Block Based Symmetry Key Visual Cryptography

Full Text (PDF, 803KB), PP.10-19

Views: 0 Downloads: 0

Author(s)

Satyendra Nath Mandal 1,* Subhankar Dutta 2 Ritam Sarkar 2

1. Dept. of I.T, Kalyani Govt. Engg College, Kalyani , Nadia (W.B), India

2. Dept. of CSE, Kalyani Govt. Engg College, Kalyani , Nadia (W.B), India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.09.02

Received: 14 Feb. 2012 / Revised: 11 May 2012 / Accepted: 10 Jul. 2012 / Published: 8 Aug. 2012

Index Terms

Visual Cryptography, Bandwidth, Different types of Images, Security level and Symmetry key

Abstract

Visual cryptography is a method for protecting image-based secrets that has a computation-free decoding process. In this technique, numbers of shares have been generated from one image. The shares are sent through any channel to the receiver and the receiver can again produce original image by stacking all the shares in proper order. But, this method wastes a lot of bandwidth of the network. The techniques of generating shares have been used in several existing methods which are not unique. The different methods have been used in different types of images like binary, gray and color images. In this paper, a block based symmetry key visual cryptography algorithm has been proposed to convert image in encrypted form and decrypt the encrypted image into original form. The symmetric key has been generated from a real number. The encryption and decryption algorithm have been designed based on symmetry key. The algorithm with key has been used to encrypt image into single share and decrypt the single share into original image. The real number has been used to form the key may be predefined or may be sent by secure channel to the receiver. The proposed algorithm can be applied to any type images i.e. binary, gray scale and color images. A comparison has been made of the proposed algorithm with different existing algorithms like Ceaser cipher, transpose of matrix, bit comp, and transposition cipher based on the performance. The pixels distributed in original and share images have also been tested. Finally, it has shown that breaking of security level of proposed algorithm i.e. to guess the real number is huge time consuming.

Cite This Paper

Satyendra Nath Mandal, Subhankar Dutta, Ritam Sarkar," Block Based Symmetry Key Visual Cryptography", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.9, pp.10-19, 2012. DOI:10.5815/ijcnis.2012.09.02

Reference

[1]Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J.K.Mandal, "A New Approach to Cryptography", proceedings of "International Conference Systematics, Cybernatics & Informatics (ICSCI 2008"), pp1-12.2008.
[2]C.E. Shannon, "Communication Theory of Security System", Bell, System Technical Journal, vol 28, pp.656-715, 1949.
[3] Naor, M., and Shamir, A.Visual cryptography, in ''Advances in Cryptology Eurocrypt '94'' (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1 12, Springer-Verlag, Berlin.1995.
[4]Chang-Chou Lin and Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, v.24 n.pp1-3.
[5]Nakajima, M. and Yamaguchi, Y., "Extended visual cryptography for natural images", Journal of WSCG. v10 i2. pp303-310.