EXTENDED VISUAL CRYPTOGRAPHY USING WATERMARKING TECHNIQUE Enrollment No. - 9911103553 Name of Student - Shivam Singh Name of Supervisor - Mr. Raju Pal June -2015 Submitted in partial fulfillment of the Degree of Bachelor of Technology In Computer Science Engineering DEPARTMENT OF COMPUTER SCIENCE ENGINEERING & INFORMATION TECHNOLOGY JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY, NOIDA
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
EXTENDED VISUAL CRYPTOGRAPHY USING WATERMARKING
TECHNIQUE
Enrollment No. - 9911103553
Name of Student - Shivam Singh
Name of Supervisor - Mr. Raju Pal
June -2015
Submitted in partial fulfillment of the Degree of
Bachelor of Technology
In
Computer Science Engineering
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING &
INFORMATION TECHNOLOGY
JAYPEE INSTITUTE OF INFORMATION TECHNOLOGY, NOIDA
TABLE OF CONTENTS
Chapter No. Topics
Page No.
Acknowledgement I
Summary II
List of Tables
List of Figures Iv
List of Symbols and Acronyms V
Chapter-1 Introduction
1.1 General Introduction 1
1.2 Problem Statement 1
1.3 Empirical Study 2
1.4 Approach to problem in terms of technology 2
Chapter-2 Literature Survey
2.1 Summary of papers studied
2.2 Integrated Summary
2.3 Integrated Summary of the literature studied
2.4 Empirical Study
3-6
7
5
6-9
Chapter-3 Analysis, Design and Modeling
3.1 Overall Description Of the Project 8
3.2 Functional Requirements 8
3.3 Non Functional requirements
dependency details
9
3.4 Design Diagrams 9
Chapter-4 Implementation details and issues
4.1.1 Implementation issues
10
4.1.2 Algorithms 11
4.2 Risk Analysis Mitigation 13-15
Chapter-5 Testing
5.1 Testing Plan 16
5.2 Component Decomposition and type of Testing
Required
18
5.3 List all test cases 18
5.4 Limitations of the solution 18
Chapter-6 Findings & Conclusion
6.1 Findings 19
6.2 Conclusion
19
6.3 Future Work 19
Appendix A. Gantt Chart
B. References
C. Snapshots
D. CV
20
20
21-24
25-26
(II)
DECLARATION
I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it
contains no material previously published or written by another person nor material which has been
accepted for the award of any other degree or diploma of the university or other institute of higher
learning, except where due acknowledgment has been made in the text.
Place: Noida Signature :
Date: 4/06/2015 Name : Shivam Singh
Enrollment No. : 9911103553
(III)
CERTIFICATE
This is to certify that the work titled “EXTENDED VISUAL CRYPTOGRAPHY USING
WATERMARKING” submitted by “Shivam Singh” in partial fulfillment for the award of degree of
B. Tech. of Jaypee Institute of Information Technology, Noida has been carried out under my
supervision. This work has not been submitted partially or wholly to any other University or Institute
for the award of this or any other degree or diploma.
Signature of Supervisor:
Name of Supervisor : Mr. Raju Pal
Designation : Assistant Professor
Date : 4-06-2013
(IV)
ACKNOWLEDGEMENT
The completion of any project work depends upon the cooperation, coordination and combined
effects of several resources of knowledge, energy and time. Therefore we approach this important
matter of acknowledgement through these lines trying our best to give full credits where it
deserves.
I am extremely grateful to my supervisor Mr. Raju Pal for his expert guidance, constant
encouragement, valuable suggestions, constructive criticism and sustained interest in the project that
tremendously enhanced our perseverance towards our major project work.
Name of Student : Shivam Singh
Enrollment Number : 9911103553
Date : 3 May 2015
(V)
SUMMARY
Digital watermarking is a technique that provides a solution to the longstanding problems faced with
copyrighting digital data. Often attackers are only interested in a small subsection of the image. A
watermark at the edge of an image can often easily be cropped out of the picture without any
significant loss. The only defense against this attack is to tile a very small watermark all over the
image, and allow retrieval of the watermark from any of the small subsections of the fragmented image.
Further with a robust encryption and decryption technique we can have a proper security altogether.
Signature of Student: Signature of Supervisor:
Name : Name
Date : Date
(VI)
LIST OF TABLES
Table No. Description Page Number
Table 1 Integrated Summary 7
Table 2 Risk Analysis 14
Table 3 Impact 14
Table 4 Mitigation Plan 15
Table 5 Test Plan 17
Table 6 Test Schedule 17
Table 7 Testing Components 18
Table 8 Test cases 18
(VII)
List of Figures
Figure No. Description Page no.
Fig1 Sequence Diagram 9
Fig2 Embedding Algorithm 11
Fig3 Extracting Algorithm 12
(VIII)
List of Symbols and Acronyms
Acronym Meaning
HTML Hyper Text Markup Language
EVCS Extended Visual Cryptography Scheme
LSB Least Significant Bit
AES Advance Encryption Standard
Chapter 1: Introduction
1.1 General Introduction-
First and foremost, Naor and Shamir suggested an encryption scheme that was able to encrypt an
images they call it Visual Cryptography scheme. VCS is a type of cryptography in which images can be
encrypted in a secure way by dividing them in a distorted image called transparent shares and
transmitted physically by printing these shares on transparency sheets to the intended user. The
essential intention behind this plan was to encode a mystery picture and send over uncertain medium to
the objective client to share it. The magnificence of this plan is that the offer produced by this plan does
not uncover any data about the first picture and the quantity of shares created in this plan guarantees the
security of the substance held in the offer. This makes VCS plan a totally secure plan. VCS is a vital
plan and it is material in a wide mixture of uses where it can be utilized. Case in point it can be utilized
by any individual who has no data about cryptography can utilize it effortlessly. Many types of visual
cryptography are used nowadays, the very first type of traditional visual cryptography right up to the
latest developments. Traditional VC specifically deals with sharing a single binary secret between a
numbers of participants. Extended VC attempts to take this a step further by introducing shares that
have significant visual meaning. This detracts from the suspicious looking encrypted shares that are
generated using traditional methods. Dynamic, colour, progressive and image hatching VC schemes are
also taken into consideration for latest developments in this field.
1.2 Problem Statement-
Due to rapid growth in computer technology and multimedia network techniques the digital media is
now prone to attacks in one way or another. However, there are some areas where the data can be
exploited in a negative way, which create a pressing need for copyright enforcement methods that can
protect copyright ownership. VCS cheating prevention is one of such methods that have been
developed to protect intellectual property of image in digital form. It is realized by embedding the
copyright information, also known as "the watermark pattern", into the original image. The watermark
pattern in the cover image can be either visible or invisible. But even after providing a secure medium
the watermarking is not exclusively used for sharing important information which is the problem
statement for the course of this project.
1.3 Empirical Study-
Digital watermarking is a method that provides a better solution to the problems faced with digital data
copyrighting. Often hackers are only interested in a small portion of the image. A watermark at the
corners of an image can often easily be exploited by polluting or cropping out the picture without any
significant loss. The mosaic attack is a perfect example of this method. In a mosaic attack, the attacker
exploits the entire watermarked image by breaking it into many small parts. The only defense against
this attack is to place over a very small watermark all over the image, and allow them to get the
watermark from any of the small subsections of the fragmented image. With a robust encryption and
decryption technique we can have a proper security altogether. Further this will provide a much more
secure way to share information through watermarking.
1.4 Approach to problem in terms of technology
The different approach of watermarking, encryption and decryption are solved using java. Different
modules of the requirements were made using java applet and were depicted in a combined form.
Further as the key entered at the time of encryption needs a check at the time of decryption so it is
managed my MySQL database server using SQLyog. Further for the project to be secure there is a
login created in starting. Finally we easily save the decrypted file for our use.
Chapter 2: Literature Survey
2.1 Summary of papers studied
2.1.1 Visual Cryptography-(Base paper)
Authors-Moni Naor and Adi Shamir
Publishing details -Lecture Notes in Computer Science Volume 950, pp. 1-12.
Year-1995
Summary-
The paper gives insight on the problem of encrypting written material in a perfectly secure way
which can be decoded directly by the human visual system. The basic model consists of two parts
namely a printed page of ciphertext (information that is shared) and a printed transparency (secret
key). The original cleartext is obtained by placing the transparency by placing the key over the page
having ciphertext; moreover each one of them is indistinguishable from random noise. Due to its
simplicity, the system can be used by anyone without any knowledge of cryptography and without
performing any cryptographic computations.
Given a written message, it was required to generate n transparencies so that if any k (or more) of
them are stacked together then the original message is visible, but becomes totally invisible if less
than k transparencies are stacked together. The original encryption problem can be considered as a
2 out of 2 secret sharing problem. The main results of this paper include practical implementations
of a k out of n visual secret sharing scheme for small values of k and n, as well as efficient
constructions which can be proven optimal within certain classes of schemes.