Académique Documents
Professionnel Documents
Culture Documents
1. INTRODUCTION
Visual cryptography (VC), first proposed in 1994 by Naor and Shamir, is a secret
sharing scheme, based on black and-white or binary images. Secret images are divided into
share images which, on their own, reveal no information of the original secret. Shares may be
distributed to various parties so that only by collaborating with an appropriate number of
other parties, can the resulting combined shares reveal the secret image. Recovery of the
secret can be done by superimposing the share images and, hence, the decoding process
requires no special hardware or software and can be simply done by the human eye. Visual
cryptography is of particular interest for security applications based on biometrics. For
example, biometric information in the form of facial, fingerprint and signature images can be
kept secret by partitioning into shares, which can be distributed for safety to a number of
parties. The secret image can then recovered when all parties release their share images
which are then recombined.
Visual cryptography is a secret sharing scheme which uses images distributed as
shares such that, when the shares are superimposed, a hidden secret image is revealed. In
extended visual cryptography, the share images are constructed to contain meaningful cover
images, thereby providing opportunities for integrating visual cryptography and biometric
security techniques. In this paper, we propose a method for processing halftone images that
improves the quality of the share images and the recovered secret image in an extended visual
cryptography scheme for which the size of the share images and the recovered image is the
same as for the original halftone secret image. The resulting scheme maintains the perfect
security of the original extended visual cryptography approach.
3. FEASIBILITY STUDY
Preliminary investigations examine project feasibility, the likelihood the system
organization. The main objective of this study is to determine whether the proposed system is
feasible or not. Mainly there are three types of feasibility study to which the proposed system
is subjected as described below. Three key considerations are involved in the feasibility.
Technical Feasibility
Economic Feasibility
Behavioral Feasibility
Does the proposed equipment have the technical capacity to hold the data required to use
the new system?
Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation
System. The current system developed is technically feasible. It is a web based user interface
Department of MCA, CKC
for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases
purpose is to create, establish and maintain a workflow among various entities in order to
facilitate all concerned users in their various capacities or roles. Permission to the users
would be granted based on the roles specified.
Will the system be used and work properly if it is being developed and implemented?
Will there be any resistance from the user that will undermine the possible application
benefits?
4. SYSTEM DESIGN
Design is the first in the development phase for any engineered product or system.
System design is a process of evaluating alternate solution, evaluating the choice following
up the specification for the chosen alternative. System design work follows logically system
analysis. The objective of the system design is to improve the existing system or design a
new system as the case may be and implement the system with improved facilities.
Sender.
EVC method.
Receiver.
4.1.1 Sender
Getting Authorization is the first stage in sending phase. If a user wants to send a text
to Destination user, he wants unique Identification. By using that Identification System
knows that the person is an authorized person. This phase or Sender Module has Sub
Modules. They are as:
Registration
Login
Send Data
Registration is the Initial state for getting Authentication. By Providing username and
Password user sets their Authentication. By using username and Password system will
identify the Authorized person. These credentials are provided to user for the login purpose.
These values are stored in the Database. The Database access will be through the registration
form in the project. A user wants to send an image, he/she must log in by using his/her
authentication credentials. If the user does not provide proper information or the given
information is mismatched with database then our system shows Exception message
immediately. If the users details are verified and matched with the existing database then our
system allows the person to transmit the image.
Department of MCA, CKC
4.1.2 EVC
An extended VC scheme adds a meaningful cover image in each share. Although
image expansion is necessary to exactly preserve the information from the pixels of the
original secret image in the recovered secret image, we can use either the basic preprocessing scheme, SBR, or the more advanced BBR method to ensure that the share and
recovered images use the same number of pixels as the original halftone secret image. Of
course, the trade-off in such an approach is a decline in image quality.
In this section, we examine the application of the preprocessing schemes to construct
a (2; 2) EVC scheme without image size expansion. In doing so, we take three halftone
images as inputs. The first two images are considered to be meaningful cover images and the
third image is the secret image. One of the block replacement algorithms converts the three
input images into the processed images. A processed image contains white and black blocks
and can be used as an input secret image in any visual cryptography encoding process. After
producing the three processed images by the appropriate method, the two shares are
generated according to the EVC encoding process. The secret image is recovered by stacking
the two shares together. It should be noted that our non-expansion EVC scheme is as secure,
as the new scheme does not change the share generation approach.
4.1.3 Receiver
Getting Authorization is the first stage in receive phase. If a user wants to receive a
text from source user, he wants unique Identification. By using that Identification System
knows that the person is an authorized person. Verifying the credentials provided, it will
allow the user to receive the data. The data given are stored in the database. Similarly there
will be secret key generation. In the receiver there will be decryption module. This phase or
Receiver Module has Sub Modules. They are as:
Registration
Login
Receive Data
Registration is the Initial state for getting Authentication. By Providing username and
Password user sets their Authentication. System provides one more credentials that is Secret
key which is generated by the system for each user. By using username and Password will
identify the Authorized person. These values are stored in the Database. A user wants to send
Department of MCA, CKC
an image, he/she must log in by using his/her authentication credentials. .If the user does not
provide proper information or the given information is mismatched with database then our
system shows Exception message immediately.
The main aim of this module is to decrypt an image. Decryption will happen only if
the system gets a cover image from sender.
4.2 ER Diagram
E-R Diagrams means Entity Relationship model, which is a popular high level
conceptual data model. The diagrammatic notation associated with the E-R model, known as
ER diagram. In ER diagram the emphasis is on representing the schemas rather than the
instances. Three main components of an ER are the entities, which are objects or concepts
that can have data stored about them, the relationship between those entities, and
the cardinality, which defines that relationship in terms of numbers.
4.2.1 Some Notations Used in ER diagrams
Entity
Weak Entity
Relationship
Attribute
Key Attribute
A process represents transformation where incoming data flows are changed into
outgoing data flows. A circle or a bubble represents a process that transforms incoming
data flows into outgoing data flows.
3. DATA STORE
A data store represent a repository of data that is to be stored for use by one or more
processes and may be simple as buffer or queue or sophisticated as a relational database.
They should have clear names.
4. A SOURCE OR SINK
The direction of flow is from top to bottom and from left to right.
The names of data stores, sources, and destinations are written in capital letters
Secret
image
Secret
image
Sender
EVC
Receiver
10
LEVEL 1
11
LEVEL 2
12
by the user can be controlled by the input design. The goal of designing the input data is to
make data entry easy, logical and free from errors as possible. The input design is the link
that ties the information system into the world of its users. Some aspects of the design vary,
depending on whether the system is batch oriented or online. But regardless of the system,
there are general input concerns that all analysts should have. Input design consists of
developing specifications and procedures for the data preparation, those steps necessary to
put transaction data into a usable form for process, and data entry, the activity of putting data
into the computer for processing .As obviously data entry can be achieved by instructing the
computer to read data from a written or printed document, or it can occur by having people
key data directly into the system.
4.5.2 Output design
Outputs are the most important and direct source of information to the user and to the
department. Intelligent output design will improve the systems relationship with the user and
help much in decision-making. Outputs are also used to provide a permanent hard copy of the
results for later uses. The forms used in the system are shown in the appendix. Computer out
output is the most important and direct source of information the user. Efficient, intelligible
output design should improve the systems relationship with the user and help in decision
making.
Data Type
Length
Constraints
Description
LOGID
int
11
NOT NULL
PRIMARY KEY
UNAME
varchar
100
PSWD
varchar
100
Table 4.6: Login Table
13
Data Type
Length
Constraints
Description
int
11
NOT NULL
PRIMARY KEY
FNAME
varchar
100
FNAM
varchar
100
SEX
varchar
10
PHONE
varchar
100
varchar
100
LOGINID
varchar
100
NOT NULL
FOREIGN KEY
RID
Front end
Java
Back end
MySQL
Operating System
Windows/Linux
IDE
Eclipse
Pentium IV
System Bus
32 BIT
RAM
512 MB
HDD
40 GB
14
5. ALGORITHM OR PSEUDOCODE
Algorithm 5.1: Converting color image into processed Black n white image
Input : Color image
Output : Processed Black n white image
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
Step
15
6. SYSTEM TESTING
Software testing is the crucial element of the software quality assurance and
represents the ultimate review of specification, design and coding. Testing represents an
interesting anomaly for the software. During earlier definitions and development phases, it
was attempted to build software from an abstract concept to tangible information. The testing
phase is a very important phase since it is in this phase; we make sure that the system will
perform the task without any error. This checking resulted in achieving error free programs.
Testing methodologies:
Unit testing
Integration testing
Output testing
Validation testing
Unit Testing
Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as "Module Testing". The modules are tested separately. This
testing is carried out during programming stage itself in this testing step each module is found
to be working satisfactorily as regard to the expected output from the module.
Integration Testing
Integration testing is a systematic technique for constructing tests to uncover errors
associated with the interface. In this project, all the modules combined, and then entire
program is tested as a whole. Thus in the integration testing step, all the errors uncovered are
corrected for the next testing steps.
Output Testing
After performing the validation testing, the next step is output testing of the proposed
system since no system could be useful if it does not produce the required output in the
Department of MCA, CKC
16
specified format. The output generated or displayed by the system under consideration is
testing asking the users about the format required by them. Here, the output is considered into
two ways: one is on the screen and the other is printed format.
Validation Testing
Validation testing is where requirements established as a part of software requirement
analysis is validated against the software that has been constructed. This test provides the
final assurance that the software meets all functional, behavioral and performance
requirements. The errors, which are uncovered during integration testing, are corrected during
this phase
17
7. SCREEN SHOTS
7.1 Login
7.2 Registration
18
19
20
21
22
23
24
25
26
8. RESULT
An extended VC scheme adds a meaningful cover image in each share. Although
image expansion is necessary to exactly preserve the information from the pixels of the
original secret image in the recovered secret image, we can use either the basic preprocessing scheme, SBR, or the more advanced BBR method to ensure that the share and
recovered images use the same number of pixels as the original halftone secret image.
An extended visual cryptography scheme, which does not require more pixels in the
shares and recovered image than the original secret image and yet preserves a good quality
image for both the shares and the recovered image. Our scheme maintains the perfect security
of the basic EVC scheme.
27
9. CONCLUSION
In this project, we have explored extended visual cryptography without expansion.
We have shown that using an intelligent pre-processing of halftone images based on the
characteristics of the original secret image, we are able to produce good quality images in the
shares and the recovered image. Note that other applications can also benefit from the preprocessing approach, such as multiple image visual cryptography, which hides multiple
images in shares.
28
29
REFERENCES
[1] M. Naor and A. Shamir, Visual cryptography, in EUROCRYPT94 Proceedings,
Lecture Notes in ComputerScience, Springer-Verlag, vol. 950, pp. 1-12, 1995.
[2] A. Ross and A. A. Othman, Visual Cryptography for Biometric Privacy, IEEE
Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 70-81, 2011.
[3] N. Askari, C. Moloney and H.M. Heys,A Novel Visual Secret Sharing SchemeWithout
Image Size Expansion,IEEE Canadian Conference on Electrical and Computer
Engineering (CCECE), Montreal, pp. 1-4, 2012.
[4] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, Extended Capabilities for Visual
Cryptography, Theoretical Computer Science, vol. 250, pp. 143-161, 2001.
[5] R. W. Floyd and L. Steinberg, An Adaptive Algorithm for Spatial Gray Scale, in
Proceedings ofthe Society for Information Display, vol.17, no. 2, pp.75-77, 1976.
[6] Z. Zhou, G.R. Arce, and G. Di Crescenzo, Halftone Visual Cryptography, IEEE
Transactions on Image Processing, vol. 15, no. 8, pp. 2441-2451, 2006.
[7] M. Nakajima and Y. Yamaguchi, Extended Visual Cryptography for Natural Images, in
Proceeedings of WSCG, pp. 303-310, 2002.
[8] C.L. Chou,A Watermarking Technique Based on Nonexpansible Visual Cryptography,
Thesis, Department of Information Management, National University, Taiwan, 2002.
[9] C.C. Wu and L.H. Chen, A Study on Visual Cryptography,Thesis, Institute of
Computer and Information Science, National Chiao Tung University, Taiwan, 1998.
30