Chapter 4
Chapter 4
System Description
34
4.2 Description of (2, 2) Visual Cryptography Technique to Share Two Secrets (VCTSTS)
participants and two secret images are to be shared using traditional VC. In this case, four
shares are required to be generated. One pair of shares for first secret image and other
pair of shares for second secret image. The other problem associated with this technique
is the identification of shares. Each participant will have two shares. One share will be
for revealing first secret image and the second share will be for revealing second secret
image. These shares are not having any identification mark which confirms which share
is used for revealing which secret image. Hence this may create difficulty in revealing the
secret images. Such problems present in traditional VC are eliminated using the proposed
technique.
The proposed technique has an ability to share two secrets using only two shares. The
proposed technique uses a (2, 2) VC technique to share two secrets [113]. In (2, 2) VC
technique, first 2 indicates the number of participants required for revealing the secret im
age while the second 2 indicates the maximum number of participants in the system. In
the proposed technique, first a traditional (2, 2) VCS is applied on one secret image and
two shares are generated. Then using the proposed algorithm, one of the share is modified
according to second secret image.
The steps that are used in this technique are as follows.
Step 1: Two binary secret images are taken.
Step 2: A traditional (2, 2) VCS is applied on one secret image and two shares are gener
ated.
Step 3: One share is chosen from the two and flipped horizontally.
Step 4: The flipped share is now modified according to every pixel in second secret image
using the proposed algorithm.
Step 5: Two shares are generated in which two secret images are encrypted.
Step 6: To reveal the first secret image, the two shares are stacked.
Step 7: To reveal the second secret image, the second share is flipped horizontally and
stacked on first share.
The detailed design of the algorithm and the proposed technique is described in the next
chapter.
traditional (2, 2) VCS is used to generate two shares. The bicubic algorithm on both the
shares to reduce their dimensions. The dimensions of shares are made equal to the dimen
sions of original secret image. This algorithm can act as post processing step for any VCS
which has a problem of pixel expansion.
The steps for the proposed technique are as follows.
Step 1: Apply a (2, 2) VCS on the binary secret image and generate two shares.
Step 2: Apply the bicubic algorithm on both the shares along the rows.
Step 3: Apply the bicubic algorithm on both the shares along the columns.
Step 4: The shares having same dimensions as that of the original secret image are gener
ated and the stacking of these two shares reveals the secret image.
system. A password image will be generate by the system and shares will be sent to email
ID’s of both persons. When these persons are together, they can share their shares to a
software on local computer which extracts the passwords.
The steps used in the authentication system are as follows.
Step 1: Generate a random password.
Step 2: Convert the password text into binary image.
Step 3: Apply the proposed (2, 2) VC technique to generate two shares.
Step 4: Send these shares on email ID’s of persons involved.
Step 5: Both persons should download the shares from their respective email ID’s and give
those as input to a software on local computer.
Step 6: The software extracts the passwords from the shares and displays it on computer
screen.