Security in Medical Images using enhanced Visual Secret Sharing Scheme Kalaivani Pachiappan, Dr.Sabari Annaji, Nithya Jayakumar Department of Information Technology, K.S.Rangasamy College of Technology, Tiruchengode. E-mail: kalaivani.pachiappan@gmail.com which allows visual information (e.g. printed text, Abstract: Information security has emerged as foremost handwritten notes and pictures) to be encrypted in challenge. Visual cryptography is one type of security such a way that the decryption can be performed by technique used for image encryption. The Visual the human visual system, without the aid of cryptographic technique sharing of images is limited with computers. Visual cryptography scheme eliminates two shares. Visual secret sharing scheme is used to embed the information. The embedded image constructs the two shared images and have more secured than traditional visual cryptography. The Pixel expansion is a major issue complex computation problem in decryption process, and the secret images can be restored by stacking operation. This property makes visual cryptography in Visual Secret Sharing (VSS) schemes. The various VSS especially useful for the low computation load schemes with minimum pixel expansion have been requirement. proposed for binary secret images. This paper presents a Noar and Shamir [2] is introduced Visual probabilistic (2, 3)-VSS scheme for gray scale images. Its cryptography and proposed encoding scheme to share pixel expansion is larger in size but the quality of the image a binary image into two shares Share1 and Share2. If is perfect when it’s reconstructed. The construction of the pixel is white or black, then any one row chosen from shadow images is based on the binary OR operation. Keywords: Visual Cryptography. sharing, Secret sharing, Grayscale, Figure 1 to generate Share1 and Share2. Here each share pixel p is encoded into two white and two black pixels each share alone gives no clue about the pixel p whether it is white or black. Secret image is shown INTRODUCTION only when both shares are superimposed. With the rapid enhancement of network technology, multimedia information is transmitted over the Internet conveniently. It is therefore important to secure data over open and unsecured networks in order to ensure safety of sensitive data. In Medical, patient information are sensitive and needed to be protect during storage, especially in the cloud, and during transmission. Hence the usage of cryptography in the protection of data is very crucial. Visual cryptography is a cryptographic technique Figure 1: Code Book decryption angle. According to this graph and the RELATED REVIEW Chin-Chen Chang et al [16] suggested hiding a binary image into two meaningful shares in pre-defined visual pattern set, two shares are generated. spatial-domain image hiding schemes. These two Tzung-Her Chen et al [20] offered the secret shares are embedded into two gray level cover multiple image encryption schemes by rotating images. To decode the hidden messages, embedding random grids, without any pixel expansion and images the codebook redesign. A non-expansion reversible performance between pixel expansion and contrast visual secret sharing method that does not need to Liguo Fang [17] recommend a (2, n) scheme based on define the code book offered by Fang [21]. To combination. Threshold visual secret sharing schemes encode four secrets into two shares and recovering mixed XOR and OR operation with reversing and the based on binary linear error correcting code was Zhengxin Fu et al [22] intended a rotation visual suggested The cryptography scheme. Rotation visual cryptography disadvantage of the above schemes is that only one set scheme construction was based on correlative of confidential messages can be embedded, so to share matrices set and random permutation, which can be large amounts of confidential messages several shares used to encode four secret images into two shares. have to be generated. Jonathan Weir et al [23] suggested sharing multiple can by be superimposed. Xiao-qing and Balancing Tan [16]. reconstructed images without distortions S J Shyu et al [24] were first researchers to secrets using visual cryptography. A master key is advise the multiple secrets sharing in visual generated for all the secrets; correspondingly, secrets cryptography. This scheme encodes a set of n ≥ 2 are shared using the master key and multiple shares secrets into two circle shares. Then secrets can be are obtained obtained one by one by stacking the first share and A grayscale image is an image in which the the rotated second shares with n different rotation value of each single pixel is carries only amount angles. To encode unlimited shapes of image and to information. The darkest shade is black, and the remove the limitation of transparencies to be circular, lightest possible shade is white. According to their Fang[18] offered reversible visual cryptography physical characteristics, various ways to represent the scheme. In this scheme two secret images which are color level of images. The computer screen uses the encoded into two shares; one secret image appears electric current to control lightness of the pixels. The with just stacking two shares and the other secret diversity of the lightness generates different color image appears with stack two shares after reversing levels. The general printers can only control a single one of them. Jen-Bang Feng et al [19] developed a pixel to be printed (black pixel) or not to be printed visual secret sharing scheme for hiding multiple (white pixel), instead of displaying the gray level. As secret images into two shares. This scheme analyzes such, the way to represent the gray level of images is the secret pixels and the corresponding share blocks to use the density of printed dots. The method that to construct a stacking relationship graph, in which uses the density of the net dots to simulate the gray the vertices denote the share blocks and the edges level is called “halftone” and transforms an image denote two blocks stacked together at the desired with gray level into a binary image before processing. Every pixel of the transformed halftone image has Two-out-of-Three Scheme using Grayscale Images only two possible color levels (black or white). This proposed scheme is entirely different Because human eyes cannot identify too tiny printed from that of earlier schemes. Here the shares are dots and, when viewing a dot, tend to cover its designed using code book, so that when combining nearby dots, we can simulate different gray levels any two shares will reveal the original bit through the density of printed dots, even though the information, but not the whole share just half of each transformed image actually has only two colors – single share will produce the high quality image black and white. when reconstructed. This scheme can be explained by Visual secret sharing (VSS) schemes [1][4],[12] have been proposed only with black and taking a value from the grayscale block and divide that value into shares as shown in the Figure 2. white (binary) images. Several schemes for grayscale images [14] and for color images [13], [15] have 254: [1 1 1 1 1 1 1 0] been proposed. However, these earlier works result in a decrypted image of less quality with pixel 1st half 2nd half expansion. A new gray-level visual cryptography Share1: 01010100 11011010 scheme is used to overcome problem of pixel Share2: 10101010 11101110 expansion. Comparatively, Image quality is better Share3: 00100100 10010100 than other schemes and provides high quality images including that of original quality to be reconstructed. Table-1: Grayscale bits are transformed into Binary bits The generation of the shared images is based on Boolean operations, and the reconstruction operation Share1 (1st half): 0 1 0 1 0 1 0 0 uses OR, as in other VSS schemes. Share2 (1st half): 1 0 1 0 1 0 1 0 PROPOSED METHOD In the proposed scheme convert each grayscale block into a binary block. Initially each pixel value in a grayscale block is transformed into binary representation. For example consider a grayscale block which is transformed into binary 1 1 1 1 1 1 1 0 = 254 Share3 (1st half): 0 0 1 0 0 1 0 0 Share1 (2nd half): 1 1 0 1 1 0 1 0 1 1 1 1 1 1 1 0 = 254 blocks. 100 [254 44 158 11 210 22 198] 110 Its corresponding binary blocks are as follows: [0 1 1 0 0 1 0 0] [1 0 0 1 1 1 1 0] [0 0 0 1 0 1 1 0]; [1 1 1 1 1 1 1 0] [0 0 0 0 1 0 1 1] [1 1 0 0 0 1 1 0]; [0 0 1 0 1 1 0 0] [1 1 0 1 0 0 1 0] [0 1 1 0 1 1 1 0]; Share2 (2nd half): 1 1 1 0 1 1 1 0 Share3 (2nd half): 1 0 0 1 0 1 0 0 1 1 1 1 1 1 1 0 = 254 Medical image Convert into binary image Using code book Build shared images Shared 1 1st Half 2nd Half Shared 2 1st Half Original image 2nd Half Shared 3 1st Half Original image 2nd Half Original image Figure2: System Architecture Combining any two half shares will provide the If the direct shares are combined a perfect gray scale exact bit and by doing the same procedure for the image cannot be obtained. If it combines the half whole grayscale block will output perfect high shares, the original quality of the image will be quality image when reconstructed without any loss of revealed without any loss of generality. contrast. Simulation Results for 2-out-of-3 Visual Secret sharing Scheme using Grayscale Orginal image 128 X 128 Share1(1st half) & Share2(1st half) Share 1 Share 2 Share3(1st half) & Share1(2nd half) Share3 Figure 3: Generating three separate shared transparencies for gray-level visual cryptography Share2(2nd half) & Share3(2nd half) Figure 4: Stacking of gray-level visual cryptography CONCLUSION This paper proposed a probabilistic 2-out-of3 visual secret sharing scheme for grayscale images and gives a high quality images that of perfect (original) quality to be reconstructed. In this scheme the quality of the image is maintained perfectly without any loss of generality. The size of the shadow is increased drastically, which represents the pixel expansion problem. REFERENCES 1. Kafri, O and Keren, E. 1987. Encryption of pictures and shapes by random grids. Optics Letters 12: 377-379. 2. Naor, M. and Shamir, A. 1995. Visual cryptography. Advances in Cryptography-Eurocrypt, 950: 1-12. 3. Gnanaguruparan, M. and Kak, S. 2002. Recursive hiding of secrets in visual cryptography. Cryptologia 26: 68-76. 4. Parakh, A. and Kak, S. 2008. A recursive threshold visual cryptography scheme. Cryptology ePrint Archive, Report 2008/535. 5. Parakh, A. and Kak, S. 2010. A tree based recursive information hiding scheme. Proceedings of IEEE ICC 2010 – Communication and Information System Security Symposium (ICC‟10 CISS‟), May 23-27, Cape Town, South Africa. 6. Parakh, A. and Kak, S. 2011. Space efficient secret sharing for implicit data security. Information Sciences 181: 335-341. 7. Mandhani, N. and Kak, S. 2005. Watermarking using decimal sequences. Cryptologia, vol 29, pp. 50-58; arXiv: cs.CR/0602003 8. Penumarthi, K. and Kak, S. 2006. Augmented watermarking. Cryptologia, vol. 30, pp 173- 180. 9. Kak, S. and Chatterjee, A. 1981. On decimal sequences. IEEE Transactions on Information Theory, IT-27: 647 – 652. 10. Kak, S. 1985. Encryption and error-correction coding using D sequences. IEEE Transactions on Computers, C-34: 803-809. 11. Kak, S. 1987. New results on d-sequences. Electronics Letters, 23: 617. 12. Sandeep, K. 2010. Recursive information hiding in visual cryptography Cryptology ePrint Archive, Report 2010/283. 13. Muecke, I. 1999. Greyscale and Colour Visual Cryptography, Thesis of degree of Master of Computer Science, Dalhouse University – Daltech. . 14. Blude, C., De Santis, A. and Naor, M. 2000. Visual cryptography for grey level images, Information Processing Letters, Vol. 27, pp. 255259. 15. Hou, Y. C. Visual cryptography for color images. Pattern Recognition, 36:1619-1629, 2003. 16. Chin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin ,2005. Sharing A Secret Two-Tone Image In Two Gray-Level Images”, Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS'05). 17. Liguo Fang, BinYu, Research On Pixel Expansion Of (2,n) Visual Threshold Scheme, 1st International Symposium on Pervasive Computing and Applications ,pp. 856-860, IEEE. 18. Wen-Pinn Fang, 2007. Visual Cryptography In Reversible Style, IEEE Proceeding on theThird International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), Kaohsiung, Taiwan, R.O.C. 19. Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu,2008. Visual Secret Sharing For Multiple Secrets, Pattern Recognition 41 ,pp. 3572 – 3581. 20. Tzung-Her Chen, Kai-Hsiang Tsao, and KuoChen Wei, 2008. Multiple-Image Encryption by Rotating Random Grids, Eighth International Conference on Intelligent Systems Designand Applications, pp. 252-256. 21. Wen-Pinn Fang, 2009. Non-Expansion Visual Secret Sharing In Reversible Style, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2. 22.Zhengxin Fu, Bin Yu, 2009. Research On Rotation Visual Cryptography Scheme, International Symposium on Information Engineering and Electronic Commerce, pp 533- 536, 2009. 23.Jonathan Weir, WeiQi Yan, 2009. Sharing Multiple Secrets Using Visual Cryptography, 9784244-3828-0/09, IEEE, pp 509-512. 24. J. Shyu, S. Y. Huanga,Y. K. Lee, R. Z. Wang, and K. Chen, 2007. Sharing multiple secrets Visual cryptography, Pattern Recognition, Vol. 40, Issue 12, pp. 3633 - 3651, 2007.