Sunteți pe pagina 1din 31

VISUAL CRYPYTOGRAPHY USING

(2,2) ENCODING SCHEME

SHASHIKIRAN B. S
OVERVIEW

 INTRODUCTION
 ARCHITECTURE
 IMPLEMENTATION
 ADVANTAGES
 ISSUES
 APPLICATIONS
 EXTENSIONS
 CONCLUSION
 REFERENCES
INTRODUCTION

What is Cryptography ?

Plain Text Encryption Cipher Text

Plain Text Decryption Channel


TYPES OF CRYPTOGRAPHY:
SECRET SHARING

 Divide data D into n shares


 D can be constructed from any k shares out
of n
 Complete knowledge of k-1 shares reveals no
information about D
 Written (k, n): k of n shares is necessary to
reveal secret data.
SECRET SHARING EXAMPLE

 6 thieves share a bank account


 They don’t trust one another
 They assume there will be no collusion
between more than 2 of them
 The thieves split up the password for the
account in such a way that:
 Any 3 or more thieves working together can
have access to account, but NOT < 3.
VISUAL CRYPTOGRAPHY

What is Visual Cryptography ?


 Visual cryptography is a cryptographic
technique which allows visual information
(pictures, text, etc.) to be encrypted in such
a way that the decryption can be performed
by the human visual system, without the aid
of computers.
 Visual cryptography was pioneered by Moni
Naor and Adi Shamir in 1994
ARCHITECTURE

Plaintext (in form of image)

Encryption (creating shares)

Channel (Fax, Email)

Decryption (Human Visual System)


Plain text

Encryption

Key Encrypted
Decryption
Secret Image ( plain text )
Share1

Stacking the
share
reveals the
secret

Share2
IMPLEMENTATION
2 out of 2 Scheme (2 subpixels)

 A pixel P is split into two sub pixels in each of


the two shares.
• If P is white, then a coin toss is used to
randomly choose one of the first two rows in the
figure above.
• If P is black, then a coin toss is used to
randomly choose one of the last two rows in
the figure above.
 Then the pixel P is encrypted as two sub
pixels in each of the two shares, as
determined by the chosen row in the figure.
Every pixel is encrypted using a new coin
toss.
 Now let's consider what happens when we
superimpose the two shares (here we refer to
the last column of the figure). Consider one
pixel P in the image.
• If P is black, then we get two black sub
pixels when we superimpose the two shares;

• If P is white, then we get one black sub pixel


 Thus, we could say that the reconstructed pixel
(consisting of two sub pixels) has a grey level of
1 if P is black, and a grey level of 1/2 if P is
white. There will be a 50% loss of contrast in the
reconstructed image, but it should still be visible
COMPUTER REPRESENTATION OF
PIXELS
 Visual Cryptography scheme represented in
computer using n x m Basis matrices.

Original Pixel

share1

s1= s0=
share2

overlaid Image
2 out of 2 Scheme (2 subpixels)

Example:
2 out of 2 Scheme (2 subpixels)

 The two subpixels per pixel variant can distort the


aspect ratio of the original image

+
2 OUT OF 2 SCHEME (4
SUBPIXELS)
 Two-level plaintext image (black/white)
 Each pixel encoded as
 a 2x2 cell
 in two shares (key and cipher)
 Each share has 2 black, 2 transparent subpixels
 When stacked, shares combine to
 Solid black
 Half black (seen as gray)
2 OUT OF 2 SCHEME (4
SUBPIXELS)
 Choose random cell in key (6 choices)

 Choose complementary (for black) or


matching (for white) cell in cipher
 Key conveys no information by itself
 Neither does cipher
 To view, stack and align
2 out of 2 Scheme (4 subpixels)

Horizontal shares Vertical shares Diagonal shares


2 out of 2 Scheme (4 subpixels)
2 out of 2 Scheme (4 subpixels)

pixel
0 1 2 3 4 5 0 1 2 3 4 5

share1

share2

stack

4 0
1 5

random
EXAMPLE :
ADVANTAGES

 Simple to implement
 Encryption don’t required any NP-Hard problem
dependency
 Decryption algorithm not required (Use a human
Visual System). So a person unknown to
cryptography can decrypt the message.
 We can send cipher text through FAX or E-MAIL
 Infinite Computation Power can’t predict the
message.
ISSUES

 The encryption does require increased disk space


, but with the falling cost of this resource and the
option of compressing files, resource and the
option of compressing files, this aspect of the
approach is not significant.
 The n, rather than 1, files (shares) are
transmitted. This takes more time but in contrast
to the other cryptographic algorithms that are
computationally intense, this time is minimal.
APPLICATIONS
 Bank customer identification
 Bank sends customer a set of
transparencies (key) in advance
 Bank web site displays cipher
 Customer applies overlay, reads
transaction key
 Customer enters transaction key
 Verifiable Receipts in Electronic Voting
 Anti spam-bot measure
EXTENSIONS
 K of N secret sharing
 N shares
 Any K combine to reveal message
 Any less can’t
 Gray level
 Could encode three levels in 2x2
 Can encode four levels in 3x3
 Color
CONCLUSION
 Among various advantages of Visual
Cryptography
Schemes is the property that VCS decoding
relies purely
on human visual system, which leads to a
lot of
interesting applications in private and public
sectors of
our society.
 Visual Cryptography is used with short
messages,
therefore giving the cryptanalyst little to
work with. As
with any analysis techniques, having little
 Since Visual Cryptography uses short
message,
public keys can be encrypted using this
method. Visual
Cryptography has proved that security can
be attained
with even simple encryption schemes.
REFERENCES
 Naor and Shamir, Visual Cryptography, in
Advances in Cryptology - Eurocrypt ‘94

 The Visual Cryptography Project


www.esat.kuleuven.ac.be/~rijmen/vc/

 http://www-sec.uni-regensburg.de/vc/

 file:///D:/seminar/visual.html

S-ar putea să vă placă și