27
(1) Image sharing method for gray-level images, Wei-Kuei Chen, The Journal of Systems and Software 86 (2013) 581– 585 (2) Random grid-based visual secret sharing with abilities of OR and XOR decryptions, Xiaotian Wu, Wei Sun , The Journal of Vis. Commun. Image R. 24 (2013) 48–62.

Vc term paper-jothi1

Embed Size (px)

Citation preview

Page 1: Vc term paper-jothi1

(1) Image sharing method for gray-level images, Wei-Kuei Chen, The Journal of Systems and Software 86 (2013) 581– 585

(2) Random grid-based visual secret sharing with abilities of OR and XOR decryptions, Xiaotian Wu, Wei Sun , The Journal of Vis. Commun. Image R. 24 (2013) 48–62.

Page 2: Vc term paper-jothi1

(1) Image sharing method for gray-level images Wei-Kuei Chen

Uses linear equations of Hill cipher to divide an image into several sub-images

Then the random grid is applied to the sub-images to construct the shared images

Page 3: Vc term paper-jothi1

Motivation

Naor and Shamir(1994) proposed a VSSusing a codebook to encode a binary image into sharesno computational effort for decryptionproblem of pixel expansion and lossy recovery

Lukac and Plataniotis (2005) proposed a bit-level based VSSA gray-level image decomposed into 8 bit-planes(binary image)every binary image is encoded into two shared images by the codebookShares decomposed to bit-planes to recover the original imageLossless recovery but still the problem of pixel expansion

Page 4: Vc term paper-jothi1

Motivation….

Shyu (2007) proposed a random grid method based on Kafri and Keren algorithmrandomly generates a image consisting of 0 and 1create shares using random grid and secret imageremoves the problem of pixel expansion but distortion still be a problem

Chen & Tsao(2009) proposed RG based VSSWhen more shared images are collected, the secret image can be clearly recoveredhow to completely obtain the original image is an unsolved issue.

Page 5: Vc term paper-jothi1

Proposed Method

Use linear equations of Hill cipher to divide a secret image (n x m) into sub images(size <n x m)

Apply random grid to the sub-images and construct the share imagesNo one can obtain the original image unless the authorized personCollecting all shared images can completely recover the original secret image

without distortion

Page 6: Vc term paper-jothi1

Hill Cipher

• Polygraphic substitution cipher based on linear algebra• ‘m’ cipher text letters to substitute ‘m’ successive plaintext letters, where m

belongs to positive integer• For m=2 ,the cipher text can be obtained by C = KP mod 26

• Key matrix K must be invertible • P = K-1 C mod 26

Page 7: Vc term paper-jothi1

Random Grid

Random grids was proposed by Kafri and Keren (1987) Construct a master grid M1 consisting of 0 and 1 randomly, where M1 has the same size

with the secret image Use the master grid M1 and secret image S1 to construct an encoded grid E1

the secret image can be recovered by superimposing the two grids together

The method of the random grid can solve the problem of pixel expansion

Page 8: Vc term paper-jothi1

Proposed scheme(2 Stages)

Fig. Sharing Stage

Page 9: Vc term paper-jothi1

1. Divide a gray-level image G with size M × N into blocks consisting of two pixels by raster-scan order

2. Take two pixels of first block. Compute I1 and I2 as

3. Repeat step 2 for the rest of the pixels of the block and construct the two sub-images I1 and

I2 with size MxN/2

4. Construct Master Grid M1 with size MxN/2, whereM1[i,j] ξ [0,255]

Stage-1 The Sharing stage

Page 10: Vc term paper-jothi1

• Sharing Stage……

5. Transform M1, I1 and I2 from decimal value to binary value

6. Use the master grid M1 and sub-images I1 and I2 to construct two encoded grids E1 and E2 with size M×N/2 by

7. Transform E1 and E2 from binary value to decimal value and transmit to different

participant

Page 11: Vc term paper-jothi1

Stage-2 The recovering stage

1. Collect the two encoded grids (E1 and E2) and master grid M1.

2. Transform M1, E1 and E2 from decimal value to binary value

3. Use the master grid M1, encoded grids E1 and E2 to construct the sub-images I1 and I2

4. Transform I1 and I2 from binary value to decimal value

5. Take first pixel of sub-images I1 and I2 by raster-scan order into the following equation and obtain two values

6. Successively take the pixels and recover the original secret image without distortion

Page 12: Vc term paper-jothi1

Results

(a) The secret image Lena with size 256×256, (b) and (c) the sub-images I1 and I2 with size 256×128,(d) the master grid M1 with size 256×128, (e) and (f) the two encoded grids E1 and E2 with size 256x128

Page 13: Vc term paper-jothi1

Recovering stage

a b c

(a) Recovered image with correct key(b) & (c) Recovered image with incorrect key

Page 14: Vc term paper-jothi1

Implementation

Page 15: Vc term paper-jothi1

a b c d e

a,b : Sub images (I1,I2) c,d : Encoded Grids E1, E2e : Master Grid

Page 16: Vc term paper-jothi1

Recovered Image

Page 17: Vc term paper-jothi1

Conclusion

The proposed method has the following advantages

(1) Sub images reducing in size, so saving in storage space

(2) Master and encoded grid alone will not reveal any secret information, increased security

(3) Original secret image is recovered (Lossless)

Scope for improvement

1. K-1 for Hill Cipher does not always exist

2. How to send multiple secret images?

3. How to generate n shares?

4. Can be extended for Color images?

5. Is there any way to repair hill cipher to prevent from known-plaintext attack?

Page 18: Vc term paper-jothi1

Image Encryption Using Advanced Hill Cipher Algorithm , Acharya et. al., International Journal of Recent Trends in Engineering -2009; Proposed a solution for key inverse, involutory matrix generation To generate key A=

1. Select any arbitrary n/2 , n/2 matrix A22

2. A11= - A22

3. Take A12 = k( I - A11), k is a scalar

4. A21 = 1/k( I - A11)

5. Form the matrix completely

Use involutory key matrix for encryption, so that we need not compute K-1 as K=K-1

2221

1211

AA

AA

Page 19: Vc term paper-jothi1

How to send mult iple secret images?For 2 Secret sharing

a. Secret1 b. Secret2

Page 20: Vc term paper-jothi1

c. Master Grid

d. EncodedGrid1 e. EncodedGrid2

a. Sub Image1 b. Sub Image2

Page 21: Vc term paper-jothi1

Recovered Image1 Recovered Image2

Page 22: Vc term paper-jothi1

To compute n-sharesSharing Stage1. Apply Hill cipher on secret image I (hxw) and get I’(hxw)

2. Generate n-1 random matrices B(hxw) ( B[i,j]=0-255

3. Encoded Gridsa) E1 = B1

b) Ek=Bk exor Bk-1 for k=2 to n-1

c) En=Bn-1 exor I’

Recovering stage1. R=E1 exor E2 exor …..exor En

Page 23: Vc term paper-jothi1

(2).Random grid-based visual secret sharing with abilities of OR and XOR decryptions

Xiaotian Wu, Wei Sun

RG-based VSS is proposed Secret image can be recovered in two situations:

(1) when computational devices are not available, the secret image can be reconstructed by stacking the shares directly

(2) when some light-weight computational devices are available, the secret image can be decrypted by XOR operation

(3) Better visual quality is achieved by XOR The proposed method employs the (2,n) and (k, n) RG-based VSS scheme

Page 24: Vc term paper-jothi1

Diagram of share construction

Page 25: Vc term paper-jothi1
Page 26: Vc term paper-jothi1

Decryption

reconstruction by stacking k or more shares (or)applying XOR operation on k or more shares (xor)

Page 27: Vc term paper-jothi1

Conclusion

no code book required and no pixel expansion improved contrast

larger contrast is obtained by the proposed method when XOR decryption is applied

Scope for improvementContrast can still be improved

In reconstructed image, black and white pixels may group together as they are generated randomly