Top Banner
SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY V.Vaishnavi 1 , B.Shanthi 2 and S. Sophia Rani 3 1,2 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous), Periyakulam, Theni (Dt) 3 Assistant Professor, Dept. of Computer Science Jayaraj Annapackiam College for Women(Autonomous), Periyakulam, Theni(Dt) ABSTRACT The Secure Data Sharing Using Visual Cryptography Scheme is a kind of secret sharing scheme that fixates on sharing secret data. The fundamental conception of the visual cryptography scheme is to split a secret data into number of desultory shares which discretely reveals no information about the secret data other than the size of the secret data. The AES algorithm used for secret key .The secret data can be reconstructed by stacking the portions. In the multimedia steganocryptic system, the message will first be encrypted utilizing public key encryption algorithm, and then this encrypted data will be obnubilated into an image file thus accomplishing both data encoding and obnubilating. The multimedia data will be acclimated to provide the cover for the information. Visual steganography is one of the most secure forms of steganography available today. It is most commonly implemented in image files. In this application concept of visual cryptography is the legal distribution of multimedia contents with copyright protection whilst preserving the privacy of user, whose identities are only revealed in case of illegal re-distribution. This application to apply sharing of single secrete data and multiple secrete data on ebony and white as well as on colour images but withal a comparative analysis on visual cryptography schemes is with all performed. Keywords: Secure data sharing, steganography, visual cryptography I. INTRODUCTION In today’s information age, information sharing and transfer has incremented exponentially. The threat of an intruder accessing secret information has been an ever subsisting concern for the data communication experts. Cryptography and steganography are the most widely used techniques to surmount this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and obnubilated its subsistence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerably susceptible to intruder attacks. Albeit these techniques are often cumulated together to achieve higher calibres of security but still there is a desideratum of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. Visual cryptography is the art of encrypting information such as handwritten text, images etc. in such a way that the decryption is possible without any mathematical computations and human visual system is sufficient to decrypt the information. The individuals who do not have cognizance of cryptography are indirectly getting involved in decryption. The major drawback found in this scheme is that visually blind people cannot make utilization of this technique as we perform the encryption by making the quota and person who perform the encryption those people only able to find the exact shares for performing the decryption. II. RELATED WORK International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com 605
5

SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

Jan 30, 2018

Download

Documents

lamdang
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY

V.Vaishnavi1, B.Shanthi

2 and S. Sophia Rani

3

1,2 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous),

Periyakulam, Theni (Dt) 3Assistant Professor, Dept. of Computer Science Jayaraj Annapackiam College for Women(Autonomous),

Periyakulam, Theni(Dt)

ABSTRACT

The Secure Data Sharing Using Visual Cryptography Scheme is a kind of secret sharing scheme that fixates on

sharing secret data. The fundamental conception of the visual cryptography scheme is to split a secret data into

number of desultory shares which discretely reveals no information about the secret data other than the size of

the secret data. The AES algorithm used for secret key .The secret data can be reconstructed by stacking the

portions. In the multimedia steganocryptic system, the message will first be encrypted utilizing public key

encryption algorithm, and then this encrypted data will be obnubilated into an image file thus accomplishing

both data encoding and obnubilating. The multimedia data will be acclimated to provide the cover for the

information. Visual steganography is one of the most secure forms of steganography available today. It is most

commonly implemented in image files. In this application concept of visual cryptography is the legal

distribution of multimedia contents with copyright protection whilst preserving the privacy of user, whose

identities are only revealed in case of illegal re-distribution. This application to apply sharing of single secrete data and multiple secrete data on ebony and white as well as on colour images but withal a comparative

analysis on visual cryptography schemes is with all performed.

Keywords: Secure data sharing, steganography, visual cryptography

I. INTRODUCTION

In today’s information age, information sharing and transfer has incremented

exponentially. The threat of an intruder accessing secret information has been an ever

subsisting concern for the data communication experts. Cryptography and steganography are

the most widely used techniques to surmount this threat. Cryptography involves converting a

message text into an unreadable cipher. On the other hand, steganography embeds message

into a cover media and obnubilated its subsistence. Both these techniques provide some

security of data neither of them alone is secure enough for sharing information over an

unsecure communication channel and are vulnerably susceptible to intruder attacks. Albeit

these techniques are often cumulated together to achieve higher calibres of security but still

there is a desideratum of a highly secure system to transfer information over any

communication media minimizing the threat of intrusion. Visual cryptography is the art of

encrypting information such as handwritten text, images etc. in such a way that the

decryption is possible without any mathematical computations and human visual system is

sufficient to decrypt the information. The individuals who do not have cognizance of

cryptography are indirectly getting involved in decryption. The major drawback found in this

scheme is that visually blind people cannot make utilization of this technique as we perform

the encryption by making the quota and person who perform the encryption those people only

able to find the exact shares for performing the decryption.

II. RELATED WORK

International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com

605

Page 2: SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

Visual cryptography enrooted by M. Naor and A. Shamir, and they described general (p,n)

VCS. When shares are merged using OR/XOR operation, grayed secret image recovered.

Fig1. Shares used by Naor and Shamir in (2, 2) VCS

They designed (2,2) VCS using 4 subpixels, it means one pixel of original image provokes 4

subpixels in each share. Hence share size is 4 times as original. Here are some induced share

for their (2,2) scheme[5][9] Tai-wen Yue and Chian[13] introduces a modified scheme in

which the share dimension is twice of riginal in horizontal direction while remains same in

vertical direction. Its contrast is same as Naor and Shamir 2 out of 2 schemes

Fig2. Shares used by Tai-wen and Suchen Chian [8]

D. Jena and S. K. Jena proposed data hiding in halftone images using conjugate ordered

dithering DHCOD)[5]. They considered security of shares [5] in visual cryptography. Firstly,

shares are generated using basic scheme. Then these shares are watermarked [5] with some

cover image using DHCOD [5]. The decryption is made by human visual system. Abhisek

Parakh and Subhas Kak proposed a (2, 3) VCS based on recursive hiding scheme [1],[12]. All

the above mentioned schemes increase the size of shares and loss visual fidelity.

III. MATERIALS AND METHODS

Visual cryptography is a cryptographic technique where visual information (Image,

text, etc) gets encrypted in such a way that the decryption can be performed by the human

visual system without avail of computers. Proposed an authentication system for online

payment utilizing both visual cryptography which averted form identity larceny.

Authentication

International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com

606

Page 3: SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

The Authentication Server (AS) functions as any AS would with a few additional

behaviors added to the typical client-authentication protocol. The first addition is the sending

of the client authentication information to the masquerading router. The AS in this model also

functions as a ticketing authority, controlling permissions on the application network. The

other optional function that should be supported by the AS is the updating of client lists,

causing a reduction in authentication time or even the removal of the client as a valid client

depending upon the request.

User The proposed system can be deployed and managed by any of the three parties

mentioned in the previous section: content owners, hosting sites, or service providers.

Distributed Index: Maintains signatures of objects that need to be protected;

Reference Registration: Creates signatures from objects that content owners are

interested in protecting, and inserts them in the distributed index;

Query Preparation: Creates signatures from objects downloaded from online sites,

which are called query signatures. It then uploads these signatures to a common

storage;

Object Matching: Compares query signatures versus reference signatures in the

distributed index to find potential copies. It also sends notifications to content owners

if copies are found;

Parallel Crawling: Downloads multimedia objects from various online hosting sites.

The Distributed Index and Object Matching components form what we call the

Matching Engine. The second and third components deal with signature creation. For

the Crawling component, we designed and implemented a parallel crawler and used it

to download videos from YouTube. The details of the crawler are omitted due to

space limitations.

Monitor

Proxies are not trusted and the fragments sent through them shall be encrypted in such a way

that only the sender and the recipient have access to their clear text. Malicious proxies may

also try to cheat by reporting false segments (or not reporting them at all) to the transaction

monitor.

Tracing authority

In case of illegal re-distribution, it participates in the tracing protocol that is used to identify

the illegal re-distributor(s). Proposed System, Visual Cryptography (VC), technique

predicated on visual secret sharing utilized for image encryption. Secure Socket Layer (SSL)

encryption obviates the interception of consumer information in transit between the consumer

and the online merchant. In this paper, an incipient method is proposed, that utilizes text

predicated steganography and visual cryptography, which minimizes information sharing

between consumer and online merchant.VCS is a cryptographic technique that sanctions for

the encryption of visual information such that decryption can be performed utilizing the

human visual system. For phishing detection and obviation, we are proposing an incipient

methodology to detect the phishing website. Our methodology is predicated on the Anti-

Phishing Image Captcha validation scheme utilizing visual cryptography. It averts password

and other confidential information from the phishing websites. Cryptographic technique :( 2,

2) - Threshold VCS scheme,(n, n) -Threshold VCS scheme, (k, n) Threshold VCS scheme are

utilized in this proposed system.

International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com

607

Page 4: SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

Advantages of Proposed System

Our methodology is based on the Anti-Phishing Image Captcha validation scheme

using visual cryptography.

It prevents password and other confidential information from the phishing

websites.

For phishing detection and prevention, we are proposing a new methodology to

detect the phishing website.

IV. RESULTS AND DISCUSSION

System implementation involves creating or acquiring the various system components such

as software, hardware, and database etc., defined in the design step, assembling then and

putting the new system into operation. The primary goal of system implementation is

development of source code that is easy to read and to understand clarifying of sources code

eases debugging, testing and modification of a sources paper.

V.CONCLUSION

We proposed security for the particular image whoever having multiple owners. The main

objective of this paper is to provide equal digital rights to the owners of the file. Visual

cryptography technique refers for which generates N shares according to the number of

owners and the secure gives to authenticate each share with its owner. The security of data is

maintained using both visual cryptography. Thus the proposed systems is the requirement of

security and digital rights management by using the fog computing.Thus we conclude that the

International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com

608

Page 5: SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography

strength of security achieved is very high and unauthorized receiver will not be able to get

back the original message using exhaustive without the knowledge of key parameters.

REFERENCES

[1] Wu C., Chen L., A study on visual cryptography,” Master‟s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.

[2] Sirisha B. L., Lakshmi G. S., A novel cryptographic technique under visual secret sharing scheme

for binary image, International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp:

1473-1484.

[3] Yu B., Xu X., Fang L., Multi-secret Sharing Threshold Visual Cryptography Scheme,

International Conference on Computational Intelligence and Security, 2007

[4] Parakh A., Kak S., A Recursive Threshold Visual Cryptography Scheme, Dept. of Computer

Science, Oklahoma State University.

[5] Jena D., Jena S. K., A Novel Visual Cryptographic Scheme,” IEEE,2008, pp. 207–211.

[6] Kessler G. C., An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28

April 2013.

[7] Pal J. K., Mamdal J. K., Gupta K. D., A (2, N) Visual Cryptographic Technique For Banking Applications, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4,

October 2010.

[8] Weir J., Yan W. Q., Sharing Multiple Secrets Using Visual Cryptography, IEEE, 2009

[9] Naor M., Shamir A., Visual cryptography, Advances in Cryptology EUROCRYPT ‟94. Lecture

Notes in Computer Science,1995,(950):pp. 1-12.

[10] Mandal, J.K.; Ghatak, S. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC), Electronic System Design (ISED), 2011 International

Symposium on, On page(s): 329 – 334

[11] Mandal, J.K.; Ghatak, S. Secret image / message transmission through meaningful shares using

(2, 2) visual cryptography (SITMSVC), Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 – 268

[12] Katta S., Recursive Information Hiding in Visual Cryptography, 2010

[13] Yue T. W., Chiang S., A Neural Network Approach for Visual Cryptography. Proceedings of the

IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN‟00) .pp. 1-2.

[14] Chakraborty U., Paul J. K., Mahapatra P. R. S., “Desigan and Implementaion of a (2,2) and a

(2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .

International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com

609