0% found this document useful (0 votes)
110 views

Visual Cryptography

Visual cryptography allows encrypting a secret image into shares such that overlaying the shares reveals the secret image visually without any computation. It works by encoding the pixels of the secret image into sub-pixels of the shares randomly. Two types of cheaters can exist: malicious participants who generate fake shares, and malicious outsiders who intercept shares. Cheating prevention algorithms verify shares and introduce variation between shares to avoid attacks. Advantages of visual cryptography include simple implementation, providing security without requiring cryptography knowledge, and resistance to brute force attacks.

Uploaded by

saiprathapguduri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Visual Cryptography

Visual cryptography allows encrypting a secret image into shares such that overlaying the shares reveals the secret image visually without any computation. It works by encoding the pixels of the secret image into sub-pixels of the shares randomly. Two types of cheaters can exist: malicious participants who generate fake shares, and malicious outsiders who intercept shares. Cheating prevention algorithms verify shares and introduce variation between shares to avoid attacks. Advantages of visual cryptography include simple implementation, providing security without requiring cryptography knowledge, and resistance to brute force attacks.

Uploaded by

saiprathapguduri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 18

JNTU COLLEGE OF ENGINEERING

Nachupally(Kondagattu), Jagtial, Karimnagar dist.

Topic : Visual Cryptography


Seminar by: B.JALANDHAR (07JJ1A1207)

Contents:
Introduction

How

Visual Cryptography works Security issues Types of cheaters in Visual Cryptography Cheating prevention Algorithm Advantages of Visual Cryptography Conclusion

Introduction:
Cryptography:

Plain Text Plain Text

Encryption Decryption

Cipher Text Channel

Visual Cryptography:
Plaintext (in form of image) Encryption (creating shares) Channel (Fax, Email) Decryption (Human Visual System)

Example:

Secret Image Share1

Share2

Visual Cryptography

Visual Cryptography is a secret-sharing method that encrypts a secret image into several shares but requires neither computer nor calculations to decrypt the secret image. Instead, the secret image is reconstructed visually: simply by overlaying the encrypted shares the secret image becomes clearly visible

How visual cryptography works:

we can now create the two layers. one transparent image, layer 1, has pixels which all have a random state, one of the possible states. layer 2 is identical to layer 1, these pixels have a state that is opposite to the layer1 if both images are overlayed, the areas with identical states will look gray, and the areas with opposite states will be black.

Encoding of Pixels:

Computer Representation of pixels

Visual Cryptography scheme represented in computer using matrices

Original Pixel

share1
share2 s1= s0=

overlaid Image

security issues:
vc is used for secure communications. the sender will distribute one or more random layer 1 in advance to the receiver. if the sender has a msg, he creates a layers 2 for a particular distributed layer 1 and sends it to the receiver. the receiver aligns the two layers & secret information is revealed. if one of both layer is intercepted its impossible to retrieve the encrypted information.

There are two types of cheaters in vc:


Malicious participant(MP) 2. Malicious outsider(MO) A cheating process against a VCS consists of following two phases: 1.Fake share construction phase: the cheater generates the fake shares. 2.image reconstruction phase: the fake image appears on the stacking of genuine shares and fake shares.
1.

Some of common ways how MO and MP cheats vc are:

1) 2)

Cheating a VC by an MP Cheating a VC by an MO

1. Cheating a VC by an MP:
The

fig:

process of cheating is shown in below

2. Cheating a VC by an MO:
The

fig:

process of cheating is shown in below

Cheating prevention Algorithm:


The cheating prevention method has following features: The increase to pixel expansion should be as small as possible. Each participant verifies the shares of other participants. This is somewhat necessary because each participant is a potential cheater. The verification image of each participant is different and confidential. It spreads over the whole region of the share. We have shown that this is necessary for avoiding the described attacks.

The contrast of the secret image in the stacking of shares is not reduced significantly in order to keep the quality of VC. A cheat-preventing method should be applicable to any VCS.

Advantages of Visual Cryptography


Simple to implement It provides more security. If an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n-1 shares revealed no information about the original image. Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message. We can send cipher text through FAX or E-MAIL Infinite Computation Power cant predict the message.

Conclusion:
In order to hide the secrecy we go for expansion and increasing of the number of shares, but this affects the resolution. Therefore an optimum number of shares are required to hide the secrecy. At the same time security is also an important issue. Hence research in VC is towards maintaining the contrast at the same time maintaining the security.

You might also like