 Image-based Security 2
Introduction
• Secret sharing – vital cryptographic application
• Secret sharing – introduced in 1979 by Shamir
• Uses Lagrange interpolation, polynomial and intersection of affine hyperplanes
• Based on matrices and prime numbers
• More specifically designed for numeric and text data
• Today, images contain sensitive data
• Illegal modification of images have become very common
24-05-2021 Image-based Security 3
Visual Cryptography
• Proposed by Naor and Shamir in 1994
• Exclusively for images
• Divide image into two or more shares
• On appropriate superimposition the original image is restored
24-05-2021 Image-based Security 4
k-out-of-n VC
2-out-of-2 VC
k=2, n=2
• Each pixel p of a secret binary image is encoded into a pair of black and white subpixels for
each of the two shares using the codebook.
• If p is white/black, one of the first/last two columns under the white/black pixel in the
codebook is selected randomly so that the probability of selection will be 0.5.
• Irrespective of whether p is black or white, a single pixel is encoded into two subpixels of
black-white or white-black with equal probabilities.
24-05-2021 Image-based Security 5
Applications
• Trojan Free Secure Transaction
24-05-2021 Image-based Security 6
Applications (Contd…)
• Authentication
• Access Control (Joint accounts in banks)
• Transaction Tracking (Software licensing)
• Watermarking (Ownership identification)
24-05-2021 Image-based Security 7
Fundamental Principles
Visual
Cryptography
Contrast
Basis
Matrix
Pixel
Expansion
24-05-2021 Image-based Security 8
Pixel Expansion
• Number of subpixels in which sub pixel p of the secret image Isec is encoded in every share
• Must be kept minimal
• Ideal value is m=1 (1 pixel will be encoded by one pixel in each share)
24-05-2021 Image-based Security 9
Contrast
• Black pixels are recovered with 100% accuracy
• White pixels may suffer a black mix
• Important measure to judge the effectiveness of VC
• All approaches suffer some contrast loss
• Increase in pixel expansion reduces contrast loss
• Contrast value must be high
24-05-2021 Image-based Security 10
Basic Matrices
• Used to construct shares
• Most VC methods are based on binary secret image, which results in two basis matrices, one
for black and the other for white.
𝑆0 =
0 1
0 1
, 𝑆1 =
0 1
1 0
𝐶0 =
0 1
0 1
,
1 0
1 0
𝐶1 =
0 1
1 0
,
1 0
0 1
24-05-2021 Image-based Security 11
Concept of Black and White Pixels
• In general, intensity value for white is 1 and for black it is 0
• In VC, white is denoted as 0 and black is denoted as 1
• Share staking – similar to logical OR
REASON???
24-05-2021 Image-based Security 12
TRUTH TABLE
1 1 1
1 0 1
0 1 1
0 0 0
Formation of a basis matrix
Some points for observation:
1. Each row of both S0 and S1 contains 𝑛 1s and 𝑛 0s
2. OR operation on rows of S0 contain single 0 in the resultant vector
3. OR operation on rows of S1 contain all 1s in the resultant vector
4. Pixel expansion is directly dependent on the number of participants as m=2n-1, so if n is large
then pixel expansion will be exponentially large
5. Contrast 𝛼 also depends on the number of participants as 𝛼 =
1
2𝑛−1. If the value of n
increases 𝛼 decreases.
24-05-2021 Image-based Security 13
Various Dimensions of Visual Cryptography
Visual Cryptography
Traditional
Visual
Cryptography
(TVC)
Threshold
Visual
Cryptography
Extended Visual Cryptography (EVC)
Halftone
Visual
Cryptography
Tagged Visual
Cryptography
Friendly Visual
Cryptography
Size Invariant
VC
Progressive
Visual
Cryptography
Dynamic Visual Cryptography (DVC)
XOR – based
Visual
Cryptography
Visual
Cryptography
with Multiple
Secrets
Verifiable
Visual
Cryptography
Multitone
Visual
Cryptography
Random Grid
based Visual
Cryptography
24-05-2021 Image-based Security 14
Traditional Visual Cryptography
• All approaches based on Naor and Shamir’s approach
• Possess the following properties:
1. The dimensions of all shares will be larger than the original secret image.
2. Each share will be visually random in nature.
3. The secret can be recovered just by stacking the shares.
24-05-2021 Image-based Security 15
Threshold Visual Cryptography
• Generalization of Traditional Visual Cryptography
• Denoted as (k,n) – VCS, where k is the threshold
value and n is the number of participants
• The secret shall be revealed only if k number of
participants meet together
24-05-2021 Image-based Security 16
Extended Visual Cryptography
• Many features are added to traditional visual cryptography
24-05-2021 Image-based Security 17
Extended Visual
Cryptography
(EVC)
Halftone Visual
Cryptography
Tagged Visual
Cryptography
Friendly Visual
Cryptography
Size Invariant
VC
Progressive
Visual
Cryptography
Halftone Visual Cryptography
• Halftone images are generated by the reprographic technique that
simulates continuous images through the use of dots, which creates an
almost grayscale image.
• More appropriate for visual cryptography compared to threshold binary
images because of the randomness.
24-05-2021 Image-based Security 18
Tagged Visual Cryptography
• Method to address the problem of share handling in case of
large number of shares
• Shares contain information about both the image’s tag as
well as the secret
24-05-2021 Image-based Security 19
Friendly visual cryptography
• Visual cryptography with meaningful shares
24-05-2021 Image-based Security 20
Size Invariant visual cryptography
• The dimensions of the secret and shares are identical.
24-05-2021 Image-based Security 21
Progressive Visual Cryptography
• Clarity and contrast of the secret image is improved by stacking more and more shares.
24-05-2021 Image-based Security 22
Dynamic Visual Cryptography
• Extended visual cryptography with additional features
24-05-2021 Image-based Security 23
Dynamic Visual
Cryptography
(DVC)
XOR – based
Visual
Cryptography
Visual
Cryptography
with Multiple
Secrets
Verifiable Visual
Cryptography
Multitone Visual
Cryptography
Random Grid
based Visual
Cryptography
Multitone Visual Cryptography
• All visual cryptography approaches which are made up for gray scale/color images
24-05-2021 Image-based Security 24
Visual cryptography with multiple secrets or multi secret sharing
• A greater number of secrets can be shared with the same set of shares
24-05-2021 Image-based Security 25
XOR-based visual Cryptography
• Computation-based visual cryptography approach which is used for perfect recovery of the
secret.
24-05-2021 Image-based Security 26
Verifiable Visual Cryptography
• Used to enhance the power of any existing VC approach by providing tamper detection
capability to the shares.
• Can only be implemented with computation at the recovery end, therefore it may increase the
complexity of the VC approach.
24-05-2021 Image-based Security 27
Random grid-based visual cryptography
• Transparent with randomly distributed intensities of either white (transparent) or black
(opaque).
• Generate unexpanded shares by default
24-05-2021 Image-based Security 28
References
Shivendra Shivani, Suneeta Agarwal, Jasji S. Suri. (2018). Handbook of Image-based Security
Techniques.
Image Courtesy: Handbook of Image-based Security Techniques
24-05-2021 Image-based Security 29
Thank you!
24-05-2021 Image-based Security 30

Contenu connexe

Tendances

Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
IJRAT
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 

Tendances (13)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Paper id 212014107
Paper id 212014107Paper id 212014107
Paper id 212014107
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
 
Kaur2013
Kaur2013Kaur2013
Kaur2013
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 

Similaire à Image based security

A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
AmAl C
 
Cryptography_slides_visual cryptography.pptx
Cryptography_slides_visual cryptography.pptxCryptography_slides_visual cryptography.pptx
Cryptography_slides_visual cryptography.pptx
POOJITSAI1
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
ijiert bestjournal
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 

Similaire à Image based security (20)

Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
main doc
main docmain doc
main doc
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
Improved extended
Improved extendedImproved extended
Improved extended
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
J017335863
J017335863J017335863
J017335863
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
Cryptography_slides_visual cryptography.pptx
Cryptography_slides_visual cryptography.pptxCryptography_slides_visual cryptography.pptx
Cryptography_slides_visual cryptography.pptx
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
“Modern Machine Vision from Basics to Advanced Deep Learning,” a Presentation...
 
Natural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing SchemeNatural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing Scheme
 
Natural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing SchemeNatural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing Scheme
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

Plus de Adri Jovin

Plus de Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
 

Dernier

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Dernier (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Image based security

  • 1. Image-based Security Adri Jovin J J, M.Tech., Ph.D., B.G.L., Assistant Professor (Sl. Gr.), Department of Information Technology Sri Ramakrishna Institute of Technology
  • 3. Introduction • Secret sharing – vital cryptographic application • Secret sharing – introduced in 1979 by Shamir • Uses Lagrange interpolation, polynomial and intersection of affine hyperplanes • Based on matrices and prime numbers • More specifically designed for numeric and text data • Today, images contain sensitive data • Illegal modification of images have become very common 24-05-2021 Image-based Security 3
  • 4. Visual Cryptography • Proposed by Naor and Shamir in 1994 • Exclusively for images • Divide image into two or more shares • On appropriate superimposition the original image is restored 24-05-2021 Image-based Security 4 k-out-of-n VC
  • 5. 2-out-of-2 VC k=2, n=2 • Each pixel p of a secret binary image is encoded into a pair of black and white subpixels for each of the two shares using the codebook. • If p is white/black, one of the first/last two columns under the white/black pixel in the codebook is selected randomly so that the probability of selection will be 0.5. • Irrespective of whether p is black or white, a single pixel is encoded into two subpixels of black-white or white-black with equal probabilities. 24-05-2021 Image-based Security 5
  • 6. Applications • Trojan Free Secure Transaction 24-05-2021 Image-based Security 6
  • 7. Applications (Contd…) • Authentication • Access Control (Joint accounts in banks) • Transaction Tracking (Software licensing) • Watermarking (Ownership identification) 24-05-2021 Image-based Security 7
  • 9. Pixel Expansion • Number of subpixels in which sub pixel p of the secret image Isec is encoded in every share • Must be kept minimal • Ideal value is m=1 (1 pixel will be encoded by one pixel in each share) 24-05-2021 Image-based Security 9
  • 10. Contrast • Black pixels are recovered with 100% accuracy • White pixels may suffer a black mix • Important measure to judge the effectiveness of VC • All approaches suffer some contrast loss • Increase in pixel expansion reduces contrast loss • Contrast value must be high 24-05-2021 Image-based Security 10
  • 11. Basic Matrices • Used to construct shares • Most VC methods are based on binary secret image, which results in two basis matrices, one for black and the other for white. 𝑆0 = 0 1 0 1 , 𝑆1 = 0 1 1 0 𝐶0 = 0 1 0 1 , 1 0 1 0 𝐶1 = 0 1 1 0 , 1 0 0 1 24-05-2021 Image-based Security 11
  • 12. Concept of Black and White Pixels • In general, intensity value for white is 1 and for black it is 0 • In VC, white is denoted as 0 and black is denoted as 1 • Share staking – similar to logical OR REASON??? 24-05-2021 Image-based Security 12 TRUTH TABLE 1 1 1 1 0 1 0 1 1 0 0 0
  • 13. Formation of a basis matrix Some points for observation: 1. Each row of both S0 and S1 contains 𝑛 1s and 𝑛 0s 2. OR operation on rows of S0 contain single 0 in the resultant vector 3. OR operation on rows of S1 contain all 1s in the resultant vector 4. Pixel expansion is directly dependent on the number of participants as m=2n-1, so if n is large then pixel expansion will be exponentially large 5. Contrast 𝛼 also depends on the number of participants as 𝛼 = 1 2𝑛−1. If the value of n increases 𝛼 decreases. 24-05-2021 Image-based Security 13
  • 14. Various Dimensions of Visual Cryptography Visual Cryptography Traditional Visual Cryptography (TVC) Threshold Visual Cryptography Extended Visual Cryptography (EVC) Halftone Visual Cryptography Tagged Visual Cryptography Friendly Visual Cryptography Size Invariant VC Progressive Visual Cryptography Dynamic Visual Cryptography (DVC) XOR – based Visual Cryptography Visual Cryptography with Multiple Secrets Verifiable Visual Cryptography Multitone Visual Cryptography Random Grid based Visual Cryptography 24-05-2021 Image-based Security 14
  • 15. Traditional Visual Cryptography • All approaches based on Naor and Shamir’s approach • Possess the following properties: 1. The dimensions of all shares will be larger than the original secret image. 2. Each share will be visually random in nature. 3. The secret can be recovered just by stacking the shares. 24-05-2021 Image-based Security 15
  • 16. Threshold Visual Cryptography • Generalization of Traditional Visual Cryptography • Denoted as (k,n) – VCS, where k is the threshold value and n is the number of participants • The secret shall be revealed only if k number of participants meet together 24-05-2021 Image-based Security 16
  • 17. Extended Visual Cryptography • Many features are added to traditional visual cryptography 24-05-2021 Image-based Security 17 Extended Visual Cryptography (EVC) Halftone Visual Cryptography Tagged Visual Cryptography Friendly Visual Cryptography Size Invariant VC Progressive Visual Cryptography
  • 18. Halftone Visual Cryptography • Halftone images are generated by the reprographic technique that simulates continuous images through the use of dots, which creates an almost grayscale image. • More appropriate for visual cryptography compared to threshold binary images because of the randomness. 24-05-2021 Image-based Security 18
  • 19. Tagged Visual Cryptography • Method to address the problem of share handling in case of large number of shares • Shares contain information about both the image’s tag as well as the secret 24-05-2021 Image-based Security 19
  • 20. Friendly visual cryptography • Visual cryptography with meaningful shares 24-05-2021 Image-based Security 20
  • 21. Size Invariant visual cryptography • The dimensions of the secret and shares are identical. 24-05-2021 Image-based Security 21
  • 22. Progressive Visual Cryptography • Clarity and contrast of the secret image is improved by stacking more and more shares. 24-05-2021 Image-based Security 22
  • 23. Dynamic Visual Cryptography • Extended visual cryptography with additional features 24-05-2021 Image-based Security 23 Dynamic Visual Cryptography (DVC) XOR – based Visual Cryptography Visual Cryptography with Multiple Secrets Verifiable Visual Cryptography Multitone Visual Cryptography Random Grid based Visual Cryptography
  • 24. Multitone Visual Cryptography • All visual cryptography approaches which are made up for gray scale/color images 24-05-2021 Image-based Security 24
  • 25. Visual cryptography with multiple secrets or multi secret sharing • A greater number of secrets can be shared with the same set of shares 24-05-2021 Image-based Security 25
  • 26. XOR-based visual Cryptography • Computation-based visual cryptography approach which is used for perfect recovery of the secret. 24-05-2021 Image-based Security 26
  • 27. Verifiable Visual Cryptography • Used to enhance the power of any existing VC approach by providing tamper detection capability to the shares. • Can only be implemented with computation at the recovery end, therefore it may increase the complexity of the VC approach. 24-05-2021 Image-based Security 27
  • 28. Random grid-based visual cryptography • Transparent with randomly distributed intensities of either white (transparent) or black (opaque). • Generate unexpanded shares by default 24-05-2021 Image-based Security 28
  • 29. References Shivendra Shivani, Suneeta Agarwal, Jasji S. Suri. (2018). Handbook of Image-based Security Techniques. Image Courtesy: Handbook of Image-based Security Techniques 24-05-2021 Image-based Security 29