SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · PDF fileThe Secure Data Sharing Using Visual Cryptography Scheme is ... for online payment utilizing both visual ... steganography
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY
V.Vaishnavi1, B.Shanthi
2 and S. Sophia Rani
3
1,2 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous),
Periyakulam, Theni (Dt) 3Assistant Professor, Dept. of Computer Science Jayaraj Annapackiam College for Women(Autonomous),
Periyakulam, Theni(Dt)
ABSTRACT
The Secure Data Sharing Using Visual Cryptography Scheme is a kind of secret sharing scheme that fixates on
sharing secret data. The fundamental conception of the visual cryptography scheme is to split a secret data into
number of desultory shares which discretely reveals no information about the secret data other than the size of
the secret data. The AES algorithm used for secret key .The secret data can be reconstructed by stacking the
portions. In the multimedia steganocryptic system, the message will first be encrypted utilizing public key
encryption algorithm, and then this encrypted data will be obnubilated into an image file thus accomplishing
both data encoding and obnubilating. The multimedia data will be acclimated to provide the cover for the
information. Visual steganography is one of the most secure forms of steganography available today. It is most
commonly implemented in image files. In this application concept of visual cryptography is the legal
distribution of multimedia contents with copyright protection whilst preserving the privacy of user, whose
identities are only revealed in case of illegal re-distribution. This application to apply sharing of single secrete data and multiple secrete data on ebony and white as well as on colour images but withal a comparative
analysis on visual cryptography schemes is with all performed.
Keywords: Secure data sharing, steganography, visual cryptography
I. INTRODUCTION
In today’s information age, information sharing and transfer has incremented
exponentially. The threat of an intruder accessing secret information has been an ever
subsisting concern for the data communication experts. Cryptography and steganography are
the most widely used techniques to surmount this threat. Cryptography involves converting a
message text into an unreadable cipher. On the other hand, steganography embeds message
into a cover media and obnubilated its subsistence. Both these techniques provide some
security of data neither of them alone is secure enough for sharing information over an
unsecure communication channel and are vulnerably susceptible to intruder attacks. Albeit
these techniques are often cumulated together to achieve higher calibres of security but still
there is a desideratum of a highly secure system to transfer information over any
communication media minimizing the threat of intrusion. Visual cryptography is the art of
encrypting information such as handwritten text, images etc. in such a way that the
decryption is possible without any mathematical computations and human visual system is
sufficient to decrypt the information. The individuals who do not have cognizance of
cryptography are indirectly getting involved in decryption. The major drawback found in this
scheme is that visually blind people cannot make utilization of this technique as we perform
the encryption by making the quota and person who perform the encryption those people only
able to find the exact shares for performing the decryption.
strength of security achieved is very high and unauthorized receiver will not be able to get
back the original message using exhaustive without the knowledge of key parameters.
REFERENCES
[1] Wu C., Chen L., A study on visual cryptography,” Master‟s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[2] Sirisha B. L., Lakshmi G. S., A novel cryptographic technique under visual secret sharing scheme
for binary image, International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp:
International Conference on Computational Intelligence and Security, 2007
[4] Parakh A., Kak S., A Recursive Threshold Visual Cryptography Scheme, Dept. of Computer
Science, Oklahoma State University.
[5] Jena D., Jena S. K., A Novel Visual Cryptographic Scheme,” IEEE,2008, pp. 207–211.
[6] Kessler G. C., An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28
April 2013.
[7] Pal J. K., Mamdal J. K., Gupta K. D., A (2, N) Visual Cryptographic Technique For Banking Applications, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4,
October 2010.
[8] Weir J., Yan W. Q., Sharing Multiple Secrets Using Visual Cryptography, IEEE, 2009
[9] Naor M., Shamir A., Visual cryptography, Advances in Cryptology EUROCRYPT ‟94. Lecture
Notes in Computer Science,1995,(950):pp. 1-12.
[10] Mandal, J.K.; Ghatak, S. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC), Electronic System Design (ISED), 2011 International
Symposium on, On page(s): 329 – 334
[11] Mandal, J.K.; Ghatak, S. Secret image / message transmission through meaningful shares using
(2, 2) visual cryptography (SITMSVC), Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 – 268
[12] Katta S., Recursive Information Hiding in Visual Cryptography, 2010
[13] Yue T. W., Chiang S., A Neural Network Approach for Visual Cryptography. Proceedings of the
IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN‟00) .pp. 1-2.
[14] Chakraborty U., Paul J. K., Mahapatra P. R. S., “Desigan and Implementaion of a (2,2) and a