SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · Visual cryptography is a cryptographic technique...
Transcript of SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY · Visual cryptography is a cryptographic technique...
SECURE DATA SHARING USING VISUAL CRYPTOGRAPHY
V.Vaishnavi1, B.Shanthi
2 and S. Sophia Rani
3
1,2 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous),
Periyakulam, Theni (Dt) 3Assistant Professor, Dept. of Computer Science Jayaraj Annapackiam College for Women(Autonomous),
Periyakulam, Theni(Dt)
ABSTRACT
The Secure Data Sharing Using Visual Cryptography Scheme is a kind of secret sharing scheme that fixates on
sharing secret data. The fundamental conception of the visual cryptography scheme is to split a secret data into
number of desultory shares which discretely reveals no information about the secret data other than the size of
the secret data. The AES algorithm used for secret key .The secret data can be reconstructed by stacking the
portions. In the multimedia steganocryptic system, the message will first be encrypted utilizing public key
encryption algorithm, and then this encrypted data will be obnubilated into an image file thus accomplishing
both data encoding and obnubilating. The multimedia data will be acclimated to provide the cover for the
information. Visual steganography is one of the most secure forms of steganography available today. It is most
commonly implemented in image files. In this application concept of visual cryptography is the legal
distribution of multimedia contents with copyright protection whilst preserving the privacy of user, whose
identities are only revealed in case of illegal re-distribution. This application to apply sharing of single secrete data and multiple secrete data on ebony and white as well as on colour images but withal a comparative
analysis on visual cryptography schemes is with all performed.
Keywords: Secure data sharing, steganography, visual cryptography
I. INTRODUCTION
In today’s information age, information sharing and transfer has incremented
exponentially. The threat of an intruder accessing secret information has been an ever
subsisting concern for the data communication experts. Cryptography and steganography are
the most widely used techniques to surmount this threat. Cryptography involves converting a
message text into an unreadable cipher. On the other hand, steganography embeds message
into a cover media and obnubilated its subsistence. Both these techniques provide some
security of data neither of them alone is secure enough for sharing information over an
unsecure communication channel and are vulnerably susceptible to intruder attacks. Albeit
these techniques are often cumulated together to achieve higher calibres of security but still
there is a desideratum of a highly secure system to transfer information over any
communication media minimizing the threat of intrusion. Visual cryptography is the art of
encrypting information such as handwritten text, images etc. in such a way that the
decryption is possible without any mathematical computations and human visual system is
sufficient to decrypt the information. The individuals who do not have cognizance of
cryptography are indirectly getting involved in decryption. The major drawback found in this
scheme is that visually blind people cannot make utilization of this technique as we perform
the encryption by making the quota and person who perform the encryption those people only
able to find the exact shares for performing the decryption.
II. RELATED WORK
International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com
605
Visual cryptography enrooted by M. Naor and A. Shamir, and they described general (p,n)
VCS. When shares are merged using OR/XOR operation, grayed secret image recovered.
Fig1. Shares used by Naor and Shamir in (2, 2) VCS
They designed (2,2) VCS using 4 subpixels, it means one pixel of original image provokes 4
subpixels in each share. Hence share size is 4 times as original. Here are some induced share
for their (2,2) scheme[5][9] Tai-wen Yue and Chian[13] introduces a modified scheme in
which the share dimension is twice of riginal in horizontal direction while remains same in
vertical direction. Its contrast is same as Naor and Shamir 2 out of 2 schemes
Fig2. Shares used by Tai-wen and Suchen Chian [8]
D. Jena and S. K. Jena proposed data hiding in halftone images using conjugate ordered
dithering DHCOD)[5]. They considered security of shares [5] in visual cryptography. Firstly,
shares are generated using basic scheme. Then these shares are watermarked [5] with some
cover image using DHCOD [5]. The decryption is made by human visual system. Abhisek
Parakh and Subhas Kak proposed a (2, 3) VCS based on recursive hiding scheme [1],[12]. All
the above mentioned schemes increase the size of shares and loss visual fidelity.
III. MATERIALS AND METHODS
Visual cryptography is a cryptographic technique where visual information (Image,
text, etc) gets encrypted in such a way that the decryption can be performed by the human
visual system without avail of computers. Proposed an authentication system for online
payment utilizing both visual cryptography which averted form identity larceny.
Authentication
International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com
606
The Authentication Server (AS) functions as any AS would with a few additional
behaviors added to the typical client-authentication protocol. The first addition is the sending
of the client authentication information to the masquerading router. The AS in this model also
functions as a ticketing authority, controlling permissions on the application network. The
other optional function that should be supported by the AS is the updating of client lists,
causing a reduction in authentication time or even the removal of the client as a valid client
depending upon the request.
User The proposed system can be deployed and managed by any of the three parties
mentioned in the previous section: content owners, hosting sites, or service providers.
Distributed Index: Maintains signatures of objects that need to be protected;
Reference Registration: Creates signatures from objects that content owners are
interested in protecting, and inserts them in the distributed index;
Query Preparation: Creates signatures from objects downloaded from online sites,
which are called query signatures. It then uploads these signatures to a common
storage;
Object Matching: Compares query signatures versus reference signatures in the
distributed index to find potential copies. It also sends notifications to content owners
if copies are found;
Parallel Crawling: Downloads multimedia objects from various online hosting sites.
The Distributed Index and Object Matching components form what we call the
Matching Engine. The second and third components deal with signature creation. For
the Crawling component, we designed and implemented a parallel crawler and used it
to download videos from YouTube. The details of the crawler are omitted due to
space limitations.
Monitor
Proxies are not trusted and the fragments sent through them shall be encrypted in such a way
that only the sender and the recipient have access to their clear text. Malicious proxies may
also try to cheat by reporting false segments (or not reporting them at all) to the transaction
monitor.
Tracing authority
In case of illegal re-distribution, it participates in the tracing protocol that is used to identify
the illegal re-distributor(s). Proposed System, Visual Cryptography (VC), technique
predicated on visual secret sharing utilized for image encryption. Secure Socket Layer (SSL)
encryption obviates the interception of consumer information in transit between the consumer
and the online merchant. In this paper, an incipient method is proposed, that utilizes text
predicated steganography and visual cryptography, which minimizes information sharing
between consumer and online merchant.VCS is a cryptographic technique that sanctions for
the encryption of visual information such that decryption can be performed utilizing the
human visual system. For phishing detection and obviation, we are proposing an incipient
methodology to detect the phishing website. Our methodology is predicated on the Anti-
Phishing Image Captcha validation scheme utilizing visual cryptography. It averts password
and other confidential information from the phishing websites. Cryptographic technique :( 2,
2) - Threshold VCS scheme,(n, n) -Threshold VCS scheme, (k, n) Threshold VCS scheme are
utilized in this proposed system.
International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com
607
Advantages of Proposed System
Our methodology is based on the Anti-Phishing Image Captcha validation scheme
using visual cryptography.
It prevents password and other confidential information from the phishing
websites.
For phishing detection and prevention, we are proposing a new methodology to
detect the phishing website.
IV. RESULTS AND DISCUSSION
System implementation involves creating or acquiring the various system components such
as software, hardware, and database etc., defined in the design step, assembling then and
putting the new system into operation. The primary goal of system implementation is
development of source code that is easy to read and to understand clarifying of sources code
eases debugging, testing and modification of a sources paper.
V.CONCLUSION
We proposed security for the particular image whoever having multiple owners. The main
objective of this paper is to provide equal digital rights to the owners of the file. Visual
cryptography technique refers for which generates N shares according to the number of
owners and the secure gives to authenticate each share with its owner. The security of data is
maintained using both visual cryptography. Thus the proposed systems is the requirement of
security and digital rights management by using the fog computing.Thus we conclude that the
International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com
608
strength of security achieved is very high and unauthorized receiver will not be able to get
back the original message using exhaustive without the knowledge of key parameters.
REFERENCES
[1] Wu C., Chen L., A study on visual cryptography,” Master‟s thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[2] Sirisha B. L., Lakshmi G. S., A novel cryptographic technique under visual secret sharing scheme
for binary image, International Journal of Engineering Science and Technology, Vol. 2(5),2010, pp:
1473-1484.
[3] Yu B., Xu X., Fang L., Multi-secret Sharing Threshold Visual Cryptography Scheme,
International Conference on Computational Intelligence and Security, 2007
[4] Parakh A., Kak S., A Recursive Threshold Visual Cryptography Scheme, Dept. of Computer
Science, Oklahoma State University.
[5] Jena D., Jena S. K., A Novel Visual Cryptographic Scheme,” IEEE,2008, pp. 207–211.
[6] Kessler G. C., An Overview of Cryptography”- http://www.garykessler.net/library/crypto.html. 28
April 2013.
[7] Pal J. K., Mamdal J. K., Gupta K. D., A (2, N) Visual Cryptographic Technique For Banking Applications, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4,
October 2010.
[8] Weir J., Yan W. Q., Sharing Multiple Secrets Using Visual Cryptography, IEEE, 2009
[9] Naor M., Shamir A., Visual cryptography, Advances in Cryptology EUROCRYPT ‟94. Lecture
Notes in Computer Science,1995,(950):pp. 1-12.
[10] Mandal, J.K.; Ghatak, S. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC), Electronic System Design (ISED), 2011 International
Symposium on, On page(s): 329 – 334
[11] Mandal, J.K.; Ghatak, S. Secret image / message transmission through meaningful shares using
(2, 2) visual cryptography (SITMSVC), Recent Trends in Information Technology (ICRTIT), 2011 International Conference on, On page(s): 263 – 268
[12] Katta S., Recursive Information Hiding in Visual Cryptography, 2010
[13] Yue T. W., Chiang S., A Neural Network Approach for Visual Cryptography. Proceedings of the
IEE-INNS-ENNS International Joint Conference on Neural Networks(IJCNN‟00) .pp. 1-2.
[14] Chakraborty U., Paul J. K., Mahapatra P. R. S., “Desigan and Implementaion of a (2,2) and a
(2,3) Visual cryptographic scheme”. IJCCT Vol.1 Issue 2,3,4; 2010 .
International Journal of Computational and Applied Mathematics. ISSN 1819-4966 Volume 12, Number 1 (2017) © Research India Publications http://www.ripublication.com
609