Nilmani Verma
MATS school of Engg & Tech. Raipur
Abstract
The safekeeping of digital information in modern
times is a vital issue. The Visual Cryptography (VC)
Arrangement is a protected process that encrypts a
secret image or document. The VC Scheme is a secure
method that encrypts a secret document by breaking it
into shares.A unique property of VC Structure is that
one can visually decode the secret image by
overlaying shares without computation.This paper
presents an approach for encrypting VC produced
image shares. In which password is associated with
input image then input image is transformed into
equivalent eight bit binary number and bit rotation
applied.F box of Blowfish 64-bit block cipherused for
providing the double security of secret document.
Blowfish is a fast algorithm and can encrypt data on
32-bit microprocessors at a rate of one byte every 26
clock cycles. This organisation provides more secure
secret shares that are robust against a number of
attacks & the system provides a durable security for
the digital information over the public network.
2. Literature Survey
Keywords: VC, VC shares, F Box, Blowfish Algorithm,
Cipher
1. Introduction
One of the best known techniques to protect data is
cryptography. It is the art of sending and receiving
encrypted messages that can be decrypted only by the
sender or the receiver. Encryption and decryption are
accomplished by using mathematical algorithms in
such a way that no one but the intended recipient can
decrypt and read the message. VCS is a cryptographic
technique that allows for the encryption of visual
information such that decryption can be performed
using the human visual system. The original method of
VC was proposed by Naor and Shamir [12] for binary
images. This provides a perfectly secure system where
secret messages are contained in shares Its idea is to
split a black-and- white secret image into a collection
of shares (printed on transparencies) which separately
reveal no information about the original secret image
other than the size of it. Individually these shares
resemble random noise, but when they are stacked and
aligned perfectly, their message is decrypted using
only the human visual system. While this method gives
security for text and binary images, the growth of
digital media requires the expansion of this technique
to provide security for gray and color images. Unlike
www.ijsret.org
140
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 1, April 2014
feedback mechanism is used on the file to create the
next level of encryption,Finally in fourth stage, the
whole image file is randomized multiple number of
times using modified MSA randomization encryption
technique and the randomization is dependent on
another number, which is generated from the password
provided for encryption method.
Kulvinder Kaur, Vineeta Khemchandani [18] presents
an approach for encrypting visual cryptographically
generated image shares using Public Key Encryption.
RSA algorithm is used for providing the double
security of secret document. Thus secret share are not
available in their actual form for any alteration by the
adversaries who try to create fake shares.
Pallavi V.Chavan Says [3] Hierarchical visual
cryptography encrypts the secret in number of levels.
Initially the secret is divided into exactly two share
called share 1 and share 2. Each share is then
encrypted independently resulting in four shares: share
11, share 12, share 21 and share 22. Later, among these
four shares, any three shares are chosen to generate the
key share. The superimposition of key share with the
remaining share reveals the secret information. The
superimposition is logically performed by the X-OR
operation. As the level of encryption in hierarchical
visual cryptography increases, the secrecy tends to
increase.
4. Proposed Methodology
The proposed scheme generates the VC shares using
basic Visual Cryptography model and then encrypt
both shares using F Box Blow Fish algorithm. So that
the secret shares will be more secure and shares are
protected from the malicious adversaries.
3. Problem Identification
Existing schemes generates the VC shares using basic
Visual Cryptography model. Then encryption of both
shares has been done using RSA algorithm of Public
Key Cryptography.So that the secret shares became
more secure and shares are protected from the
malevolent. During the decryption phase, secret shares
are extracted by RSA decryption algorithm & stacked
to reveal the secret image.
Fig-2: Block Diagram of Proposed Methodology
4.1 Generating shares of secret image
It consists of generation of shares from secret image
using VC (2, 2) scheme. The secret image is first
converted into a binary image then each pixel in the
secret image is broken into 8 sub pixels, 4 pixels in
each share by selecting the random pixel encoding
scheme out of three given in Fig.3.
141
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 1, April 2014
Algorithm
Procedure NVC()
Step-1 Input RGB Image (Secret).
Step-2 RGB Image Converted into Grayscale Image.
Step-3 IM Image-conversion (Gray Image)
Step-4 New-Image Bit -Rotation (IM).
Step-5 Share-generation (New-Image).
Step-6 Encryption Using F box of Blowfish
Algorithm.
Step-7 Decode Secret
Step-8 Reverse Bit Rotation
Step-9 Original image as output in Grayscale.
End
4.2Blowfish Algorithm
Blowfish is a symmetric-key block cipher. Blowfish
has a 64-bit block size and a variable key length from
32 bits up to 448 bits. Key expansion consists of
generating the initial contents of one array (the P
array), namely, eighteen 32-bit sub-keys, and four
arrays (the S-boxes), each of size 256 by 32 bits, from
a key of at most 448 bits (56 bytes).
5. Experimental Results
Proposed arrangement has been executed in MATLAB
version 7.5.0.342 (R2007b). To run this scheme
minimum hardware configuration is required with no
extra specifications. The experiments have been run in
Windows 7. Following output shows the Original RGB
image is converted into Grey Binary Image.
www.ijsret.org
142
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 1, April 2014
(I)
Input Image
Proposed algorithm, which Entropy value is higher is the best, here blow fish algorithms entropy value is higher than
RSA. Entropy value calculated by using cipher text image (encrypted image).
6. Conclusion
References
www.ijsret.org
143
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3 Issue 1, April 2014
[4]W. Tzeng and C. Hu. A new approach for visual
cryptography. Designs, Codes and Cryptography,
27(3):207227, 2002.
[5]. A. Bonnis and A. Santis, Randomness in secret
sharing and visual cryptography schemes, Theory.
Computer. Science, 314, pp 351- 374 (2004).
[6] Young-Chang Hou. Visual cryptography for color
images. Pattern Recognition, 36:1619{1629, August
2002.
[7] Z. Zhou, G. R Arce, and G. Di Crescenzo,
Halftone Visual Cryptography, in Proc. of IEEE
International Conference on Image Processing,
Barcelona, Spain,Sept 2003, vol. 1, pp. 52152.
[8] E. Verheuland H. V. Tilborg, Constructions And
Properties Of K Out Of N Visual Secret Sharing
Schemes.Designs, Codes and Cryptography, 11(2),
pp.179196, 1997.
[9] F. Liu, C.K. Wu, X.J. Lin, Colour Visual
Cryptography Schemes, IET Information Security,
vol. 2,No. 4, pp 151-165, 2008.
[10] Chang-Chou Lin andWen-Hsiang Tsai. Visual
cryptography for gray-level images by dithering
techniques. Pattern Recognition Letters, 24:349{358,
2003.
[11] Eric R. Verheul, Henk C. A. van Tilborg:
Constructions and Properties of k out of n Visual
Secret Sharing Schemes. Des. Codes Cryptography
11(2): 179-196 (1997)
[12] Moni Naor and Adi Shamir. Visual cryptography.
EUROCRYPT, pages 1{12, 1994.
[13] Nakajima, M. and Yamaguchi, Y., Extended
visual cryptography for natural images Journal of
WSCG. v10 i2. 303-310.
[14] Luiz Velho and Jonas de Miranda Gomes. Digital
half toning with space filling curves. Computer
Graphics, 25(4):81{90, July 1991.
[15] C.N. Yang e C.S. Laih, "New colored visual
secret sharing schemes", DES CODES C, 20(3), 2000,
pp. 325-336
[16] Noohul Basheer Zain Ali,James M Noras,
Optimal Datapath Design For A Cryptographic
Processor: The Blowfish AlgorithmIn Malaysian
Journal Of Computer Science, Vol. 14 No. 1, June
2001, Pp. 16-27
[17] Dey, S. , "An Image Encryption Method: SDAdvanced Image Encryption Standard: SD-AIES",
International Journal of Cyber-Security and Digital
Forensics (IJCSDF) 1(2), pp. 82-88.
[18] Kulvinder Kaur, Vineeta Khemchandani
Securing Visual Cryptographic Shares using Public
Key Encryptionin Institute of Electrical and
Electronics Engineers (IEEE),2012,PP.1108-1113.
www.ijsret.org
144