Novel Approach for C..

advertisement
Novel Approach for Color Extended Visual
Cryptography Using Error Diffusion
Abstract:
Cloud storage enables users to remotely store their data and enjoy the ondemand high quality cloud applications without the burden of local hardware and
software management. Though the benefits are clear, such a service is also
relinquishing users’ physical possession of their outsourced data, which inevitably
poses new security risks towards the correctness of the data in cloud. In order to
address this new problem and further achieve a secure and dependable cloud
storage service, we propose in this paper a flexible distributed storage integrity
auditing mechanism, utilizing the homomorphism token and distributed erasurecoded data. The proposed design allows users to audit the cloud storage with very
lightweight communication and computation cost. The auditing result not only
ensures strong cloud storage correctness guarantee, but also simultaneously
achieves fast data error localization, i.e., the identification of misbehaving server.
Considering the cloud data are dynamic in nature, the proposed design further
supports secure and efficient dynamic operations on outsourced data, including
block modification, deletion, and append. Analysis shows the proposed scheme is
highly efficient and resilient against Byzantine failure, malicious data modification
attack, and even server colluding attacks.
Architecture:
Existing System:
Visual cryptography is the art and science of encrypting the image in such a way
that no-one apart from the sender and intended recipient even realizes the original
image, a form of security through obscurity. By contrast, cryptography obscures
the original image, but it does not conceal the fact that it is not the actual image.
Limitation:-The existing system does not provide a friendly environment to
encrypt or decrypt the data.
Disadvantages:
1. The contrast of the reconstructed image is not maintained.
2. Perfect alignment of the transparencies is troublesome.
3. Additional processing is required for colored images.
Proposed System:
Proposed system Visual cryptography provides a friendly environment to
deal with images. Generally cryptography tools supports only one kind of image
formats. Unlike standard EVCS, the robustness of our proposed scheme to cheating
comes from that fact that it is impossible to differentiate VIPs and other pixels in
the encrypted shares and it is hard to know the actual VIP values which were
decided during the error diffusion. Based upon the principle of VC, extended VC
has been proposed whose shares take meaningful images rather than random noiselike patterns to avoid suspicion.
Advantages:
1. Simple to implement,
2. Decryption algorithm not required (Use a human visual system). So a
person unknown to cryptography can decrypt the message.
3. We can send cipher text through Fax or E-Mail.
4. Lower computational cost since the secret message is recognized only by
human eyes and not cryptographically computed.
Modules:
1. Visual Cryptography
1. Visual Cryptography
Sharing a secret color image and also to generate the meaningful share to transmit
secret color image Chang and Tsai anticipated color visual cryptography scheme.
For a secret color image two significant color images are selected as cover images
Which is the same size as the secret color image? Then according to a predefined
Color Index Table, the secret color image will be hidden into two camouflage
images. One disadvantage of this scheme is that extra space is required to
accumulate the Color Index Table. In this scheme also number of subpixels is in
proportional to the number of colors in the secret image as in Verheul and Van
Tilborg Yang and Laih schemes. When more colors are there in the secret image
the larger the size of shares will become. To overcome this limitation Chin-Chen
Chang et al developed a secret color image sharing scheme based on modified
visual cryptography. This scheme provides a more efficient way to hide a gray
image in different shares. In this scheme size of the shares is fixed; it does not vary
when the number of colors appearing in the secret image differs. Scheme does not
require any predefined Color Index Table. Though pixel expansion is a fixed in
this scheme is not suitable for true color secret image.
System Requirements:
Hardware Requirements:
• System
: Pentium IV 2.4 GHz.
• Hard Disk
: 40 GB.
• Floppy Drive
: 1.44 Mb.
• Monitor
: 15 VGA Colour.
• Mouse
: Logitech.
• Ram
: 512 Mb.
Software Requirements:
• Operating system
: Windows 7 Ultimate(32-bit).
• Coding Language
: ASP.Net with C#
• Data Base
: SQL Server 2008,VS2010
Download