Академический Документы
Профессиональный Документы
Культура Документы
Abstract- Visual Cryptography acts as an encryption and steganography, with the help of S-DES technique,
technique, which helps to store secret data within an image and thereby improving the authentication and security. This is
then split this image into a decided number of slices. Each and achieved by using a multi-level architecture model and
every authorized user will receive a single slice of the encrypted
making the various processes interrelated so that the whole
image containing a portion of the cipher text. The message
act as a new cryptosystem.
cannot be deciphered or read without superimposing
(combining) all the slices in the proper order. Many existing
papers which concentrate on the processes during and after [I. EXISTING SYSTEM
image-slicing, though considered being effective to a certain
extent, these individual concepts are a major reason for Most of the existing systems use fairly straightforward
compromising the security and privacy of a cryptosystem. It is concepts. The algorithms include: Key Bunch Matrix [3] , S
possible to detect cipher text in any secret image using standard DES Encryption and Decryption [2] , Steganography through
decryption tools. the use of First Component Alteration Technique [5] and
Enveloped Visual Cryptographic Scheme [6] .
Our proposed model not only strengthens the cryptosystem
by integrating random key generation technique using key
Here the first method, Key Bunch Matrix for encryption,
bunch matrix, and an improved S-DES algorithm but also
help to develop a block cipher, by involving several keys that
makes the cryptosystem hard to crack. The generated cipher
can be represented in the form of a matrix called key bunch
text is embedded into an image, which is then sliced into a
number of parts say 'n' different parts, thereby fully matrix [3] . Here, each plaintext character is multiplied by a
safeguarding the inbuilt-secret message. The secret text can key to get the cipher text. For decryption, the multiplicative
only be interpreted or deciphered when all the slices of the inverse of each key is obtained separately.
image are securely exchanged between the authorized users and
superimposed in the correct order. The earlier limitation is In the S-DES procedure, a type of symmetric block
solved as image slices cannot be identified by tools as containing cipher. [t has five stages: one each for initial permutation,
partial cipher text (acts as junk bits). Also, it needs permission Mangler's function using the key generated kl, switch
from all authorized users for interpreting cipher text into plain
function, Mangler's function using the key generated k2 and
text. Thereby, our proposed cryptosystem has increased the
inverse initial permutation. The S-Boxes help in reduction
overall efficiency and strengthened the authentication and
and shift operations. The major weak link here is the key
security barrier.
generation process, which is insecure.
Keywords: Image-Slicing, Key Bunch Matrix, Superimposing
Images, S-DES Encryption Technique, Visual Cryptography. Another concept used in the existing system is the First
Component Alteration method, which is a simple
Steganography technique used to replace the very first bit
I. INTRODUCTION component of every image pixel with the corresponding
cipher text entry bit. This has the advantage that the picture
Visual cryptography, a cryptographic technique encrypts
will still retain most of its clarity despite containing the cipher
visual information. [ 1] . Cryptography and Steganography are
text, but it is easy to decrypt, hence vulnerable to attack.
two important branches of information security.
Cryptography helps in encrypting plain text to generate cipher
The fourth concept is to hide the stego image in a cover
text [2] . However, cipher text transmission may easily be
image so that it becomes tough for any intruder to hack the
deciphered by a potential hacker. To overcome the
secret message. But the existing system uses images four
shortcomings of cryptographic techniques, steganography has
times the size of the stego-image slices in order to cover
been developed, which transfers secret message by
them. But it is infeasible that the size of stego-image slices is
embedding it into a cover medium with the help of message
large.
hiding techniques. Cryptography and steganography achieve
the same goal via different means. The limitations of the existing system is overcome by us
as we have tried to improve and integrate these techniques in
Our research work aim to strengthen the security of the secret
such a way that the working of each cryptosystem is
message by combining the processes of visual cryptography
IV. ENCRYPTlON
Key Generation
using Key Bunch The encryption process starts with the user being asked to
Matrix enter the message and a secret key. This message is then
encrypted using the S-OES technique where the key is
generated randomly by use of the Key Bunch Matrix
Original Secret
SDES Encryption Cipher Text generation technique. The encrypted message is then
Message
embedded in to the cover image specified by the user. The
Fig1.1. Key Generation and Encryption user also decides the number of partners among whom he
decides to share the image. The number of partners decides
In the second stage of the proposed cryptosystem (Fig 1. 2), the number of slices into which the image should be split.
the cover image and the cipher text are taken as input. The These image slices/shares are distributed among the different
cipher text is embedded in the cover image by use of Random partners. This completes the encryption process. The 3 main
pixel selection Steganography to generate the Stego-image as modules are discussed below.
output.
A) S-OES ENCRYPTION USING KEY BUNCH MATRIX
In the third stage of the proposed cryptosystem (Fig 1. 3), The operation of the Key Bunch Matrix is explained in
the stego-image is sliced into several shares depending on the Figure2. Here, the plain text is taken as input and using an
number of partners among whom it needs to be distributed. equation a key is randomly generated. This key is multiplied
These sliced shares are then enveloped by similarly sliced with the number equivalent of the plain text and the cipher
shares of a Cover Image. This enveloping is performed by a text is got. This cipher text acts as the key for the S-DES
simple XOR operation. All these operations are performed in process.
a sequential order. The output of this stage gives random
shares that are unintelligible. And it is nearly impossible to
get back the original secret message from these Enveloped Cipher Text
Plain Text
share images.
The cipher text is generated using S-DES Encryption where
Fig2. Key Generation
the key is generated randomly using the Key Bunch Matrix.
This text is then embedded onto an image using the Random
The relation is expressed as : (eij x dij) mod 256 = 1
Pixel Selection to form the Stego-Image as output. Image
Encryption: C = [Cij] = [eij x Pij] mod 256.
Slicing is performed on this stego-image to produce many
slices/shares, which are then enveloped into multiple
The key generated is then used in the S-OES Encryption
slices/shares of a single cover image.
process.
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015
This process is in-turn made up of 5 steps: it contain any understandable secret text. This is the beauty of
1. Initial Permutation visual cryptography. Unless a user attains all the slices of the
2. Mangler function tkl stego-image in its correct order, he will not be able to
3. Swap Operation decipher the secret text. Authentication techniques are further
4. Mangler Function tk2 enhanced by using a 3-way authentication scheme procedure
[4]
5. Inverse Permutation
I (fI...?1
PS stego-image slices are XOR-ed with the cover image slices to
get the enveloped slices.
-w
I Inverse of IP (lp.i)
I
I Cipher Text(CT)
I C Olll r- i m a g
Fig3. SDES Encryption using a 10-bit Key generated by Key
Bunch Matrix
Efli ""lope 1
Embedding Phase:
Input: Image file and the cipher text file
Output: Stego Image containing secret text
Original Secret
Cipher Text
Messag'e
Procedure:
I. Extract all the pixels in the given image and store it in Cover i mae
I Envelope n
C) ENVELOPED VISUAL CRYPTOGRAPHIC SCHEME
I Envelo oe s.lic E! n
I Efl I S licE! n,
taken 2 slices. The stego-image slices are shown below.
K ey - B u ne h Matrix
f-Df" K e'y iS en er at ton
Fig6. Overall decryption process Then the slices of the cover image are made as shown in the
figure below.
The process of decryption is slightly complex. If the cover
image is not entered correctly, the original message cannot be
recovered. Even if the slices are not combined in the proper
order, the message will not be recovered. Also, the correct
entry of keys is needed to get the message back.
The slices of the stego-image and the cover image are then It!] Blue!: Terminal Window - FYP demo
combined by a simple XOR operation to obtain the images to
Options
be distributed among the authorized partners. XOR allows us
to easily encrypt and decrypt a string. It can be used directly Ente the plaintext
as no matter what one input is, the other input always has an hi
effect on the output. These images to be distributed are shown Ente a unique numbe(1-50)
2
----------------------- ENCRYPTION COMPLETED
During the decryption process, the above processes are Ente the numbe of slices :
VIII. CONCLUSION
The use of multi-tier cryptosystem helps to overcome the Science and Software Engineering, Volume 2, Issue 4,
problems faced by the individual cryptosystems and enables April 2012.
the transfer of messages in a more secure manner. This paper [3] V. U. K. Sastry and K. Shirisha, "A Novel Block Cipher
explains how to achieve that by encrypting the message, Involving a Key Bunch Matrix", International Journal of
protected by a key or password, using S-DES which in-turn Computer Applications (0975 - 8887) Volume 55- No. 16,
uses Key Bunch Matrix to generate the randomized keys, and October 2012.
then embedding it into the cover image which is later sliced [4] B. Padhmavathi, P.Nirmal Kumar and M. A. Dorai, "A
into required number of slices and enveloped to make the Robust Three-Way Authentication System using
message secure. The whole process of encryption and Modified Random Grid based Reversible Style Visual
decryption is explained by taking a secret message 'hi' and a Cryptography", International Journal of Computer
cover image of the penguins. Applications (0975 - 8887) Volume 37- No. l, January
of secret messages securely and the framework can not be [5] Amanpreet Kaur, Renu Dhir and Geeta Sikka "A New
intruded, unless all partners having the secret slices/shares Image Steganography Based on First Component
combine them correctly. This can be used in various restriced Alteration Technique", International Journal of Computer
access areas. Science and Information Security, Vol.6, No. 3, 2009.
[6] Shyamalendu Kandar, Arnab Maiti and Bibhas Chandra
IX. REFERENCES
Dhara, "Visual Cryptography Scheme for Color Image
[ 1] M. Naor and A. Shamir, "Visual cryptography, " Advances Using Random Number with Enveloping by Digital
in Cryptology-Eurocrypt'94, 1995, pp. 1-12. Watermarking", IJCSI International Journal of Computer
[2] Ankita Agarwal, "Security Enhancement Scheme for Science Issues, Vol. 8, Issue 3, No. 1, May 20 1l.
Image Steganography using S-DES Technique",
International Journal of Advanced Research in Computer