International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 EXTENDING THE VISUAL CRYPTOGRAPHY ALGORITHM TO PROVIDE SECURITY USING PIXEL SIEVE METHOD Karuna Putta 1 , Dilip kumar Kotthapalli 2 1 M.Tech student, Department of Computer Science and Engineering, Anna University, Chennai – 600 113 , T. N., INDIA 2 M.Tech student, Department of Electronics and Communication Engineering, Sree Vidyanikethan Engineering College, TIRUPATI – 517 102, A. P., INDIA Abstract: Visual cryptography is a simple and powerful method which can provide high security for confidential information. This technique generates noise-like random pixels on share images to hide secret information. In this paper a modified version of pixel sieve method is proposed to achieve more security than existing method. Based on key shifting scheme, the proposed method generates quite noisy and highly secure encrypted images. The simulation shows that the quality of the encrypted images observably better than existing method. Keywords - Extended visual cryptography (EVC), pixel expansion, pixel sieve method. I. INTRODUCTION We need very efficient security systems for preventing confidential information from being accessed by unauthorized persons. As computing power becoming more and more faster our older cryptographic systems becoming less secure because an attacker can attempt large number of random attack attempts in shorter time. Visual cryptography [1][2] is a simple and powerful method which can provide high security for confidential information. Concept of visual cryptography is introduced by Moni Naor and Adi Shamir in 1994. The idea is to split a message into n different pieces such that the original message is visible if any k (or more) of them are used together, but totally invisible if fewer than k pieces are used for getting the message. In this method each message is considered as an image of black and white pixels. This image is divided into n slides called transparency. Each pixel of the message appears in each transparency in a different modified version. For getting the original information from transparencies, all of them are stacked together with proper alignment. The simplest example of visual cryptography is a scheme in which we split the image into two different shares. ISSN: 2231-5381 The decryption of the image will be done by overlapping the shares. When we place both the shares one over another with proper alignment, we can interpret the original image. Here occurs some management problems which not only affects the practicability of storage/transmission requirements for shares but also decreases the contrast of the recovered secret images. To the best of our knowledge, the existing Extended Visual Cryptography Schemes (EVCS) algorithms for GASs cannot avoid the pixel expansion problem. Therefore, we are motivated to find a solution to this problem. The encryption process can be divided into two phases. The first phase of the algorithm, which uses optimization techniques for a given access structure, constructs a set of noise-like shares that are pixelexpansion free. The second phase of the algorithm directly adds a cover image on each share via a stamping algorithm. This solves the pixel expansion problem VC implies a way to properly register the SI’s which is always arduous when performed by hand, once the two SI’s have been printed on transparencies, or one on a transparency and the other on paper or some opaque substrate. This problem, called the alignment problem in literature, has so far hampered the deployment of the VC technique. Recently, various studies about visual cryptography are proposed. A.Incze has proposed a method for splitting the image into two different shares. He proposed pixel sieve method which uses a key to split the image. It is used to split a black and white image. The image is rebuilt from the shares not by overlapping, but by applying a cryptographic process using a key. The key used in this method is a binary image which contains holes like a sieve[3]. Here we are using pixel sieve method, where key is used to split original image thus it forms shares. Key provides relatively better security than existing methods. Later we add cover images to overcome pixel expansion problems and to reduce shares synchronization duration. http://www.ijettjournal.org Page 1549 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 III. MODULES 1. 2. 3. 4. GRAYSCALE CONVERSION IMAGE ENCRYPTION ADDING COVERIMAGES IMAGE DECRYPTION 1. Grayscale Conversion Fig 1: An example of pixel sieve method The method works as follows: we take the main image and then sieve pixel by pixel. If the value of the pixel in sieve is black then pixel from the main image goes to the share1 otherwise pixel goes to share2. Pixel sieve method is a powerful visual cryptographic algorithm. It provides better security than older cryptographic methods, but it has some limitations which can be solved by proposed method. II. SYSTEM ASSUMPTIONS Conventional VSS schemes generate noise-like random pixels on shares to hide secret images. In this manner, the secret can be perfectly concealed on the share images. However, these schemes suffer from a management problem dealers cannot identify each share visually. Hence, researchers have developed the extended visual cryptography scheme, which adds a cover image to share images. Key sieve shifting: In this method we iterate the sieve and cross merge method several times with different shifted keys on the original image. We shift the key in each round of encryption process. In the decryption process the keys are used in reverse order of encryption process. Shifting of the encryption key is an important part of various cryptographic algorithms. In this method the key sieve used for pixel sieving is shifted in each round. We propose a key shifting method with two steps. In 1st step we circularly left shift each row of the key sieve independently. In 2nd step we circularly up shift each column of the key independently. ISSN: 2231-5381 In photography and computing, a grayscale digital image is an image in which the value of each pixel is a single sample, that is, it carries only intensity information. Images of this sort, also known as black-and-white, are composed exclusively of shades of gray, varying from black at the weakest intensity to white at the strongest. Conversion of a color image to grayscale is not unique; a common strategy is to match the luminance of the grayscale image to the luminance of the color image. In fact a gray color is one in which the red, green and blue components all have equal intensity in RGB space. The grayscale intensity is stored as an 8-bit integer giving 256 possible different shades of gray. which converts the given original image to a 256 bits gray-level bitmap image. 2. Image Encryption In cryptography, encryption is the process of encoding messages in such a way that hackers cannot read it, but that authorized parties can view that message. In an encryption scheme, the message or information is encrypted using an encryption algorithm, turning it to an unreadable cipher-text. This image is divided into n slides called transparency. Each pixel of the message appears in each transparency in a different modified version. For getting the original information all of them are stacked together with proper alignment. Shifting of the encryption key is an important part of various cryptographic algorithms. In this method the key sieve used for pixel sieving is shifted in each round. In this method we iterate the sieve and cross merge method several times with different shifted keys on the original image. We shift the key in each round of encryption process. 3. Adding cover images Conventional VSS schemes generate noise-like random pixels on shares to hide secret images. However, these schemes suffer from a management problem dealers cannot identify each share visually. Hence, researchers have developed the extended visual cryptography scheme, which adds a cover image to share images. By http://www.ijettjournal.org Page 1550 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 adding cover images it reduces the pixel expansion problems and also reduces shares synchronization time. 4. Image Decryption The decryption of the image will be done by overlapping the shares. When we place both the shares one over another with proper alignment, we can interpret the original image. In the decryption process the keys are used in reverse order of encryption process. Then we can overlap the two shares. IV. IMPLEMENTATION ISSUES Visual cryptography [1][2] is a simple and powerful method which can provide high security for confidential information. Concept of visual cryptography is introduced by Moni Naor and Adi Shamir in 1994. The idea is to split a message into n different pieces such that the original message is visible if any k (or more) of them are used together, but totally invisible if fewer than k pieces are used for getting the message. In this method each message is considered as an image of black and white pixels. The simplest example of visual cryptography is a scheme in which we split the image into two different shares. The decryption of the image will be done by overlapping the shares. When we place both the shares one over another with proper alignment, we can interpret the original image successfully. Recently, various studies about visual cryptography are proposed. A.Incze has proposed a method for splitting the image into two different shares. He proposed pixel sieve method which uses a key to split the image. It is used to split a black and white image. The image is rebuilt from the shares not by overlapping, but by applying a cryptographic process using a key. We use pixel sieve method to provide better security when compared with previous methods. Fig 2: Sieve and cross merge process In this method we iterate the sieve and cross merge method several times with different shifted keys on the original image. We shift the key in each round of encryption process. In the decryption process the keys are used in reverse order of encryption process, then we overlap the two shares to get original image. V. EXPERIMENTAL RESULTS Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. The two layers sliding over each other until they are correctly aligned and the hidden information appears. Before overlaying the shares we are using pixel sieve method where we iterate the sieve and cross merge method several times with different shifted keys on the original image at encryption. Later in the decryption process the keys are used in reverse order of encryption process. Then we can overlap the two shares to get original image. VI. CONCLUSION The major contributions of our work is first solution that addresses the pixel expansion problem of the EVCS for GAS. Key sieve shifting method enhances the security of the pixel sieve method. This method provides security against nearly equal keys used for decryption. Another advantage of this method is that it also increases the randomness in the decrypted image. ISSN: 2231-5381 http://www.ijettjournal.org Page 1551 International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Advances in Cryptology (Eurprocrypt’94), 1994, pp. 1–12. E. R. Verheul and H. C. A. v. Tilborg, “Constructions and properties of k-out-of-n visual secret sharing schemes,” Designs Codes Crypto., vol. 11, pp. 179–196, 1997. A.Incze, “Pixel Sieve method for secret sharing & visual cryptography”. 9th RoEduNet IEEE International Conference,2010 H. Koga, “A general formula of the (t,n)threshold visual secret sharing scheme,” in Proc. Advances in Cryptology (Asiacrypt), 2002, pp. 328–345. C. Blundo, S. Cimato, and A. D. Santis, “Visual cryptography schemes with optimal pixel expansion,” Theor. Comput. Sci., vol. 369, pp.169–182, 2006. D. Wang, L. Zhang, N. Ma, and X. Li, “Two secret sharing schemes based on boolean operations,” Pattern Recognit., vol. 40, pp. 2776–2785, 2007. C. S. Hsu, S. F. Tu, and Y. C. Hou, “An optimization model for visual cryptography schemes with unexpanded shares,” Found. Intelligent Syst., LNAI, vol. 4203, pp. 58–67, 2006. Gamil R.S. Qaid and Sanjay N. Talbar,’’Encryption and Decryption of Digital Image Using Color signal” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2, March 2012 Vaibhav Choudhary,” Modified Pixel Sieve Method for Visual Cryptography”, Indian Journal of Computer Science and Engineering Vol. 1 No. 4 321-326 ISSN: 2231-5381 http://www.ijettjournal.org Page 1552