Color Extended Visual Cryptography
-
Upload
vinaaykings -
Category
Documents
-
view
272 -
download
6
Transcript of Color Extended Visual Cryptography
![Page 1: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/1.jpg)
![Page 2: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/2.jpg)
04/07/2023 2
CONTENTS:-
ABSTRACT EXISTING SYSTEM PROPOSED SYSTEM SRS DOCUMENT HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTSDESIGN PHASE REFERENCES
![Page 3: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/3.jpg)
Abstract
Visual Cryptography (VC) is a method of encrypting a secret image into some shares (transparencies) such that stacking a sufficient number of shares reveals the secret image and any qualified subset of the shares can recover the secret “visually”.
The first visual cryptographic technique was pioneered by Moni Naor and Adi Shamir. It involved breaking up the image into n shares so that only someone with all n shares could decrypt the image by overlaying each of the shares over each other.
![Page 4: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/4.jpg)
Practically, this can be done by printing each share on a separate transparency and then placing all of the transparencies on top of each other.
Visual secret sharing (VSS) schemes are used to protect the visual secret.
This scheme can be easily implemented on basis of a black & white VSS scheme and get much better block length.
![Page 5: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/5.jpg)
EXISTING SYSTEM
In Previous methods it show good results for black and white or gray scale VC schemes.
It is not sufficient to be applied directly to color shares due to different color structures.
![Page 6: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/6.jpg)
color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.
To avoid this the concept of visual information pixel (VIP) synchronization and error diffusion are introduced to attain a color visual cryptography encryption
![Page 7: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/7.jpg)
PROPOSED SYSTEM
In proposed system visual cryptography technique, to provide privacy protection when transmitting sensitive data between offices or computers.
Here visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.
![Page 8: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/8.jpg)
VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes.
Cost will be decreased
![Page 9: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/9.jpg)
MODULE DESCRIPTION:
USER INTERFACE
ENCRYPTION
DECRYPTION
![Page 10: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/10.jpg)
SRS DOcument :HARD WARE Requirements :
Processor : Pentium III
RAM : 128 MB / 256 MB (Recommended)
Hard disk : 20 GB
![Page 11: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/11.jpg)
Operating System: Win 9x/ XP
Programming Tool : Java 1.4.2
SOFTWARE Requirements :
![Page 12: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/12.jpg)
FUNCTIONAL Requirements :
INPUT: Encripting an image is done by giving receivers port number OUTPUT: Decripting an image is done through the senders port number
![Page 13: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/13.jpg)
nON FUNCTIONAL Requirements : •Usability
•Reliability
•Performance
•Supportability
•Throughput
Efficiency
Security
![Page 14: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/14.jpg)
04/07/2023 14
Design phase
USE CASE Diagram.CLASS Diagram.ACTIVITY Diagram.SEQUENCE DiagramCOLLABORATION Diagram.STATE CHART Diagram.
![Page 15: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/15.jpg)
Use case diagram
04/07/2023
15
select image to send
select two cover images
select ip and port number
encrypt
Sender
send
receive
receiver
decrypt
![Page 16: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/16.jpg)
Class diagram:-
Receiver
nameipaddressportnumber
selectip()selectportnumber()receiveimage()decrypt()
Sender
nameipaddressportnumber
selectimages()selectip()selectportnumber()encrypt()send()
![Page 17: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/17.jpg)
Activity diagram:-
Select image to send
Select two cover images
select ip and port number
encrypt
valid ip
Errorinvalid
receive
Send
decrypt
ReceiverSender
![Page 18: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/18.jpg)
SEQUENCE diagram:-s : Sender r : Receiver
select image to be hide
select two cover images
select ip address
select port number
encrypt
send
receive image
enter ip and port
decrypt
![Page 19: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/19.jpg)
COLLABORATION phase
s : Sender r : Receiver
1: select image to be hide2: select two cover images
3: select ip address4: select port number
5: encrypt
6: send
7: receive image8: enter ip and port
9: decrypt
![Page 20: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/20.jpg)
STATE CHART phase:active
select image to send
select two cover images
select ip and port number
encrypt
send
receive
decrypt
select image to send
select two cover images
select ip and port number
encrypt
send
receive
decrypt
![Page 21: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/21.jpg)
04/07/2023 21
references
M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Comput., vol. 129, no.
A. Houmansadr and S. Ghaemmaghami, “A novel video watermarking
method using visual cryptography,” in Proc. IEEE Int. Conf. Eng. Intell. Syst., 2006, pp.
M. S. Fu and O. C. Au, “Joint visual cryptography and watermarking ,” in Proc. IEEE Int. Conf. Multimedia Expo, 2004, pp. 975–978.
![Page 22: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/22.jpg)
04/07/2023 22
Queries….?
![Page 23: Color Extended Visual Cryptography](https://reader034.fdocuments.net/reader034/viewer/2022051311/543eb0a4afaf9f195e8b49e9/html5/thumbnails/23.jpg)
THANK YOU