SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010




    A Novel Scheme for Mutual Authentication and
     Cheating Prevention in Visual Cryptography
               using Image Processing
                             B.Padhmavathi#1, P.Nirmal Kumar*2, M.A.Dorai Rangaswamy#3
                      #
                          Department of Computer Science & Engineering, Easwari Engineering College,
                                             Chennai – 600 089, Tamil Nadu, India
                                                   1
                                                    padmas9169@yahoo.co.in
                                                      3
                                                       drdorairs@yahoo.co.in
                            *
                              Department of Electronics & Communications, College of Engineering,
                                    Anna University, Chennai – 600 025,Tamil Nadu, India
                                                    2
                                                      nirmal2100@yahoo.co.in

Abstract— Visual cryptography (VC) is a method of                        In these cases, all participants who hold shares are
encrypting a secret image into shares such that stacking a           assumed to be honest ie., they will not present false or fake
sufficient number of shares reveals the secret image. Shares         shares during the phase of recovering the secret image.
are usually presented in transparencies. Each participant            Thus, the image after stacking them is considered as the
holds a transparency. In this paper, we studied the cheating
problem in VC by malicious adversaries. We considered the
                                                                     real Secret image. Nevertheless, cryptography is supposed
attacks of malicious adversaries who may deviate from the            to guarantee security even under the attack of malicious
scheme and create fake shares, whose stacking reveals a              adversaries who may deviate from this scheme in any way.
different Secret image. This paper proposes a solution to this       We have seen that it is possible to cheat [1], [2], [3] in VC,
Cheating problem by an Invisible and Blind Watermarking              though it seems hard to imagine. For cheating, a malicious
scheme. This scheme not only provides Authentication for the         participant presents some fake shares such that the stacking
VC shares but also makes these secret shares invisible by            of fake and genuine shares together reveals a different
embedding them into not so significant Host images. Thus             secret image making the genuine participants to believe it
secret shares are not available for any alterations by the           to be the original. It is observed that the participant shares
adversaries who try to create fake shares. In the proposed
invisible and blind watermarking scheme, every pixel of the
                                                                     are vulnerable for Cheating attacks. In this paper, we
binary VC share is invisibly embedded into the individual            consider this problem and provide security to the
blocks of the host image sized 2x2. In this proposed scheme,         participant shares by hiding them in some insignificant
the process of watermark extraction necessitates only the            images. For example, Lena, Peppers etc.,
watermarked image and it doesn’t require the original host               Watermarking is the technique of embedding a secret
image or any of its characteristics, making the proposed             image into a cover image without affecting its perceptual
scheme blind. The efficiency of the proposed Cheating                quality so that secret image can be revealed by some
prevention scheme by Invisible Blind watermarking scheme             process. One significant advantage of watermarking is the
has been demonstrated via the experimental results. A Perfect        inseparability of the watermark(secret image) from the
restoration technique is added to the Visual Cryptography
Scheme to improve the quality of the restored secret image as
                                                                     cover image. Some of the vital characteristics of the
well as memory space utilization. Hence the proposed                 watermark are: hard to perceive, resists ordinary distortions,
Cheating prevention scheme along with Perfect restoration            endures malevolent attacks, carries numerous bits of
techniques provides a Novel Visual Cryptography scheme.              information, capable of coexisting with other watermarks,
                                                                     and demands little computation to insert and extract
Keywords - Visual Cryptography, Cheating Prevention,
                                                                     Watermarks. Generally, robust watermarking is used to
Invisible Watermarking, Blind Scheme, Secret shares, Host
Images.                                                              resist un-malicious or malicious attacks like scaling,
                                                                     cropping, lossy compression, and so forth. Watermarking
                     I. INTRODUCTION                                 techniques can be categorized into different types based on
                                                                     a number of ways. Watermarking can be divided into Non-
    Visual Cryptography (VC) is a method of encrypting a             blind, Semi-Blind and Blind schemes [4], [5] based on the
Secret image into shares such that stacking a sufficient             requirements for watermark extraction or detection. Non-
number of shares reveals the secret image. Shares are                blind watermarking schemes necessitate the original image
binary images usually presented in transparencies. Each              and secret keys for watermark detection. The Semi-Blind
participant holds a transparency (share). Unlike                     schemes require the secret key(s) and the watermark bit
conventional cryptographic methods, VC needs no                      sequence for extraction, whereas, the Blind schemes need
complicated computation for recovering the secret. The act           only the secret key(s) for extraction. Another categorization
of decryption is to simply stack shares and view the Secret          of watermarks based on the embedded data (watermark) is:
image that appears on the stacked shares.                            visible and invisible. With visible watermarking of images,
                                                                     a secondary image (the watermark) is embedded in a

©2010 ACEEE                                                      1
DOI: 01.IJSIP.01.03.81_264
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



primary image in such that it is perceptible to a human              two identical blocks of four sub-pixels. A black pixel is
observer, whereas the embedded data is not detectable in             shared into two complementary blocks of four sub-pixels.
case of Invisible watermarking; nevertheless, it can be              Fig. 2 illustrates this scheme of encoding one pixel into
extracted by a computer program.                                     four pixels in a (2, 2) VC scheme. All the pixels in the
    Here our proposed scheme will add the merits of both             original image are encrypted similarly using this scheme.
visual cryptography as well as Invisible and Blind                   These shares can be either Vertical or Horizontal or
watermarking techniques , where we will generate the                 Diagonal Share as shown in the figure.
secret shares using basic visual cryptography model and
then we will watermark these shares into some host image                                                                                                   
using invisible and blind watermarking. Thus the secret
                                                                                                                                                           
shares are protected from cheating attacks. The decryption
will be same as in the visual cryptographic model i.e. by             Vertical Shares          Horizontal Shares          Diagonal Shares
stacking of the shares after the secret shares have been
                                                                             Fig 2. Pixel encoding in (2,2) Visual Cryptography scheme
extracted by a simple watermark extraction technique. The
proposed watermarking scheme doesn’t necessitate the                 B. Cheating Behaviour in Visual Cryptography
original image or any of its characteristics for the                     A cheating process against a VCS [9] consists of the
extraction of watermark, and hence the proposed scheme is            following two phases:
blind. The experimental results have been demonstrated for           1) Fake Share Construction Phase, where the cheater
efficiency of the proposed Invisible and Blind                           participant generates the fake shares.
Watermarking scheme for Binary images in [6],[7].                    2) Image Reconstruction Phase, where the Fake image
    The rest of this paper is organized as follows. The                  appears after stacking the genuine shares with fake
models for Visual Cryptography scheme(VCS), Cheating                     shares.
behaviors in VC and Digital watermarking for the                         In the case of cheating, honest participants who present
protection of digital images are discussed along with brief          their shares for recovering the secret image are not able to
review of their previous works in Section 2. We then                 distinguish fake shares from genuine shares. A
describe the proposed Innovative Invisible and Blind                 reconstructed image is a perfect image indistinguishable
Watermarking scheme for Cheating prevention in Section 3.            from the original. The key point of cheating is how to
The experimental results are provided in Section 4 and               predict and rearrange the positions of black and white sub
conclusions are summed up in Section 5.                              pixels in the victim’s and cheater’s share. Fig. 3 shows the
                                                                     whole cheating       process and Table 1 shows how the
          II. REVIEW OF RELATED TOPICS                               cheaters create fake shares to change the decoded image.
A. (2,2) Visual Cryptography Scheme
    Visual Cryptography (VC) was first introduced by
Moni Noar and Shamir at Eurocrypt’94 [8]. It involved
breaking up the image into n shares so that only someone
with all n shares could decrypt the image by overlaying
each of the shares over each other. To encode a secret
employing a (2, 2) VC Scheme, the original image is
divided into two shares such that each pixel in the original
image is replaced with a non-overlapping block of two or
four sub-pixels as shown in Fig.1.
                                                                                          Fig 3. Cheating Process in VCS
                                                                                                            TABLE I
                                                                                          FAKE SHARE PIXEL CREATION


                                                                           Pixel in           Pixel in           Pixel in
                                                                                     Pixel in           Pixel in           Pixel in Pixel in
                                                                            Secret             Share              Cheat
                                                                                    Share SA           Share SC           Share SA’ Share SB’
                                                                            Image               SB                Image



           Fig 1. A (2,2) Visual Cryptography scheme                        white    [1 0 0]      [1 0 0]       [1 0 0]     white       [1 0 0]       [1 0 0]

    Anyone who holds only one share will not be able to
reveal any information about the secret. To decode the                      white    [1 0 0]      [1 0 0]       [1 0 0]     black       [0 1 0]       [0 0 1]
image, each of these shares is Xeroxed onto a transparency.
Stacking both these transparencies will permit visual
recovery of the secret.                                                     black    [1 0 0]      [0 1 0]       [0 0 1]     white       [0 0 1]       [0 0 1]
    There are several schemes of encoding the pixels of the
secret image. In our scheme, each pixel in the secret image
                                                                            black    [1 0 0]      [0 1 0]       [0 0 1]     black       [1 0 0]       [0 1 0]
is broken into four sub pixels. A white pixel is shared into

©2010 ACEEE                                                      2
DOI: 01.IJSIP.01.03.81_264
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



C. Digital Watermarking                                              into a single block of the host image. The watermark
    Our work has been motivated by a copious number of               embedding process involves: mean calculation, embedding
earlier works available in the literature that utilize digital       strength (β) and signum function. Each non-overlapping
image watermarking for protecting copyrights of digital              block is converted into a vector, and the mean value of the
images. Debasish Jena1Sanjay Kumar has proposed Data                 vector is computed and divided with the embedding
hiding in halftone images using conjugate ordered dithering          strength (β) Since, the watermark is a binary image; the
(DHCOD) algorithm is given, which is a modified version              process of watermark embedding involves two cases:
of existing Data hiding in halftone image by conjugate               embedding pixel value ‘1’ and embedding pixel value ‘0’.
error diffusion (DHCED) algorithm. Lu et al. [10] have               Two different inserting mathematical operations are carried
presented a digital watermarking technique that is intended          out for embedding pixel value ‘0’ and ‘1’.
to solve some vital issues of the digital world, such as             B. Watermark Extraction
copyright protection, copy protection, and image
                                                                          This sub-section details the steps involved in the
authentication.Wei-Che Chen [11] have presented a digital
                                                                     extraction of the binary watermark image from the
image copyright protection scheme on the basis of visual
                                                                     watermarked image. As the proposed scheme is blind,
cryptography (VC) and singular value decomposition (SVD)
                                                                     watermark extraction necessitates the watermarked image,
techniques. Initially, the scheme applies SVD to a host
                                                                     size of watermark image and the embedding strength,
image to construct a master share. This scheme embeds the
                                                                     whereas it doesn’t require the host image or any of its
secret image without effecting any modification of the host
                                                                     characteristics. Initially, non overlapping blocks sized 2x2
image. All the above mentioned schemes provide copyright
                                                                     are extracted from the watermarked image and the number
protection to the VC Secret image but where as VC secret
                                                                     of blocks extracted varies based on the size of the
shares are still vulnerable to the Cheating attacks. In this
                                                                     watermark image. The blocks that are extracted are stored
research, we propose an innovative Invisible and Blind
                                                                     in a vector. Subsequently, all the extracted blocks are
watermarking scheme [6], applied to VC shares to secure
                                                                     converted into a vector and the mean value of the vector is
them against Cheating attacks by the adversaries.
                                                                     computed. Afterwards, the mean values of all the blocks
                                                                     are divided by the embedding strength (β). The resultant
 III. PROPOSED MUTUAL AUTHENTICATION AND
                                                                     value is made use of in the extraction of watermark. Finally,
      CHEATING PREVENTION SCHEME USING
                                                                     a matrix of the size of the watermark image is created and
        INVISIBLE BLIND WATERMARKING
                                                                     the extracted pixel values are placed in it so as to obtain the
    This section presents the proposed Invisible and blind           watermark image.
watermarking Algorithm for the protection of Secret shares
                                                                     C. Phases of the Proposed Scheme
in VC. The proposed scheme utilizes the binary VC secret
share image as watermark data . With the aid of the                      In the proposed scheme we shall generate the VC-
embedding strength and signum function, the scheme                   shares using basic visual cryptography model and then
discussed, embeds this binary watermark image pixel into             embed them into a cover image using a Invisible Blind
every 2x2 non-overlapping block of some insignificant host           Watermarking technique, so that the secret shares will be
images. This process protects the VC secret shares from              more secure and meaningful. And the shares are protected
any adversary manipulations, which may result in fake                from the malicious adversaries who may alter the bit
shares. Also, during extraction, the embedded binary                 sequences to create the Fake shares. During the Decryption
watermark is extracted from the watermarked host image               phase, the secret shares are extracted from their cover
using watermark image size and the embedding strength.               images without needing any of the cover image
As this digital watermarking scheme doesn’t require the              characteristics to provide mutual authentication.
original image or any of its characteristics for watermark               Proposed scheme consists of three phases which are
extraction, it is said to be blind. The VC Secret shares are         described in the following subsections.
completely hidden from malicious users. Hence it is proved           Phase I – Visual Cryptographic Encryption : In this very
that above stated Cheating behaviour in VC is prevented by           first phase we will do visual cryptography encryption. It
this novel watermarking algorithm. In our paper, we have             consists of generation of shares using any basic visual
chosen the user’s signature images for VC encryption                 cryptography model. Visual cryptographic solutions
phase and this provides mutual authentication during any             operate on binary inputs. In our proposed scheme, a
transaction at the VC Decryption phase. The following                (2,2)VC share creation is performed. During encoding due
subsections describe the steps involved in the watermark             to Pixel expansion the size of the shares will be large. Since
embedding and extraction processes and also various                  each pixel in the original image is replaced by four sub-
phases of the entire scheme.                                         pixels in each share, the width of the decoded image is
                                                                     more than twice that of the original image. But after
A. Watermark Embedding
                                                                     applying the Perfect Restoration        techniques [12], the
    This sub-section presents the process of binary VC               original size of the secret image can be restored. So the
secret share image embedment into the host image. The                result of this phase will be 2 unintelligible shares of black
size of the host image chosen is dyadic (2nx2n) and the              and white pixels. In real time applications share 1 will
watermark used is a binary image. Firstly, non-overlapping           available with Client and share 2 will be saved in the
blocks sized 2x2 are extracted from the host image and               Server database for future authentication purposes. Fig. 4
every pixel of the watermark VC share image is embedded

©2010 ACEEE                                                      3
DOI: 01.IJSIP.01.03.81_264
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



shows the result of Share 1 creation with perfect restoration
technique applied.                                                                             Secret Image




                                                                                                                                   Phase I


    a)Original                          b) Share 1

                                        c) Share 1 after Perfect              Share 1                             Share 2
                                       Restoration technique




         Fig 4.   Share 1 creation using (2,2) VC Encryption

Phase II - Hiding the Shares using invisible blind                        Embed in Host Image             Embed in Host image
                                                                                   1                               2               Phase II
watermarking : This is the second phase of our approach
which will embed shares of the client and server, generated
from the first phase into some host images. For
watermarking we will use Invisible and Blind
Watermarking scheme discussed under section 3. Use of
watermarking will give an added advantage of double
                                                                               Extracted                          Extracted
security over other visual cryptographic schemes. The                           Share 1                           Share 2
watermarked host images are robust against various
attacks like Blurring, Cropping,, Sharpening, JPEG Lossy
compression. This forbids any malicious participant to
access the secret shares and modify them into Fake shares
                                                                                                                                   Phase III
thus preventing Cheating problem in VC. The result of this
phase would be innocent looking watermarked host images
that does not seem to contain any secret in them because of
the invisible watermarking methodology applied. The
                                                                                           Decoded Secret Image
watermarked host image 1 and 2 will be available with the
client and server databases.
Phase III - Visual Cryptographic Decryption and
Authentication: This is the last phase of proposed scheme.
                                                                                        Fig. 5. Structure of the Proposed Scheme
In this phase we extract the binary watermarked shares
from the host images of the client and server. The proposed
                                                                                         IV. SIMULATION RESULTS
watermarking scheme doesn’t necessitate the original
image or any of its characteristics for the extraction of                    For simulation we have used MATLAB 7.0 tool and
watermark, and hence the proposed scheme is blind. Then                  tested with images of different sizes. The proposed scheme
we apply the visual cryptographic decryption. As we                      achieves effective embedment of the binary share images
know that visual Cryptographic decryption does not need                  into the host images. Also, the proposed scheme depicts
any type of decryption algorithm or computation. It uses                 efficient extraction of the embedded watermarks from the
human visual system for decryption which is the core                     watermarked images. The watermarked images possess
advantage for which visual cryptography was developed.                   good Peak Signal to Noise Ratio (PSNR) and good visual
Now we can decrypt the original secret image by                          quality. Fig. 6 depicts the results obtained on
overlapping or stacking the shares. When the two shares                  experimentation of the entire proposed Visual
are stacked together, the black pixels in the original image             Cryptography scheme.
remain black and the white pixels become grey. Although                      The results include original secret image, encoded
some contrast loss occurs, the decoded image can be                      secret shares, host image, watermarked images and the
clearly identified. Now again the perfect restoration                    decoded secret image. Thus the encoded secret shares have
technique is used to remove the greying effect to give more              been authenticated to prevent Cheating attacks.
contrast. Hence the result of this phase will be an image
consisting original secret image. Fig 5 is the structure of
proposed scheme.




©2010 ACEEE                                                          4
DOI: 01.IJSIP.01.03.81_264
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



                                                                             image characteristics because the watermark extraction
                                                                             technique is blind.. The overlapping of these shares reveal
                                               a) Secret image
                                                                             the original secret. The decoded secret signature image
                                                                             quality is improved by using perfect restoration technique.
                                                                             Yet many possible enhancements and extensions can be
                                                                             made to improve further.

                                                                                                      REFERENCES


                                                                             [1]  H.Yan, Z. Gan, and K. Chen,“A cheater detectable visual
                                                                                  cryptography scheme,” (in Chinese) J. Shanghai Jiaotong
                                                                                  Univ., vol. 38, no. 1, 2004.
                             c) Share 1                                      [2] G.-B. Horng, T.-G. Chen, and D.-S. Tsai, “Cheating in
b) Host Image 1                            d) Watermarked host image 1            visual cryptography , ” Designs, Codes, Cryptog., vol. 38,
                                                                                  no. 2, pp. 219–236, 2006.
                                                                             [3] M. Naor and B. Pinkas, “Visual authentication and
                                                                                  identification,” in Proc. Advances in Cryptology, 1997, vol.
                                                                                  1294, LNCS, pp. 322–36.
                                                                             [4]    P. Tao and A. M. Eskicioglu, “A Robust Multiple
                                                                                  Watermarking Scheme in the DWT Domain,” Optics East
                                                                                  2004 Symposium,Internet Multimedia Management Systems
                              f) Share2                                           V Conference, Philadelphia, PA, pp. 33-144, October 25-28,
                                                                                  2004.
e) Host Image 2                                g) Watermarked                [5]    Ersin Elbasi and Ahmet M. Eskicioglu, “A Semi-Blind
                                               host image 1                       Watermarking Scheme for Color Images Using a Tree
                                                                                  Structure," in proc. of IEEE Sarnoff Symposium, March,
                                                                                  2006
                                                                             [6]     M.A.Dorairangaswamy, “A Novel Invisible and Blind
                                                                                  Watermarking Scheme for Copyright Protection of Digital
                                                                                  Images,” International Journal of Computer Science and
                                                                                  Network Security (IJCSNS), Vol. 9 , No. 4, pp. 71-78, 2009.
                  h) Extracted & decoded Secret                              [7] M.A.Dorairangaswamy, “A Robust Blind Image
                                                                                  Watermarking Scheme in Spatial Domain for Copyright
                                                                                  Protection,” International Journal of Engineering and
                   Fig. 6.    Experimentation Results                             Technology (IJET), Vol. 1, No.3, pp. 249 - 255, August
                                                                                  2009.
                                                                             [8]    M. Naor and A. Shamir, .Visual Cryptography,. Advances
                        V. CONCLUSION
                                                                                  in Cryptography -EUROCRYPT'94, Lecture Notes in
    Visual cryptography is the current area of research                           Computer Science 950, 1995, pp. 1-12.
where lot of scope exists. Currently this particular                         [9] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual
cryptographic technique is being used by several countries                         Cryptography, .IEEE Transaction on Image Processing,
                                                                                  vol. 16, no. 1, Jan- 2007, pp. 36-45.
for secretly transfer of hand written documents, financial
                                                                             [10] Zhe-Ming Lu, Wei-Min Zheng, Jeng-Shyang Pan and Zhen
documents, text images, internet voting etc. There are                            Sun, “Multipurpose Image Watermarking Method Based
various innovative ideas and extensions exist for the basic                       on Mean-removed Vector Quantization", Journal of
visual cryptographic model introduced till now. One such                          Information Assurance and Security, Vol. 1, pp. 33-42,
enhancement we are trying to do in terms of preventing                            2006.
cheating attacks. In the existing VC schemes no security is                  [11] Ming-Shi Wang and Wei-Che Chen, "Digital image
provided to the secret shares and adversaries can alter its                       copyright protection scheme based on visual cryptography
bit sequences to create fake shares. And in our proposed                          and singular value decomposition", Optical Engineering,
scheme, the vulnerability of these binary secret shares is                        Vol. 46, No. 6, 2007.
                                                                             [12] Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli, “ Progressive
overcome by hiding them invisibly into some host images.
                                                                                  Color Visual Cryptography”, SPIE Journal of Electronic
During the decryption phase, the secret shares are extracted                      Imaging (JEI/SPIE) Jan,2006
from their cover images without needing any of the cover




©2010 ACEEE                                                              5
DOI: 01.IJSIP.01.03.81_264

Contenu connexe

Tendances

Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIAIJNSA Journal
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Arif Ahmed
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology vijay rastogi
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessingQaisar Ayub
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingnafees321
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—aAgnianbu Wrong
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 

Tendances (18)

Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Fz2510901096
Fz2510901096Fz2510901096
Fz2510901096
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
Optical Watermarking Literature survey....
Optical Watermarking Literature survey....Optical Watermarking Literature survey....
Optical Watermarking Literature survey....
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
dwm
dwmdwm
dwm
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
C0361419
C0361419C0361419
C0361419
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Watermarking in-imageprocessing
Watermarking in-imageprocessingWatermarking in-imageprocessing
Watermarking in-imageprocessing
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Generic lossless visible watermarking—a
Generic lossless visible watermarking—aGeneric lossless visible watermarking—a
Generic lossless visible watermarking—a
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Tridelity
TridelityTridelity
Tridelity
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 

En vedette

Two Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and SimulationTwo Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and SimulationIDES Editor
 
Incremental Difference as Feature for Lipreading
Incremental Difference as Feature for LipreadingIncremental Difference as Feature for Lipreading
Incremental Difference as Feature for LipreadingIDES Editor
 
Dynamic Concept Drift Detection for Spam Email Filtering
Dynamic Concept Drift Detection for Spam Email FilteringDynamic Concept Drift Detection for Spam Email Filtering
Dynamic Concept Drift Detection for Spam Email FilteringIDES Editor
 
An Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal CompressionAn Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal CompressionIDES Editor
 
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...IDES Editor
 
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...IDES Editor
 
Cross Lingual Information Retrieval Using Search Engine and Data Mining
Cross Lingual Information Retrieval Using Search Engine and Data MiningCross Lingual Information Retrieval Using Search Engine and Data Mining
Cross Lingual Information Retrieval Using Search Engine and Data MiningIDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 

En vedette (10)

Two Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and SimulationTwo Different Approaches for NGOSS Process Modeling and Simulation
Two Different Approaches for NGOSS Process Modeling and Simulation
 
Incremental Difference as Feature for Lipreading
Incremental Difference as Feature for LipreadingIncremental Difference as Feature for Lipreading
Incremental Difference as Feature for Lipreading
 
Dynamic Concept Drift Detection for Spam Email Filtering
Dynamic Concept Drift Detection for Spam Email FilteringDynamic Concept Drift Detection for Spam Email Filtering
Dynamic Concept Drift Detection for Spam Email Filtering
 
An Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal CompressionAn Optimized Transform for ECG Signal Compression
An Optimized Transform for ECG Signal Compression
 
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...
3D Visual Integration of Spatio-Temporal Gene Expression Patterns on Digital ...
 
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...
Coupling Aware Explicit Delay Metric for On- Chip RLC Interconnect for Ramp i...
 
Cross Lingual Information Retrieval Using Search Engine and Data Mining
Cross Lingual Information Retrieval Using Search Engine and Data MiningCross Lingual Information Retrieval Using Search Engine and Data Mining
Cross Lingual Information Retrieval Using Search Engine and Data Mining
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 

Similaire à A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing

ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY Lakshmi Velivala
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYLakshmi Velivala
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsIOSR Journals
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueEditor IJMTER
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYcscpconf
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 

Similaire à A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing (20)

ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
ENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHYENHANCED VISUAL CRYPTOCRAPHY
ENHANCED VISUAL CRYPTOCRAPHY
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 
C045016020
C045016020C045016020
C045016020
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
A Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction MethodsA Review of BSS Based Digital Image Watermarking and Extraction Methods
A Review of BSS Based Digital Image Watermarking and Extraction Methods
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
G1803063741
G1803063741G1803063741
G1803063741
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Retrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS TechniqueRetrieving Of Color Images Using SDS Technique
Retrieving Of Color Images Using SDS Technique
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
F42022628
F42022628F42022628
F42022628
 

Plus de IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 

Plus de IDES Editor (20)

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing B.Padhmavathi#1, P.Nirmal Kumar*2, M.A.Dorai Rangaswamy#3 # Department of Computer Science & Engineering, Easwari Engineering College, Chennai – 600 089, Tamil Nadu, India 1 padmas9169@yahoo.co.in 3 drdorairs@yahoo.co.in * Department of Electronics & Communications, College of Engineering, Anna University, Chennai – 600 025,Tamil Nadu, India 2 nirmal2100@yahoo.co.in Abstract— Visual cryptography (VC) is a method of In these cases, all participants who hold shares are encrypting a secret image into shares such that stacking a assumed to be honest ie., they will not present false or fake sufficient number of shares reveals the secret image. Shares shares during the phase of recovering the secret image. are usually presented in transparencies. Each participant Thus, the image after stacking them is considered as the holds a transparency. In this paper, we studied the cheating problem in VC by malicious adversaries. We considered the real Secret image. Nevertheless, cryptography is supposed attacks of malicious adversaries who may deviate from the to guarantee security even under the attack of malicious scheme and create fake shares, whose stacking reveals a adversaries who may deviate from this scheme in any way. different Secret image. This paper proposes a solution to this We have seen that it is possible to cheat [1], [2], [3] in VC, Cheating problem by an Invisible and Blind Watermarking though it seems hard to imagine. For cheating, a malicious scheme. This scheme not only provides Authentication for the participant presents some fake shares such that the stacking VC shares but also makes these secret shares invisible by of fake and genuine shares together reveals a different embedding them into not so significant Host images. Thus secret image making the genuine participants to believe it secret shares are not available for any alterations by the to be the original. It is observed that the participant shares adversaries who try to create fake shares. In the proposed invisible and blind watermarking scheme, every pixel of the are vulnerable for Cheating attacks. In this paper, we binary VC share is invisibly embedded into the individual consider this problem and provide security to the blocks of the host image sized 2x2. In this proposed scheme, participant shares by hiding them in some insignificant the process of watermark extraction necessitates only the images. For example, Lena, Peppers etc., watermarked image and it doesn’t require the original host Watermarking is the technique of embedding a secret image or any of its characteristics, making the proposed image into a cover image without affecting its perceptual scheme blind. The efficiency of the proposed Cheating quality so that secret image can be revealed by some prevention scheme by Invisible Blind watermarking scheme process. One significant advantage of watermarking is the has been demonstrated via the experimental results. A Perfect inseparability of the watermark(secret image) from the restoration technique is added to the Visual Cryptography Scheme to improve the quality of the restored secret image as cover image. Some of the vital characteristics of the well as memory space utilization. Hence the proposed watermark are: hard to perceive, resists ordinary distortions, Cheating prevention scheme along with Perfect restoration endures malevolent attacks, carries numerous bits of techniques provides a Novel Visual Cryptography scheme. information, capable of coexisting with other watermarks, and demands little computation to insert and extract Keywords - Visual Cryptography, Cheating Prevention, Watermarks. Generally, robust watermarking is used to Invisible Watermarking, Blind Scheme, Secret shares, Host Images. resist un-malicious or malicious attacks like scaling, cropping, lossy compression, and so forth. Watermarking I. INTRODUCTION techniques can be categorized into different types based on a number of ways. Watermarking can be divided into Non- Visual Cryptography (VC) is a method of encrypting a blind, Semi-Blind and Blind schemes [4], [5] based on the Secret image into shares such that stacking a sufficient requirements for watermark extraction or detection. Non- number of shares reveals the secret image. Shares are blind watermarking schemes necessitate the original image binary images usually presented in transparencies. Each and secret keys for watermark detection. The Semi-Blind participant holds a transparency (share). Unlike schemes require the secret key(s) and the watermark bit conventional cryptographic methods, VC needs no sequence for extraction, whereas, the Blind schemes need complicated computation for recovering the secret. The act only the secret key(s) for extraction. Another categorization of decryption is to simply stack shares and view the Secret of watermarks based on the embedded data (watermark) is: image that appears on the stacked shares. visible and invisible. With visible watermarking of images, a secondary image (the watermark) is embedded in a ©2010 ACEEE 1 DOI: 01.IJSIP.01.03.81_264
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 primary image in such that it is perceptible to a human two identical blocks of four sub-pixels. A black pixel is observer, whereas the embedded data is not detectable in shared into two complementary blocks of four sub-pixels. case of Invisible watermarking; nevertheless, it can be Fig. 2 illustrates this scheme of encoding one pixel into extracted by a computer program. four pixels in a (2, 2) VC scheme. All the pixels in the Here our proposed scheme will add the merits of both original image are encrypted similarly using this scheme. visual cryptography as well as Invisible and Blind These shares can be either Vertical or Horizontal or watermarking techniques , where we will generate the Diagonal Share as shown in the figure. secret shares using basic visual cryptography model and then we will watermark these shares into some host image                         using invisible and blind watermarking. Thus the secret                         shares are protected from cheating attacks. The decryption will be same as in the visual cryptographic model i.e. by Vertical Shares Horizontal Shares Diagonal Shares stacking of the shares after the secret shares have been Fig 2. Pixel encoding in (2,2) Visual Cryptography scheme extracted by a simple watermark extraction technique. The proposed watermarking scheme doesn’t necessitate the B. Cheating Behaviour in Visual Cryptography original image or any of its characteristics for the A cheating process against a VCS [9] consists of the extraction of watermark, and hence the proposed scheme is following two phases: blind. The experimental results have been demonstrated for 1) Fake Share Construction Phase, where the cheater efficiency of the proposed Invisible and Blind participant generates the fake shares. Watermarking scheme for Binary images in [6],[7]. 2) Image Reconstruction Phase, where the Fake image The rest of this paper is organized as follows. The appears after stacking the genuine shares with fake models for Visual Cryptography scheme(VCS), Cheating shares. behaviors in VC and Digital watermarking for the In the case of cheating, honest participants who present protection of digital images are discussed along with brief their shares for recovering the secret image are not able to review of their previous works in Section 2. We then distinguish fake shares from genuine shares. A describe the proposed Innovative Invisible and Blind reconstructed image is a perfect image indistinguishable Watermarking scheme for Cheating prevention in Section 3. from the original. The key point of cheating is how to The experimental results are provided in Section 4 and predict and rearrange the positions of black and white sub conclusions are summed up in Section 5. pixels in the victim’s and cheater’s share. Fig. 3 shows the whole cheating process and Table 1 shows how the II. REVIEW OF RELATED TOPICS cheaters create fake shares to change the decoded image. A. (2,2) Visual Cryptography Scheme Visual Cryptography (VC) was first introduced by Moni Noar and Shamir at Eurocrypt’94 [8]. It involved breaking up the image into n shares so that only someone with all n shares could decrypt the image by overlaying each of the shares over each other. To encode a secret employing a (2, 2) VC Scheme, the original image is divided into two shares such that each pixel in the original image is replaced with a non-overlapping block of two or four sub-pixels as shown in Fig.1. Fig 3. Cheating Process in VCS TABLE I FAKE SHARE PIXEL CREATION Pixel in Pixel in Pixel in Pixel in Pixel in Pixel in Pixel in Secret Share Cheat Share SA Share SC Share SA’ Share SB’ Image SB Image Fig 1. A (2,2) Visual Cryptography scheme white [1 0 0] [1 0 0] [1 0 0] white [1 0 0] [1 0 0] Anyone who holds only one share will not be able to reveal any information about the secret. To decode the white [1 0 0] [1 0 0] [1 0 0] black [0 1 0] [0 0 1] image, each of these shares is Xeroxed onto a transparency. Stacking both these transparencies will permit visual recovery of the secret. black [1 0 0] [0 1 0] [0 0 1] white [0 0 1] [0 0 1] There are several schemes of encoding the pixels of the secret image. In our scheme, each pixel in the secret image black [1 0 0] [0 1 0] [0 0 1] black [1 0 0] [0 1 0] is broken into four sub pixels. A white pixel is shared into ©2010 ACEEE 2 DOI: 01.IJSIP.01.03.81_264
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 C. Digital Watermarking into a single block of the host image. The watermark Our work has been motivated by a copious number of embedding process involves: mean calculation, embedding earlier works available in the literature that utilize digital strength (β) and signum function. Each non-overlapping image watermarking for protecting copyrights of digital block is converted into a vector, and the mean value of the images. Debasish Jena1Sanjay Kumar has proposed Data vector is computed and divided with the embedding hiding in halftone images using conjugate ordered dithering strength (β) Since, the watermark is a binary image; the (DHCOD) algorithm is given, which is a modified version process of watermark embedding involves two cases: of existing Data hiding in halftone image by conjugate embedding pixel value ‘1’ and embedding pixel value ‘0’. error diffusion (DHCED) algorithm. Lu et al. [10] have Two different inserting mathematical operations are carried presented a digital watermarking technique that is intended out for embedding pixel value ‘0’ and ‘1’. to solve some vital issues of the digital world, such as B. Watermark Extraction copyright protection, copy protection, and image This sub-section details the steps involved in the authentication.Wei-Che Chen [11] have presented a digital extraction of the binary watermark image from the image copyright protection scheme on the basis of visual watermarked image. As the proposed scheme is blind, cryptography (VC) and singular value decomposition (SVD) watermark extraction necessitates the watermarked image, techniques. Initially, the scheme applies SVD to a host size of watermark image and the embedding strength, image to construct a master share. This scheme embeds the whereas it doesn’t require the host image or any of its secret image without effecting any modification of the host characteristics. Initially, non overlapping blocks sized 2x2 image. All the above mentioned schemes provide copyright are extracted from the watermarked image and the number protection to the VC Secret image but where as VC secret of blocks extracted varies based on the size of the shares are still vulnerable to the Cheating attacks. In this watermark image. The blocks that are extracted are stored research, we propose an innovative Invisible and Blind in a vector. Subsequently, all the extracted blocks are watermarking scheme [6], applied to VC shares to secure converted into a vector and the mean value of the vector is them against Cheating attacks by the adversaries. computed. Afterwards, the mean values of all the blocks are divided by the embedding strength (β). The resultant III. PROPOSED MUTUAL AUTHENTICATION AND value is made use of in the extraction of watermark. Finally, CHEATING PREVENTION SCHEME USING a matrix of the size of the watermark image is created and INVISIBLE BLIND WATERMARKING the extracted pixel values are placed in it so as to obtain the This section presents the proposed Invisible and blind watermark image. watermarking Algorithm for the protection of Secret shares C. Phases of the Proposed Scheme in VC. The proposed scheme utilizes the binary VC secret share image as watermark data . With the aid of the In the proposed scheme we shall generate the VC- embedding strength and signum function, the scheme shares using basic visual cryptography model and then discussed, embeds this binary watermark image pixel into embed them into a cover image using a Invisible Blind every 2x2 non-overlapping block of some insignificant host Watermarking technique, so that the secret shares will be images. This process protects the VC secret shares from more secure and meaningful. And the shares are protected any adversary manipulations, which may result in fake from the malicious adversaries who may alter the bit shares. Also, during extraction, the embedded binary sequences to create the Fake shares. During the Decryption watermark is extracted from the watermarked host image phase, the secret shares are extracted from their cover using watermark image size and the embedding strength. images without needing any of the cover image As this digital watermarking scheme doesn’t require the characteristics to provide mutual authentication. original image or any of its characteristics for watermark Proposed scheme consists of three phases which are extraction, it is said to be blind. The VC Secret shares are described in the following subsections. completely hidden from malicious users. Hence it is proved Phase I – Visual Cryptographic Encryption : In this very that above stated Cheating behaviour in VC is prevented by first phase we will do visual cryptography encryption. It this novel watermarking algorithm. In our paper, we have consists of generation of shares using any basic visual chosen the user’s signature images for VC encryption cryptography model. Visual cryptographic solutions phase and this provides mutual authentication during any operate on binary inputs. In our proposed scheme, a transaction at the VC Decryption phase. The following (2,2)VC share creation is performed. During encoding due subsections describe the steps involved in the watermark to Pixel expansion the size of the shares will be large. Since embedding and extraction processes and also various each pixel in the original image is replaced by four sub- phases of the entire scheme. pixels in each share, the width of the decoded image is more than twice that of the original image. But after A. Watermark Embedding applying the Perfect Restoration techniques [12], the This sub-section presents the process of binary VC original size of the secret image can be restored. So the secret share image embedment into the host image. The result of this phase will be 2 unintelligible shares of black size of the host image chosen is dyadic (2nx2n) and the and white pixels. In real time applications share 1 will watermark used is a binary image. Firstly, non-overlapping available with Client and share 2 will be saved in the blocks sized 2x2 are extracted from the host image and Server database for future authentication purposes. Fig. 4 every pixel of the watermark VC share image is embedded ©2010 ACEEE 3 DOI: 01.IJSIP.01.03.81_264
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 shows the result of Share 1 creation with perfect restoration technique applied. Secret Image Phase I a)Original b) Share 1 c) Share 1 after Perfect Share 1 Share 2 Restoration technique Fig 4. Share 1 creation using (2,2) VC Encryption Phase II - Hiding the Shares using invisible blind Embed in Host Image Embed in Host image 1 2 Phase II watermarking : This is the second phase of our approach which will embed shares of the client and server, generated from the first phase into some host images. For watermarking we will use Invisible and Blind Watermarking scheme discussed under section 3. Use of watermarking will give an added advantage of double Extracted Extracted security over other visual cryptographic schemes. The Share 1 Share 2 watermarked host images are robust against various attacks like Blurring, Cropping,, Sharpening, JPEG Lossy compression. This forbids any malicious participant to access the secret shares and modify them into Fake shares Phase III thus preventing Cheating problem in VC. The result of this phase would be innocent looking watermarked host images that does not seem to contain any secret in them because of the invisible watermarking methodology applied. The Decoded Secret Image watermarked host image 1 and 2 will be available with the client and server databases. Phase III - Visual Cryptographic Decryption and Authentication: This is the last phase of proposed scheme. Fig. 5. Structure of the Proposed Scheme In this phase we extract the binary watermarked shares from the host images of the client and server. The proposed IV. SIMULATION RESULTS watermarking scheme doesn’t necessitate the original image or any of its characteristics for the extraction of For simulation we have used MATLAB 7.0 tool and watermark, and hence the proposed scheme is blind. Then tested with images of different sizes. The proposed scheme we apply the visual cryptographic decryption. As we achieves effective embedment of the binary share images know that visual Cryptographic decryption does not need into the host images. Also, the proposed scheme depicts any type of decryption algorithm or computation. It uses efficient extraction of the embedded watermarks from the human visual system for decryption which is the core watermarked images. The watermarked images possess advantage for which visual cryptography was developed. good Peak Signal to Noise Ratio (PSNR) and good visual Now we can decrypt the original secret image by quality. Fig. 6 depicts the results obtained on overlapping or stacking the shares. When the two shares experimentation of the entire proposed Visual are stacked together, the black pixels in the original image Cryptography scheme. remain black and the white pixels become grey. Although The results include original secret image, encoded some contrast loss occurs, the decoded image can be secret shares, host image, watermarked images and the clearly identified. Now again the perfect restoration decoded secret image. Thus the encoded secret shares have technique is used to remove the greying effect to give more been authenticated to prevent Cheating attacks. contrast. Hence the result of this phase will be an image consisting original secret image. Fig 5 is the structure of proposed scheme. ©2010 ACEEE 4 DOI: 01.IJSIP.01.03.81_264
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 image characteristics because the watermark extraction technique is blind.. The overlapping of these shares reveal a) Secret image the original secret. The decoded secret signature image quality is improved by using perfect restoration technique. Yet many possible enhancements and extensions can be made to improve further. REFERENCES [1] H.Yan, Z. Gan, and K. Chen,“A cheater detectable visual cryptography scheme,” (in Chinese) J. Shanghai Jiaotong Univ., vol. 38, no. 1, 2004. c) Share 1 [2] G.-B. Horng, T.-G. Chen, and D.-S. Tsai, “Cheating in b) Host Image 1 d) Watermarked host image 1 visual cryptography , ” Designs, Codes, Cryptog., vol. 38, no. 2, pp. 219–236, 2006. [3] M. Naor and B. Pinkas, “Visual authentication and identification,” in Proc. Advances in Cryptology, 1997, vol. 1294, LNCS, pp. 322–36. [4] P. Tao and A. M. Eskicioglu, “A Robust Multiple Watermarking Scheme in the DWT Domain,” Optics East 2004 Symposium,Internet Multimedia Management Systems f) Share2 V Conference, Philadelphia, PA, pp. 33-144, October 25-28, 2004. e) Host Image 2 g) Watermarked [5] Ersin Elbasi and Ahmet M. Eskicioglu, “A Semi-Blind host image 1 Watermarking Scheme for Color Images Using a Tree Structure," in proc. of IEEE Sarnoff Symposium, March, 2006 [6] M.A.Dorairangaswamy, “A Novel Invisible and Blind Watermarking Scheme for Copyright Protection of Digital Images,” International Journal of Computer Science and Network Security (IJCSNS), Vol. 9 , No. 4, pp. 71-78, 2009. h) Extracted & decoded Secret [7] M.A.Dorairangaswamy, “A Robust Blind Image Watermarking Scheme in Spatial Domain for Copyright Protection,” International Journal of Engineering and Fig. 6. Experimentation Results Technology (IJET), Vol. 1, No.3, pp. 249 - 255, August 2009. [8] M. Naor and A. Shamir, .Visual Cryptography,. Advances V. CONCLUSION in Cryptography -EUROCRYPT'94, Lecture Notes in Visual cryptography is the current area of research Computer Science 950, 1995, pp. 1-12. where lot of scope exists. Currently this particular [9] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual cryptographic technique is being used by several countries Cryptography, .IEEE Transaction on Image Processing, vol. 16, no. 1, Jan- 2007, pp. 36-45. for secretly transfer of hand written documents, financial [10] Zhe-Ming Lu, Wei-Min Zheng, Jeng-Shyang Pan and Zhen documents, text images, internet voting etc. There are Sun, “Multipurpose Image Watermarking Method Based various innovative ideas and extensions exist for the basic on Mean-removed Vector Quantization", Journal of visual cryptographic model introduced till now. One such Information Assurance and Security, Vol. 1, pp. 33-42, enhancement we are trying to do in terms of preventing 2006. cheating attacks. In the existing VC schemes no security is [11] Ming-Shi Wang and Wei-Che Chen, "Digital image provided to the secret shares and adversaries can alter its copyright protection scheme based on visual cryptography bit sequences to create fake shares. And in our proposed and singular value decomposition", Optical Engineering, scheme, the vulnerability of these binary secret shares is Vol. 46, No. 6, 2007. [12] Duo Jin, Wei-Qi Yan, Mohan S. Kankanhalli, “ Progressive overcome by hiding them invisibly into some host images. Color Visual Cryptography”, SPIE Journal of Electronic During the decryption phase, the secret shares are extracted Imaging (JEI/SPIE) Jan,2006 from their cover images without needing any of the cover ©2010 ACEEE 5 DOI: 01.IJSIP.01.03.81_264