Vous êtes sur la page 1sur 30

An Extended Visual Cryptography Scheme Without Pixel Expansion

1. INTRODUCTION
Visual cryptography (VC), first proposed in 1994 by Naor and Shamir, is a secret
sharing scheme, based on black and-white or binary images. Secret images are divided into
share images which, on their own, reveal no information of the original secret. Shares may be
distributed to various parties so that only by collaborating with an appropriate number of
other parties, can the resulting combined shares reveal the secret image. Recovery of the
secret can be done by superimposing the share images and, hence, the decoding process
requires no special hardware or software and can be simply done by the human eye. Visual
cryptography is of particular interest for security applications based on biometrics. For
example, biometric information in the form of facial, fingerprint and signature images can be
kept secret by partitioning into shares, which can be distributed for safety to a number of
parties. The secret image can then recovered when all parties release their share images
which are then recombined.
Visual cryptography is a secret sharing scheme which uses images distributed as
shares such that, when the shares are superimposed, a hidden secret image is revealed. In
extended visual cryptography, the share images are constructed to contain meaningful cover
images, thereby providing opportunities for integrating visual cryptography and biometric
security techniques. In this paper, we propose a method for processing halftone images that
improves the quality of the share images and the recovered secret image in an extended visual
cryptography scheme for which the size of the share images and the recovered image is the
same as for the original halftone secret image. The resulting scheme maintains the perfect
security of the original extended visual cryptography approach.

Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

1.1 Problem Definition


The aim of the project is to derive a secure (2; 2) extended visual cryptography
scheme, which does not require more pixels in the shares and recovered image than the
original secret image. Two common drawbacks of the visual cryptography scheme (VCS) are
the large pixel expansion of each share image and the small contrast of the recovered secret
image.

1.2 Existing System


A visual cryptography scheme encodes a black & white secret image into n shadow
images called shares which are distributed to the n participants. Such shares are such that
only qualified subsets of participants can visually recover the secret image. Usually, the
reconstructed image will be darker than the background of the image itself. Two common
drawbacks of the visual cryptography scheme (VCS) are the large pixel expansion of each
share image and the small contrast of the recovered secret image.

1.3 Proposed System


In this project, we propose a method for processing halftone images that improves the
quality of the share images and the recovered secret image in an extended visual
cryptography scheme for which the size of the share images and the recovered image is the
same as for the original halftone secret image. The resulting scheme maintains the perfect
security of the original extended visual cryptography approach.

1.4 Scope and Objectives


The objective of the project is to derive a secure (2; 2) extended visual cryptography
scheme, which does not require more pixels in the shares and recovered image than the
original secret image and yet preserves a good quality image for both the shares and the
recovered image. Our proposed scheme maintains the perfect security of the basic EVC
scheme.

Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

2. SYSTEM REQUIREMENT ANALYSIS


2.1 Requirement Analysis
The process of establishing the services the system should provide and the constraints
under which it must operate is called requirement engineering. System requirements should
set out what the system should do rather than how it is done. A requirements definition is a
statement, in a natural language plus diagrams, of what services the system is expected to
provide and the constraints under which it must operate. It is generated using customersupplied information. A requirements specification is a structured document that sets out the
system services in detail.

2.2 Requirement Specification


User Commands
The user is required to provide the site address of AVG to website. Further commands
from the user will be in the form of events such as clicking the links, buttons etc. The user
must be able to get a clear idea about when and where to give necessary commands, from the
site.
User Interface
The website must be attractive and should include the latest features wherever
possible. The pages should be compatible with the most common browsers in the market.
While integrating many features of HTML into the pages, care should be taken to ensure that
the loading of pages is as fast as possible. The purpose of the site must be clear at a glance.

Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

3. FEASIBILITY STUDY
Preliminary investigations examine project feasibility, the likelihood the system
organization. The main objective of this study is to determine whether the proposed system is
feasible or not. Mainly there are three types of feasibility study to which the proposed system
is subjected as described below. Three key considerations are involved in the feasibility.

Technical Feasibility

Economic Feasibility

Behavioral Feasibility

3.1 Technical Feasibility


There are a number of technical issues, which are generally raised during the
feasibility stage of the investigation. A study of function, performance and constraints that
may affect the ability to achieve an acceptable system.
The assessment of technical feasibility must be based on an outline design of system
requirements in terms of input, output, files, programs and procedures. This can be qualified
in terms of volumes of data, trends, frequency of updating, cycles of activity etc., in order to
give an introduction of technical system. This system is proved to be technically; feasible.
The technical issue usually raised during the feasibility stage of the investigation includes the
following:

Does the necessary technology exist to do what is suggested?

Does the proposed equipment have the technical capacity to hold the data required to use
the new system?

Will the proposed system provide adequate response to inquiries?

Can the system be upgraded if developed?

Are there technical guarantees of accuracy, reliability, ease of access and data security?
Earlier no system existed to cater to the needs of Secure Infrastructure Implementation

System. The current system developed is technically feasible. It is a web based user interface
Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases
purpose is to create, establish and maintain a workflow among various entities in order to
facilitate all concerned users in their various capacities or roles. Permission to the users
would be granted based on the roles specified.

3.2 Economic Feasibility


Economic feasibility is an important task of system analysis. A system that can be
developed technically and that will be used if installed must still be profitable for the
organization. Financial benefits must equal or exceed the costs. If use this system the cost to
conduct a full systems investigation is less. The cost of hardware and software for the class of
application of authentication scheme for session password using color and images is less. A
system can be developed technically and that will be used if installed must still be a good
investment for the organization. In the economic feasibility, the development cost in creating
the system is evaluated against the ultimate benefit derived from the new systems. Financial
benefits must equal or exceed the costs.

3.3 Operational Feasibility


People are inherently resisted to change and computers have been I known to
facilitate change. Since the new proposed system is nothing to do with the ordinary customers
and worker resistance to the system is very much less. On the other hand, only the front-end
administrator has the right to login the system and proper training given to him in order to
avoid the difficulty in using the system. The proposed system helps to avoid the delay in
processing the data thereby reducing the amount of time consumed. Proposed projects are
beneficial only if they can be then turned out into information system. Some of the important
issues raised are to test the operational feasibility of a project includes the following:

Is there sufficient support for the management from the users?

Will the system be used and work properly if it is being developed and implemented?

Will there be any resistance from the user that will undermine the possible application
benefits?

Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

4. SYSTEM DESIGN
Design is the first in the development phase for any engineered product or system.
System design is a process of evaluating alternate solution, evaluating the choice following
up the specification for the chosen alternative. System design work follows logically system
analysis. The objective of the system design is to improve the existing system or design a
new system as the case may be and implement the system with improved facilities.

4.1 Project Modules


The modules in this project can be classified into three:

Sender.

EVC method.

Receiver.

4.1.1 Sender
Getting Authorization is the first stage in sending phase. If a user wants to send a text
to Destination user, he wants unique Identification. By using that Identification System
knows that the person is an authorized person. This phase or Sender Module has Sub
Modules. They are as:

Registration

Login

Send Data

Registration is the Initial state for getting Authentication. By Providing username and
Password user sets their Authentication. By using username and Password system will
identify the Authorized person. These credentials are provided to user for the login purpose.
These values are stored in the Database. The Database access will be through the registration
form in the project. A user wants to send an image, he/she must log in by using his/her
authentication credentials. If the user does not provide proper information or the given
information is mismatched with database then our system shows Exception message
immediately. If the users details are verified and matched with the existing database then our
system allows the person to transmit the image.
Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

4.1.2 EVC
An extended VC scheme adds a meaningful cover image in each share. Although
image expansion is necessary to exactly preserve the information from the pixels of the
original secret image in the recovered secret image, we can use either the basic preprocessing scheme, SBR, or the more advanced BBR method to ensure that the share and
recovered images use the same number of pixels as the original halftone secret image. Of
course, the trade-off in such an approach is a decline in image quality.
In this section, we examine the application of the preprocessing schemes to construct
a (2; 2) EVC scheme without image size expansion. In doing so, we take three halftone
images as inputs. The first two images are considered to be meaningful cover images and the
third image is the secret image. One of the block replacement algorithms converts the three
input images into the processed images. A processed image contains white and black blocks
and can be used as an input secret image in any visual cryptography encoding process. After
producing the three processed images by the appropriate method, the two shares are
generated according to the EVC encoding process. The secret image is recovered by stacking
the two shares together. It should be noted that our non-expansion EVC scheme is as secure,
as the new scheme does not change the share generation approach.
4.1.3 Receiver
Getting Authorization is the first stage in receive phase. If a user wants to receive a
text from source user, he wants unique Identification. By using that Identification System
knows that the person is an authorized person. Verifying the credentials provided, it will
allow the user to receive the data. The data given are stored in the database. Similarly there
will be secret key generation. In the receiver there will be decryption module. This phase or
Receiver Module has Sub Modules. They are as:

Registration

Login

Receive Data

Registration is the Initial state for getting Authentication. By Providing username and
Password user sets their Authentication. System provides one more credentials that is Secret
key which is generated by the system for each user. By using username and Password will
identify the Authorized person. These values are stored in the Database. A user wants to send
Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

an image, he/she must log in by using his/her authentication credentials. .If the user does not
provide proper information or the given information is mismatched with database then our
system shows Exception message immediately.
The main aim of this module is to decrypt an image. Decryption will happen only if
the system gets a cover image from sender.

4.2 ER Diagram
E-R Diagrams means Entity Relationship model, which is a popular high level
conceptual data model. The diagrammatic notation associated with the E-R model, known as
ER diagram. In ER diagram the emphasis is on representing the schemas rather than the
instances. Three main components of an ER are the entities, which are objects or concepts
that can have data stored about them, the relationship between those entities, and
the cardinality, which defines that relationship in terms of numbers.
4.2.1 Some Notations Used in ER diagrams
Entity

Weak Entity

Relationship

Attribute

Key Attribute

Fig 4.1: ER Diagram


Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

4.3 Data Flow Diagram


The data flow diagram (DFD) is one of the most important tools used by the system
analysts. Data flow diagrams are made up of number of symbols, which represent system
components. Most data flow modeling methods use four kinds of symbols. These symbols are
used to represent four kinds of system components. Processes, data store, data flows, external
entities. Circles in DFD represent processes.

4.3.1 Basic DFD Symbol


There are various symbols used in a DFD are namely
1. ARROWS
A data flow is a route, which enables packets of data to travel from one point to another.
An arrow identifies data flow-data in motion. It is a pipeline through which information
flows.
2. PROCESS

A process represents transformation where incoming data flows are changed into
outgoing data flows. A circle or a bubble represents a process that transforms incoming
data flows into outgoing data flows.
3. DATA STORE

A data store represent a repository of data that is to be stored for use by one or more
processes and may be simple as buffer or queue or sophisticated as a relational database.
They should have clear names.

Department of MCA, CKC

An Extended Visual Cryptography Scheme Without Pixel Expansion

4. A SOURCE OR SINK

A source or sink is a person or part of an organization, which enters or receives


information from the system but is considered to be outside the context of dataflow model.
The DFD methodology is quite effective; especially when required design is unclear and
useranalystneedsnotational language for communication. The DFD is easy to understand after
an orientation. Several rules of thumb are used during drawing DFDs:

Process should be named and numbered for easy reference.

The direction of flow is from top to bottom and from left to right.

When a process is exploded into lower-level details, they are numbered.

The names of data stores, sources, and destinations are written in capital letters

Secret
image

Secret
image

Sender

EVC

Receiver

Fig4.2: Context level DFD

Department of MCA, CKC

10

An Extended Visual Cryptography Scheme Without Pixel Expansion

LEVEL 1

Fig 4.3: Data Flow Diagram of Sender

Fig 4.3: Data Flow Diagram of Receiver


Department of MCA, CKC

11

An Extended Visual Cryptography Scheme Without Pixel Expansion

LEVEL 2

Fig 4.4: Data Flow Diagram of EVC

4.5 User Interface Design


4.5.1 Input design
Input design is the process of converting user-designated input to a computerized
format. Input data are collected and organized in to group of similar data. Data are entered
through the keyboard and also the user can use mouse for selecting the options. Error entered
Department of MCA, CKC

12

An Extended Visual Cryptography Scheme Without Pixel Expansion

by the user can be controlled by the input design. The goal of designing the input data is to
make data entry easy, logical and free from errors as possible. The input design is the link
that ties the information system into the world of its users. Some aspects of the design vary,
depending on whether the system is batch oriented or online. But regardless of the system,
there are general input concerns that all analysts should have. Input design consists of
developing specifications and procedures for the data preparation, those steps necessary to
put transaction data into a usable form for process, and data entry, the activity of putting data
into the computer for processing .As obviously data entry can be achieved by instructing the
computer to read data from a written or printed document, or it can occur by having people
key data directly into the system.
4.5.2 Output design
Outputs are the most important and direct source of information to the user and to the
department. Intelligent output design will improve the systems relationship with the user and
help much in decision-making. Outputs are also used to provide a permanent hard copy of the
results for later uses. The forms used in the system are shown in the appendix. Computer out
output is the most important and direct source of information the user. Efficient, intelligible
output design should improve the systems relationship with the user and help in decision
making.

4.6 Database Design


A database is an organized mechanism that has the capability of storing information
through which a user can retrieve stored information in an effective and efficient manner. The
data is the purpose of any database and must be protected.

Table Name: Login


Primary Key: ID
Field Name

Data Type

Length

Constraints

Description

LOGID

int

11

NOT NULL

PRIMARY KEY

UNAME

varchar

100

PSWD

varchar

100
Table 4.6: Login Table

Department of MCA, CKC

13

An Extended Visual Cryptography Scheme Without Pixel Expansion

Table Name: Registration


Primary Key: ID
Foreign Key: LOGID
Field Name

Data Type

Length

Constraints

Description

int

11

NOT NULL

PRIMARY KEY

FNAME

varchar

100

FNAM

varchar

100

SEX

varchar

10

PHONE

varchar

100

EMAIL

varchar

100

LOGINID

varchar

100

NOT NULL

FOREIGN KEY

RID

Table 4.7: Registration Table

4.7 Software and Hardware Requirement


4.7.1 Software Requirement

Front end

Java

Back end

MySQL

Operating System

Windows/Linux

IDE

Eclipse

4.7.2 Hardware Requirement


Processor

Pentium IV

System Bus

32 BIT

RAM

512 MB

HDD

40 GB

Department of MCA, CKC

14

An Extended Visual Cryptography Scheme Without Pixel Expansion

5. ALGORITHM OR PSEUDOCODE
Algorithm 5.1: Converting color image into processed Black n white image
Input : Color image
Output : Processed Black n white image
Step

1. Choose color image

Step

2. Convert color image into black n white image

Step

3. Find the width and height of the image

Step

4. Create pixel array

Step

5. Partitioning halftone image into non overlapping block of 2X2 pixel

Step

6. Count number of white and black pixel in each block

Step

7. From the top left corner process each block


Step 7.1. If number of black pixel is greater than 3
Step 7.2. then Convert block to black block
Step 7.3. If number of black pixel is less than 2
Step 7.4. then Convert block to white block
Step 7.5 If number of black pixel is equal to 2
Step 7.6 then Block not changed

Step

8. Create overlapping cluster and each cluster have 4 block

Step

9. Scan from top to bottom

Step

10. Count the number of black pixel in each Cluster


Step

10.1. If cluster count is greater than 8

Step

10.2 Scan each block in the cluster

Step

10.3 if block count is equal to 2

Step

10.4 then convert block to white block

Step

10.5 If cluster count is less than 8

Step

10.6 Scan each block in the cluster

Step

10.7 If block size is equal to 2

Step

16. Processed pixel array convert into image

Step

17. Send this to next step

Department of MCA, CKC

15

An Extended Visual Cryptography Scheme Without Pixel Expansion

6. SYSTEM TESTING
Software testing is the crucial element of the software quality assurance and
represents the ultimate review of specification, design and coding. Testing represents an
interesting anomaly for the software. During earlier definitions and development phases, it
was attempted to build software from an abstract concept to tangible information. The testing
phase is a very important phase since it is in this phase; we make sure that the system will
perform the task without any error. This checking resulted in achieving error free programs.
Testing methodologies:

Unit testing

Integration testing

Output testing

Validation testing

Unit Testing
Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as "Module Testing". The modules are tested separately. This
testing is carried out during programming stage itself in this testing step each module is found
to be working satisfactorily as regard to the expected output from the module.
Integration Testing
Integration testing is a systematic technique for constructing tests to uncover errors
associated with the interface. In this project, all the modules combined, and then entire
program is tested as a whole. Thus in the integration testing step, all the errors uncovered are
corrected for the next testing steps.
Output Testing
After performing the validation testing, the next step is output testing of the proposed
system since no system could be useful if it does not produce the required output in the
Department of MCA, CKC

16

An Extended Visual Cryptography Scheme Without Pixel Expansion

specified format. The output generated or displayed by the system under consideration is
testing asking the users about the format required by them. Here, the output is considered into
two ways: one is on the screen and the other is printed format.
Validation Testing
Validation testing is where requirements established as a part of software requirement
analysis is validated against the software that has been constructed. This test provides the
final assurance that the software meets all functional, behavioral and performance
requirements. The errors, which are uncovered during integration testing, are corrected during
this phase

Department of MCA, CKC

17

An Extended Visual Cryptography Scheme Without Pixel Expansion

7. SCREEN SHOTS
7.1 Login

Fig 7.1: Login

7.2 Registration

Fig 7.2: Registration


Department of MCA, CKC

18

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.3 Browse Image

Fig 7.3: Browse Image

7.4 Browsed Image

Fig 7.4: Browsed image

Department of MCA, CKC

19

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.5 Browse Image

Fig 7.5: Browse Image

7.6 Browsed Image

Fig 7.6: Browsed image

Department of MCA, CKC

20

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.7 Key Image

Fig 7.7: Key Image

7.9 Encrypted Image

Fig 7.9: Encrypted image

Department of MCA, CKC

21

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.10 Stamping Key Image

Fig 7.10: Stamping Key Image

7.11 Stamping Encrypted Image

Fig 7.11: Stamping Encrypted image

Department of MCA, CKC

22

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.12 Send Key Image

Fig 7.12: Send Key Image

7.13 Send Encrypted Image

Fig 7.13: Send Encrypted image

Department of MCA, CKC

23

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.14 Browse Image1


.

Fig 7.14: Browse Image1

7.15 Decode Image1

Fig 7.15: Decode image1


Department of MCA, CKC

24

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.16 Browse Image2

Fig 7.16:Browse Image2

7.17 Decode Image2

Fig 7.17: Decode image2


Department of MCA, CKC

25

An Extended Visual Cryptography Scheme Without Pixel Expansion

7.18 Result image

Fig 7.18: Result Image

Department of MCA, CKC

26

An Extended Visual Cryptography Scheme Without Pixel Expansion

8. RESULT
An extended VC scheme adds a meaningful cover image in each share. Although
image expansion is necessary to exactly preserve the information from the pixels of the
original secret image in the recovered secret image, we can use either the basic preprocessing scheme, SBR, or the more advanced BBR method to ensure that the share and
recovered images use the same number of pixels as the original halftone secret image.
An extended visual cryptography scheme, which does not require more pixels in the
shares and recovered image than the original secret image and yet preserves a good quality
image for both the shares and the recovered image. Our scheme maintains the perfect security
of the basic EVC scheme.

Department of MCA, CKC

27

An Extended Visual Cryptography Scheme Without Pixel Expansion

9. CONCLUSION
In this project, we have explored extended visual cryptography without expansion.
We have shown that using an intelligent pre-processing of halftone images based on the
characteristics of the original secret image, we are able to produce good quality images in the
shares and the recovered image. Note that other applications can also benefit from the preprocessing approach, such as multiple image visual cryptography, which hides multiple
images in shares.

Department of MCA, CKC

28

An Extended Visual Cryptography Scheme Without Pixel Expansion

10. FUTURE ENHANCEMENT

Visual Cryptography provides a secure way to Transfer Images.

It exploits human eyes to decrypt secret images with no computation required.

It uses XOR operation so, computation is easy.

We can generate infinite number of shares dynamically.

Proposed Method performs accurately Stacking mechanism without Regeneration and


Redistribution of Shares.

Department of MCA, CKC

29

An Extended Visual Cryptography Scheme Without Pixel Expansion

REFERENCES
[1] M. Naor and A. Shamir, Visual cryptography, in EUROCRYPT94 Proceedings,
Lecture Notes in ComputerScience, Springer-Verlag, vol. 950, pp. 1-12, 1995.
[2] A. Ross and A. A. Othman, Visual Cryptography for Biometric Privacy, IEEE
Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 70-81, 2011.
[3] N. Askari, C. Moloney and H.M. Heys,A Novel Visual Secret Sharing SchemeWithout
Image Size Expansion,IEEE Canadian Conference on Electrical and Computer
Engineering (CCECE), Montreal, pp. 1-4, 2012.
[4] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, Extended Capabilities for Visual
Cryptography, Theoretical Computer Science, vol. 250, pp. 143-161, 2001.
[5] R. W. Floyd and L. Steinberg, An Adaptive Algorithm for Spatial Gray Scale, in
Proceedings ofthe Society for Information Display, vol.17, no. 2, pp.75-77, 1976.
[6] Z. Zhou, G.R. Arce, and G. Di Crescenzo, Halftone Visual Cryptography, IEEE
Transactions on Image Processing, vol. 15, no. 8, pp. 2441-2451, 2006.
[7] M. Nakajima and Y. Yamaguchi, Extended Visual Cryptography for Natural Images, in
Proceeedings of WSCG, pp. 303-310, 2002.
[8] C.L. Chou,A Watermarking Technique Based on Nonexpansible Visual Cryptography,
Thesis, Department of Information Management, National University, Taiwan, 2002.
[9] C.C. Wu and L.H. Chen, A Study on Visual Cryptography,Thesis, Institute of
Computer and Information Science, National Chiao Tung University, Taiwan, 1998.

Department of MCA, CKC

30

Vous aimerez peut-être aussi