METHODS TO REDUCE PIXEL EXPANSION WITHOUT CHANGING

advertisement
METHODS TO REDUCE PIXEL EXPANSION WITHOUT
CHANGING THE IMAGE QUALITY
D.V SATISH KALADHAR REDDY1, CH.PRAVEEN KUMAR2, Mr R. KONDA REDDY 3
¹M.Tech 2ndyear, Dept. of CSE, ASCET, Gudur, India
2
M.Tech 2ndyear, Dept. of CSE, ASCET, Gudur, India
3,
1
Associate Professor, Dept. of CSE, PBR VITS, K a v a l i , In d ia
satheeshreddy562@gmail.com;2 praveenkumar539work@gmail.com;3rkondareddy75@gmail.com
Abstract: Visual cryptography scheme (VCS) is one
sharing secret images. In the proposed mechanism,
of the techniques for secret sharing and encoding
using visual cryptography scheme, the idea is to split
the image into n shares distributed to n participants.
Only a set of qualified participants recover the
secret image without any cryptographic knowledge.
Extended visual cryptography scheme (EVCS) a
type of VCS which consists of shares stacked
together based on their associations (meaningful) as
against
random
Embedded
EVCS
shares
has
in
Traditional
provided
the
VCS.
better
competitive visual quality than with the other
EVCS’s.
In Embedded EVCS, there exists two
trade-offs between the large share pixel expansion
and visual quality of shares and between the secret
pixel expansion and visual quality of the shares. We
propose a solution in Embedded EVCS with reduced
pixel
expansion
and
improved
quality
by
introducing a Step construction to construct
VCSOR and VCSXOR [5] which have optimal pixel
expansion and contrast.
A secret image into two random shares (printed on
transparencies),
where
individual
transparencies
reveal no information about the secret image other
than the size of the secret image. The secret image
can be revealed by stacking the two shares. The
logical operation used for perfect reconstruction of
secret image. Traditional VCS [1] takes a secret
image as input, and gets shares as outputs to satisfy
two conditions:
 Minimum number of shares can recover the
secret image, these shares are qualified
shares.
 Other than qualified subset of shares, no
other shares can produce or reveal the
secret image other than size of the original
image.
Compared with the shares of the VCS,
Extended VCS (EVCS) is the one which is capable of
Keywords: secret sharing, visual quality, pixel
generating meaningful shares introduced by Naor et
expansion, Step Construct, VCSOR and VCSXOR.
al [4].The EVCS takes a secret image and the
INTRODUCTION
The principle of visual cryptography scheme
(VCS) was first introduced by Naor and Shamir. VCS
is for sharing secret information that focuses on
original share images as input and generates shares
that can satisfy the criteria given below.
 Secret image can be recovered from any
subset of shares.
 Forbidden shares can’t be used to obtain
secret image.
 All the shares are meaningful images.
al [4] introduced extended VCS suitable for natural
According to the Wang et al, EVCS have
images to improve quality of output image. To
general access structure and suffer from pixel
improve the visual quality of natural images to apply
expansion problem that will enlarge the size of the
affine transformation to reduces the contrast of input
shares and decrease the contrast of recovered image.
images. In EVCS have limitations:
In embedded EVCS [4], an EVCS was
1. Computation expensive.
constructed by embedding random shares of secret
2. Void and cluster algorithms makes positions of the
image into the meaningful covering shares. The
secret pixels dependent on content of share images.
shares of EVCS are meaningful images, and stacking
3. Pair of complementary images is required.
of a qualified subset of shares will recover the secret
Generating the covering shares by using dithering
image visually.
matrices and then extended to general access
In traditional VCS, same pixel expansion is
structure. To improve the quality of image and
applied for all share images and each participant has
contrast to introduce embedded EVCS. Embedded
one share image. According to velumurugan et al [5]
EVCS has provided the better competitive visual
each participant may have multiple share images with
quality than with the other EVCS’s. In Embedded
different pixel expansions. In his paper, they focus on
EVCS, Two trades-offs between the share pixel
black and white images, white pixel is denoted by 0
expansion and visual quality of shares and between
and black pixel is denoted by 1. Using values 0’s and
the secret pixel expansion and visual quality of the
1’s the OR and XOR operation used to recover the
shares.
secret image. For each participant, average pixel
expansion (APE) of share images are calculated that
The embedding process:
each participant holds. Here they use quantum key
Input: The n covering shares constructed in the
distribution protocol which works on network
corresponding VCS (C0, C1) with pixel expansion m
security by the use of key agreement. Trusted center
and the secret image I.
provide a unique secret key and shared by each user
Output: The n embedded shares e0, e1….en-1.
and generate a key with the help of algorithms and
Step 1: Dividing the covering shares into blocks that
quantum mechanics for network security. We can
Contain t sub pixels each.
apply the concept of APE of shares in Embedded
Step 2: Choose m embedding positions in each block
EVCS and get optimal Pixel expansion and improved
in the n covering shares.
contrast image. This helped us in eliminating the
Step 3: For each black (respectively, white) pixel in I,
trade-off between the pixel expansion and the visual
randomly choose a share matrix M€C1 (respectively,
quality of the image.
M€C0).
Step 4: Embed the m sub pixels of each row of the
EXISTING SYSTEM
Extended VCS is a kind of cryptography
which encodes a number of images and stacking
meaningful images to get original image. Nakajima et
share matrix M into the m embedding positions
Chosen in Step 2.
According to Lee and Chiu et al [7]to solve the pixel
expansion problem
introduced a two-phased
encryption algorithm of (ҐQual, ҐForb), EVCS for
GASs. In the solution procedures first phase, it
generates intermediate shares of (ҐQual, ҐForb) VCS.
These intermediate shares have no appropriate
appearance and no pixel expansion. In the second
phase, cover images I1, I2 will be added in these Ishares to yield the resultant shares of (ҐQual, ҐForb).
Fig: Embedding process
Advantages:
From GAS Solver by taking secret image it encrypts
the image and forward to share synthesizer and this

Deal with gray-scale input images.
synthesizer will encrypt the images into shares. These

Applied on general access structure.
shares are embedded into the images I1, I2 by the

Not require pair of complementary input
stamper.
share images and participants needs only to
take one share.
Disadvantages:

Large pixel expansion.

Bad visual quality of recovered secret
image.
PROPOSED SCHEME
An Extended VCS is kind of VCS, which
adds a meaningful cover image in every share to
address the management problem as against random
shares in Traditional VCS. Of the limitations in
EVCS 2 of them according to Wang et al [4] are 1)
Large pixel expansion 2) Bad visual quality of shares
and recovered secret image. In proposed scheme,
each participant has multiple share images with
different pixel expansions. Then finally compute
average pixel expansion .In this paper, introduced a
step construction which have optimal pixel expansion
and contrast to construct VCSOR and VCSXOR for
each qualified set in general access structure by
applying (2,2)-VCS [5]recursively, than a participant
may receive multiple share images. To reduce
average pixel expansion (APE) our proposed scheme
applies a technique to simplify the access structure.
Fig:Solution procedures for EVCS
Advantages:
 Reduces pixel expansion.

Improves quality of recovered secret image.
PROPOSED ALGORITHMS
There are mainly two major differences in stamping
algorithm to stamp cover images on I-shares
produced in first phase. These are:
1.
The solution procedure for EVCS is mainly
rather than redesign a code book for a
two phases. In first phase, generates intermediate
particular VC scheme than no pixel
shares (i.e. I1… In) of (ҐQual, ҐForb)-EVCS. I-shares
have a meaningless appearance and no pixel
expansion.
To locate cover images on shares directly
expansion occurs.
2.
Black pixel density of the cover images
can be adjusted on demand in a finegrained fashion.
Our proposed approach has better performances
in display quality of the recovered image, which
includes contrast, perfect reconstruction of black
secret pixels, and maintenance of the same aspect
ratio as that of the original secret image. The
proposed algorithms have four advantages:
In second phase, these cover images are
 Generic approach: All existing schemes
added to the I-shares to get the resultant shares of
(ҐQual, ҐForb)-EVCS (i.e. P1…Pn).
modified
with extended VC schemes
without
redesigning codebooks.
 Modularity: Each phase in the encryption
procedure is individually designed and also
can be replaced separately.
 The first phase applicable not only to the
extended
VC
schemes
but
also
for
conventional VC schemes.
 It is very helpful for modifying the display
quality of the cover images because the
density of the cover images is adjustable.
RESULTS
In this approach estimate the performance of
EVCS optimization model by comparing with other
VC results for GASs. In below table shows
Ateniese’s and Liu’s approaches have the same pixel
expansion for recovered image. By combining Liu’s
partition results, Ateniese’s approach has smaller
pixel expansion. To apply the EVCS encryption in
our approach is still pixel-expansion-free.
Fig: contrast (%) of recovered image.
CONCLUSION
In the existing embedded EVCS system,
shares are meaningful images and recover the secret
image visually by stacking qualified subset of shares.
Embedded EVCS has higher pixel expansion and
small contrast. Our approach successfully resolves
the two trade-offs between the share pixel expansion
Compare to other two approaches, EVCS encryption
and visual quality of shares and between the secret
approach
pixel
pixel expansion and visual quality of the shares. In
expansion of recovered image which includes
the modified Embedded EVCS, step construction
contrast, perfect reconstruction of black secret pixels
generates VCSOR and VCSXOR which have optimal
and maintenance of the same aspect ratio as that of
pixel expansion and contrast for each qualified set in
secret image.
general access structure by applying (2,2)-VCS
gives
better
performance
for
recursively, apart from the underlying operation OR
or XOR, where a participant may receive multiple
share images. Also, our proposed approach, a twophase encryption algorithm for the EVCS for general
access structures, solves pixel expansion problem and
improves quality/contrast of secret image.
REFERENCES
1.
Fig: comparison of APE.
2.
3.
M.
Naor and A. Shamir, “Visual
Cryptography,” in {EUROCRYPT’94},
Berlin, 1995, vol 950, pp. 112, SpringerVerlag, LNCS.
S. Droste, “New results on visual
cryptography,” in CRYPTO’96, 1996, vol.
1109, pp. 401-415, SpringerVerlagLNCS.
D.S.Wang, F.Yi, andX.B.Li, “On general
construction
for
extended
visual
4.
5.
6.
7.
cryptography schemes,” Pattern Recognit.,
vol. 42, pp.3071–3082, 2009.
Feng Liu and Chuankun Wu, Senior
Member, IEEE, “Embedded Extended
Visual Cryptography
Schemes,” IEEE
transactions on information forensics and
security, vol. 6, no. 2, June 2011.
Velmurugan.N, Vijayaraj.A, “Visual Pixel
Expansion of Secret Image”, Global Journal
of Computer Science and Technology,
Volume 11 Issue 20 Version 1.0 December
2011.
K.g.ilavarasan, R.malavika, “A multiple
level visual cryptography scheme for
biometric privacy
without pixel
expansion” International Journal of
Communications and Engineering, Volume
04 – No.4, Issue: 01 March2012.
Kai-Hui Lee and Pei-Ling Chiu,“ An
Extended Visual Cryptography Algorithm
for General Access Structures” ieee
transactions on information forensics and
security, vol. 7, no. 1, February 2012.
AUTHORS
D.V
Sateesh
Kaladhar
Reddy received B. Tech in
Computer
Sciences
Engineering from the PBR
Visvodaya Institute of Science
& Technology affiliated to the
Jawaharlal
Nehru
technological
university
Anantapur, in 2011, and
pursing M. Tech in Software Engineering
from the Audisankara College of
Engineering and Technology engineering
affiliated to the Jawaharlal Nehru
technological university Anantapur in 2014,
respectively. He Published SIX International
Journals and He Participated TWO
International conferences and SIX National
conferences and He Participated SEVEN
National Level Paper Symposiums in
different Colleges. His interests are
Computer Networks, Mobile Computing,
Network Programming, and System
Hardware. He is a member of the IEEE.
CH.
Praveen
Kumar
received
B.Tech
in
Computer
Science
Engineering from the PBR
Visvodaya
Institute
of
Technology
&
Science
affiliated to the Jawaharlal
Nehru
technological
university Anantapur, in
2013, and pursuing M.Tech in Computer
Science Engineering from the Audisankara
College of Engineering and Technology
affiliated to the Jawaharlal Nehru
technological university Anantapur in 2015.
He Published THREE International Journal
and TWO National conferences. And
Participated THREE National Level Paper
Symposiums in different Colleges. He is a
member of the IEEE.
Mr.R.KondaReddy
has
received his MCA Degree at
Sri
Krishna
Devaraya
University Campus College
affiliated to Sri Krishna
Devaraya University in 2000
and M.Tech Degree in
Computer science
from
Allahabad
Agriculture
Institute –Deemed University
in 2006. Now He is pursuing
Ph.D. from Rayalaseema University. He is
dedicated to teaching field from the last 11
years. He has Guided 15 P.G and 40 U.G
students. His research areas Included
Computer Networks/Mantes Routing. At
present he is working as Associate Professor
in PBR Visvodaya Institute of Technology
& Science, Kavali, and Andhra Pradesh,
India.
Download