Publications

Detailed Information

Extension of Visual Cryptography for Color Images : 컬러 이미지를 위한 확장 시각 암호학

Cited 0 time in Web of Science Cited 0 time in Scopus
Authors

KumenitHagosAlema

Advisor
Srinivasa Rao Satti
Major
공과대학 컴퓨터공학부
Issue Date
2018-08
Publisher
서울대학교 대학원
Description
학위논문 (석사)-- 서울대학교 대학원 : 공과대학 컴퓨터공학부, 2018. 8. Srinivasa Rao Satti.
Abstract
Computer and communication technology has led to rapid development of digital media. Huge amount of digital data, such as text, voice, image, etc…, are transmitted and shared over the Internet. Multimedia data can be easily spread, duplicated, captured, and modified. However, the easiness of data exchange over the Internet has also brought problems such as data embezzlement, unlawful data usage and other problems regarding intellectual property rights. Protecting important data from attacks becomes key issue. Secure information sharing technique to prevent transmitted data from being accessed by unauthorized body is required.



Visual cryptography is a cryptographic technique in which a secret image can be revealed when the minimum required number of shares are stacked together. The secret image is encoded into n transparent shares. Each share constitutes some visual information of the secret image. To decode the secret image, $k$ out of $n$ transparencies should be superimposed one on top of the other. An individual share or any combination of less than these $k$ shares cannot reveal the secret image. The advantage of visual cryptography is that decryption of the visual information is done by using human visual system, i.e., it does not need any mathematical computation to decrypt the visual information.



The security of visual cryptography depends, of the many factors, on how hard it is to guess that an individual share is one of the many shares used to decode a secret visual information. A lot of articles have been published on visual cryptography. Most of them deal with grayscale images and the shares are not meaningful which help attackers to easily guess that an individual share is carrying a secret visual information. The focus of this thesis is to create a meaningful shares using cover images. Halftone technique is utilized and extended to be used with color images, which was originally proposed for grayscale images. Two colorful images are selected and preprocessed to make them ready for hiding a secret image. A colorful secret image is preprocessed in turn and encoded in these two meaningful shares. To decrypt the hidden secret image, the generated two meaningful shares are aligned one on top of the other properly, with out the need to do any cryptographic computation. The proposed scheme has two main features. First, each share is a meaningful image, as opposed to random looking share, and this makes it hard for attackers to guess that a given share is carrying an encoded secret image. Second, even if an attacker gets access to an individual share and guesses that the given share is an encoded share, he will not be able to recover the secret image unless he gets access to all the shares in which the secret image is encoded.



The main goal of this thesis is to design a visual cryptography scheme for color images. Individual shares of proposed scheme are meaningful, as opposed to random noise-like shares. Simple alignment of transparencies of these two meaningful shares is all we need to do to recover the secret image. The scheme uses 50\% of the total pixel of both the secret and cover images and is able to recover the secret image with 50\% contrast loss and with a small pixel expansion. A scheme that uses simple computation and increases the intensity of the recovered image from 50\% to 100\% is also proposed, which we believe that it is worth trading off.



An access structure ($\Gamma_{Qual}, \Gamma_{Forb}$) on a set of n participants is another cryptographic technique to encode a secret image into n share transparencies. Each participant receives a single transparency. Participants in the qualified subset can decode the secret image while participants in the forbidden subset has no information about the concealed secret image. This scheme is an enclosure of the $(k,n)$-threshold visual cryptography technique, where any $k$ or more participants can recover the secret image while less than $k$ participants cannot, even with the help of high mathematical computation. As an extension of the original proposed scheme, an access structure based cryptographic technique for color images is presented at the end of this thesis. Experimental results are presented and show the applicability of the proposed schemes.
Language
English
URI
https://hdl.handle.net/10371/143844
Files in This Item:
Appears in Collections:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share