A Verifiable Visual Cryptography Scheme Using Neural Networks (original) (raw)

A Neural-Network Approach for Visual Cryptography and Authorization

International Journal of Neural Systems, 2004

In this paper, we propose a neural-network approach for visual authorization, which is an application of visual cryptography (VC). The scheme contains a key-share and a set of user-shares. The administrator owns the key-share, and each user owns a user-share issued by the administrator from the user-share set. The shares in the user-share set are visually indistinguishable, i.e. they have the same pictorial meaning. However, the stacking of the key-share with different user-shares will reveal significantly different images. Therefore, the administrator (in fact, only the administrator) can visually recognize the authority assigned to a particular user by viewing the information appearing in the superposed image of key-share and user-share. This approach is completely different from traditional VC approaches. The salient features include: (i) the access schemes are described using a set of graytone images, and (ii) the codebooks to fulfil them are not required; and (iii) the size of ...

A Novel Authenticity of an Image Using Visual Cryptography

International Journal of Computer Science and Network, 2012

A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.

Novel authentication system using visual cryptography

2011 World Congress on Information and Communication Technologies, 2011

An array of encryption techniques has been proposed for providing data security. However, most of the traditional cryptography methods require complex algorithms for encryption and decryption. Visual cryptography is a technique which provides confidentiality without any cryptographic knowledge or complex computations. Visual information (e.g. printed text, handwritten notes, pictures, etc.) is encrypted by decomposing it into several images, called shares, in such a way that decryption can be done by human visual system with stacking of the shares. Some important goals while developing a Visual Cryptography scheme is to have (i)optimum number of shares, (ii)good quality of reconstructed image and (iii)keeping the size of share small. This paper aims to provide a comparative study of various Visual Cryptographic schemes based on pixel expansion, no of shares, size and quality of reconstructed image, etc and some real-life applications of visual cryptography. A new authentication system has been proposed which uses the technique of visual cryptography to improve the security level of existing schemes. The application of the system in financial domain is discussed.

Secure Authentication Using Visual Cryptography

2015

Visual Cryptography is a cryptographic technique which allows visual information (text, picture, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Visual Cryptography deals with any type of secrets such as printed or pictures, etc. These secrets are delivered into the system in a digital (image) form. The secrets which are in a digital form divided into different parts based on the pixel of the digital secret. These parts are called shares. To visualize the secret, the shares are then overlapped correctly.This paper introduces secure authentication using Visual Cryptography. In any authentication system the major problem is the authenticity of the customer. Due to unavoidable hacking of the database on the internet, it is always difficult to trust the information on the internet. To solve this authentication problem, we are discussing with the two most important topics based on image processing and visual cryptography.

A COMPARATIVELY STUDY ON VISUAL CRYPTOGRAPHY

The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field.

Review of Visual Cryptography

Cryptography is a technique used for secure transformation of information that is secret data in presence of unauthenticated interceptor. Visual Cryptography Scheme is a method that converts secret data like images or written text into binary images and then encodes them into n images, also called as shares of images. For decoding only some of the n shares or all n shares are required which are stacked on each other. The purpose of this review paper is to make clear the idea of visual cryptography schemes and continued work in the area.

Techniques of Visual Cryptography Schemes: A Review

2017

Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual cryptography scheme depends, such as pixel expansion, contrast, security, accuracy, computational complexity, share generated is meaningful or meaningless, type of secret images(either binary or color) and number of secret images(either single or multiple) encrypted by the scheme. Intent of this paper is on study and performance analysis of the visual cryptography schemes on the basis of pixel expansion, number of secret images, image format and type of shares generated.

VPVC: verifiable progressive visual cryptography

Pattern Analysis and Applications, 2016

In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing will be revealed. Progressive visual cryptography (PVC) scheme differs from the traditional VC where clarity and contrast of the decoded secret image are increased progressively with the number of stacked shares. Shares are most sensible objects since they carry secret; hence, verifying the reliability and authenticity of all shares before decoding the secret image prevents a participant from intentionally or unintentionally providing invalid data. This paper proposes a novel verifiable progressive visual cryptography approach with additional embedding capacity in each share which is used for self-embedding authentication data, copyright information along with confidential payload. These embedded informations in a share can be retrieved and verified at the time of any conflict. Proposed approach also eliminates many unnecessary encryption constraints of VC like pixel expansion, noise-like shares, explicit requirement of codebook and restriction on number of participants. Experiments show that in spite of having various credentials of participants, embedded in shares, the contrast of the decoded secret image remains 50 % without reducing the level of secrecy. By experiments, it is also confirmed that proposed approach can effectively localize the tampered region of the share.

A Comparative Study between Proposed and Traditional Visual Cryptography Scheme

Allied Journals, 2015

Visual cryptography is an encryption technique which is used to hide information of an image in multiple secret shares. These shares make the secrecy levels. For n level region incrementing visual cryptography scheme, image is divided in n regions. Each region consists of one level information. For implementing visual cryptography in n levels we need to encode(n+1) shares in such a way so that any single share is not able to show the information and by combining any two shares, first level information would be visible. Similarly by superimposing any three shares, information upto second level could be seen. In similar way, for revealing whole information all the (n+1) shares are superimposed. In this paper, we are comparing many visual cryptography algorithms. Traditional visual cryptography Algorithms were based on permutation whereas modern approach are based on random column selection. In Proposed algorithm, problem of pixel expansion and poor contrast has been removed and further it is modified to generate the levels automatically which is named as automatic region incrementing visual cryptography.

A Review on Various Visual Cryptography Schemes

Cryptography is study of transforming information in order to make it secure from unintended recipients or use. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts visual information (picture, printed text, handwritten notes) such that decryption can be performed using human visual system. The idea is to convert this visual information into an image and encypher this image into n different shares (known as sheets). The deciphering only requires selecting some shares out of n shares. The intent of this review paper is to contribute the readers an overview of the basic visual cryptography scheme constructions as well as continued work in the area. In inclusion, we also review some applications that take advantage of such secure system.