IJCNIS Vol. 4, No. 9, 8 Aug. 2012
Cover page and Table of Contents: PDF (size: 803KB)
Visual Cryptography, Bandwidth, Different types of Images, Security level and Symmetry key
Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.
Satyendra Nath Mandal, Subhankar Dutta, Ritam Sarkar," Block Based Symmetry Key Visual Cryptography", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.9, pp.10-19, 2012. DOI:10.5815/ijcnis.2012.09.02
[1]Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J.K.Mandal, "A New Approach to Cryptography", proceedings of "International Conference Systematics, Cybernatics & Informatics (ICSCI 2008"), pp1-12.2008.
[2]C.E. Shannon, "Communication Theory of Security System", Bell, System Technical Journal, vol 28, pp.656-715, 1949.
[3] Naor, M., and Shamir, A.Visual cryptography, in ''Advances in Cryptology Eurocrypt '94'' (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1 12, Springer-Verlag, Berlin.1995.
[4]Chang-Chou Lin and Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, v.24 n.pp1-3.
[5]Nakajima, M. and Yamaguchi, Y., "Extended visual cryptography for natural images", Journal of WSCG. v10 i2. pp303-310.