S represents the secret image and R the recovered image.
w, h represents the width/height of the photographs and
represents the exclusive OR operator. We repeated the
test over multiple images, the NC for all the recovered
images was 1.000. A comparison of RKO scheme with
similar other schemes is listed in Table 1.
Table 1. Comparison of Visual Cryptography Techniques
SCHEMES
FEATURES Kuri,
Sarode
RKO
TECHNIQ
UE[15]
Tsai,
Chen
et.al.
[12]
Lukac,
and
Platani
otis [13]
Chang
and Yus
scheme
[14]
Noise
Correlation
Always
1.000
Alway
s
<
1.000
1.000
Always
< 1.000
Image
delivery
Transparenc
y
No Yes No Yes
Additional
Data
Structure
No
Yes
AX,
BX
No
Yes
S-E table
(Local)
Key
Management
No
Yes
S, BX
have to
be kept
secret
No No
Pixel
Expansion
(256 color,
(n, n)
scheme)
No
expansion
1 : 9
expans
ion
1: 2
(n-1)
1 : 529
7. Conclusions
Alone steganography is good method to hide text in
images but when steganography and Visual Cryptography
are combined together, it is almost impossible for
attackers to uncover hidden or encrypted data. The RKO
technique used for Visual Cryptography has perfect
reconstruction property, the revealed data and the cover
image are exact replica of the original. This technique can
be used by forensic and security investigators to
hide/detect suspicious data. This technique requires less
storage as there is no need to store the encryption keys
and also requires less amount of computation time as
there is no much complex processing. Use of Visual
Cryptography makes it impossible for the attacker to even
guess that the transmitted shares would contain some
hidden data. And even if he somehow gets hold of any
one share, its absolutely impossible to extract data from a
single share. So we can conclude that when
steganography and Visual Cryptography are combined
IJCAT International Journal of Computing and Technology, Volume 1, Issue 4, May 2014
ISSN : 2348 - 6090
www.IJCAT.org
36
together, it is almost impossible for attackers to uncover
hidden or encrypted data. And since the RKO technique
used, has perfect reconstruction property the recovered
image and text are exact replicas of the original.
Acknowledgments
Ms. Moushmee Kuri thanks the guide and TSEC for
giving the support and opportunity to carry out the
research work in the Visual Cryptography and come up
with a new technique called RKO technique and take it to
one more level by combining it with Steganography.
References
[1] M. Naor and A. Shamir, Visual cryptography, in
Proc. EUROCRYPT 94, Berlin, Germany, 1995, vol.
950, pp. 112, Springer-Verlag, LNCS
[2] F. Liu1, C.K. Wu X.J. Lin , Colour Visual
Cryptography Schemes, IET Information Security, vol.
2, No. 4, pp 151-165, 2008.
[3] Y. C. Hou, Visual cryptography for color images,
Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
[4] Siddharth Malik, Anjali Sardana, Jaya A Keyless
Approach to Image Encryption, 2012 International
Conference on Communication Systems and Network
Technologies
[5] L. W. Hawkes, A. Yasinsac and C. Cline, "An
Application of Visual Cryptography to Financial
Documents," Technical report TR001001,Florida State
University, 2000.
[6] George Abboud, Jeffrey Marean, Roman V.
Yampolskiy, Steganography and Visual Cryptography
in Computer Forensics, in 2010 Fifth International
Workshop on Systematic Approaches to Digital
Forensic Engineering
[7] A. Shamir, How to share a secret, Commun. ACM,
vol. 22, no. 11, pp. 612613, 1979.
[8] H.-C. Wu, C.-C. Chang, Sharing Visual Multi-Secrets
Using Circle Shares, Comput. Stand. Interfaces 134
(28) ,pp. 123135, (2005).
[9] Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei,
Multiple-Image Encryption By Rotating Random
Grids, Eighth International Conference on Intelligent
Systems Design and Applications, pp. 252-256 , 2008.
[10] Du-Shiau Tsai , Gwoboa Horng , Tzung-Her Chen ,
Yao-Te Huang , A Novel Secret Image Sharing
Scheme For True-Color Images With Size Constraint,
Information Sciences 179 32473254 Elsevier, 2009.
[11] R. Lukac, K.N. Plataniotis Bit-level based secret
sharing for image encryption, The Journal of Pattern
Recognition Society, 2005.
[12] C.C. Chang, T.-X. Yu, Sharing a secret gray image in
multiple images, in: Proceedings of First International
Symposium on Cyber orlds, 2002, pp.230240.
[13] O. Kurtuldu and N. Arica, "A new steganography
method using image layers," in Computer and
Information Sciences, 2008. ISCIS '08. 23rd
International Symposium on, 2008, pp. 1-4.
[14] J. Mielikainen, "LSB matching revisited," Signal
Processing Letters, IEEE, vol. 13, pp. 285-287, 2006.
[15] Ms. Moushmee Kuri, Dr. Tanuja Sarode, RKO
Technique for Color Visual Cryptography, in : IOSR
Journal of Computer Engineering (IOSR-JCE) e-ISSN:
2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2,
Ver. X (Mar-Apr. 2014), PP 89-93
Ms. Moushmee Kuri has received B.E.(Computer Engg)
dfrom Goa University in 1998, pursuing M. E. Compter Engg
from Thadomal Shahani College of Engineering, Bandra,
Mumbai, Working as Assistant Professor in Computer Dept. at
Watumull Institute of Electronics Engg and Computer
Technology., Worli Mumbai. She has more than 10 years of
experience in teaching. Has published two papers in the field of
Visual Cryptography. Her areas of interest are system Security,
system programming and Image Processing.
Dr. Tanuja Sarode has Received Bsc.(Mathematics) from
Mumbai University in 1996, Bsc.Tech.(Computer Technology)
from Mumbai University in 1999, M.E. (Computer Engineering)
from Mumbai University in 2004, Ph.D. from Mukesh Patel
School of Technology, Management and Engineering, SVKMs
NMIMS University, papers in National /International Vile-Parle
(W), Mumbai, INDIA. She has more than 14 years of experience
in teaching. Currently working as Associate Professor in Dept. of
Computer Engineering at Thadomal Shahani Engineering
College, Mumbai. She is life member of IETE, member of
International Association of Engineers (IAENG) and International
Association of Computer Science and Information Technology
(IACSIT), Singapore. Her areas of interest are Image
Processing, Signal Processing and Computer Graphics. She has
55 Conferences/journal to her credit.