project complete without scaling

Upload: anonymous-v9e1zjtwoe

Post on 14-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Project Complete Without Scaling

    1/84

    i

    Certificate

    Certified that this project titled A New Visual Cryptography Scheme For Color

    Images With No Pixel Expansion is the bonafide work of Mr. Kapil Kumar

    Chawala (Enroll. No. 321516) and Mr. Vikas Kumar (Enroll. No. 321522), who

    carried out the work under my supervision, for the partial fulfillment of the

    requirements for the award of the degree of Master of Computer Applications.

    Certified further that to the best of my knowledge and beliefs, the work reported

    here in does not form part of any other thesis or dissertation on the basis of which

    a degree or an award was conferred on an earlier occasion on this or any other

    candidate.

    Head of the Department Project Guide

    Dr. P. K. Mishra Dr. Achintya Singhal

  • 7/30/2019 Project Complete Without Scaling

    2/84

    ii

    Acknowledgement

    We take immense pleasure in thanking Dr. Achintya Singhal for having

    permitted us to carry out this project work and feel great delight in expressing our

    deep sense of gratitude to him under whose able guidance this work was

    undertook. It was an honor and pleasure to work under him. Words are inadequate

    in offering our thanks to him for his useful suggestions, encouragement and taking

    good care to see that, we think and act in right direction, which helped us in

    completing the project work successfully, in time.

    We express our heartfelt gratitude to Dr. P. K. Mishra, Head of the

    Department, for providing us the essential resources required to undertake this

    project.

    Our special thanks goes to our faculty members Mr. Shailendra Singh andMr. Sateyendra Kumar for their incredible and endless support.

    And finally, yet importantly, we would like to express heartfelt thanks to

    our beloved parents and rest of the family for their blessing and every individual

    who was associated with the project.

    Kapil Kumar Chawala Vikas Kumar

  • 7/30/2019 Project Complete Without Scaling

    3/84

    iii

    Abstract

    In 1994, Naor-Shamir [2] introduced the notion of Visual Cryptography

    Scheme (VCS), which is the secret sharing of digitized images. A k-out-of-n VCS

    splits an image into n secret shares which are indistinguishable from random noise.

    These shares are then printed on transparencies. From any k 1 or less shares, no

    information about the original image (other than the size of it) will be revealed.

    The image can only be recovered by superimposing k or more shares. This

    recovery process does not involve any computation. It makes use of the human

    vision system to perform the pixel-wise OR logical operation on the

    superimposed pixels of the shares. When the pixels are small enough and packed

    in high density, the human vision system will average out the colors of

    surrounding pixels and produce a smoothed mental image in a humans mind.

    Early VCS schemes mainly focused on black-and-white and gray-scale

    images. One of the most potentially useful types of visual cryptography scheme iscolor visual cryptography. Due to the nature of a color image, this again helps to

    reduce the risk of alerting someone to the fact that information is hidden within it.

    It allows high quality sharing of these color images. Color images are highly

    popular and have a wider range of uses when compared to other image types.

    Some significant work has been done on color images. However, an issue

    that is common to most of the previous work is pixel expansion, which means that

    the size of each secret share is several times larger than that of the original image.

    Two important parameters which govern the quality of reconstructed images are m

    (pixel expansion rate which represents the loss in resolution from the original

    image to the shares) and (the relative difference in weight between the

    superimposed shares that come from one color level (e.g. black) and another color

    level (e.g. white)). For image integrity, a good VCS should make the value of m

    close to one (i.e. no pixel expansion) and

    as large as possible.It is uncommon if there is a scheme which satisfies all the following three

  • 7/30/2019 Project Complete Without Scaling

    4/84

    iv

    commonly desired properties:

    1. Supporting images of arbitrary number of colors;2. No pixel expansion;3. Supporting k-out-of-n threshold setting.

    We answer this question affirmatively by proposing a new probabilistic k-

    out-of-n threshold visual cryptography scheme which satisfies all these properties

    for color images based on the past studies in black-and-white visual cryptography,

    gray scale images, the halftone technology, and the additive color mixing model.

    In particular, our scheme utilizes a probabilistic technique for achieving no pixel

    expansion. In this project, we have given the new algorithm of proposed schemefor color images and considered the various constructions based on this algorithm

    and experimental results related to the new scheme.

  • 7/30/2019 Project Complete Without Scaling

    5/84

    v

    Table of Contents

    Certificate . i

    Acknowledgement ii

    Abstract .... iii

    Table of Contents . v

    List of Figures ...... vii

    1. Introduction 11.1 Cryptography ... 21.2 Secret sharing ... 31.3 Visual Cryptography 41.4 Summary .. 5

    2. Related work 72.1 VCS Schemes for Black-and-White Images . 8

    2.1.1 Naor-Shamir Black-and-White VCS ... 82.1.1.1Preliminary Notation 92.1.1.2Two-out-of-two scheme 102.1.1.3Three-out-of-three scheme ........ 112.1.1.4A general k-out-of-kscheme . 142.1.1.5A general k-out-of-n scheme . 15

    2.1.2 Other Black-and-White VCS Schemes 162.2 VCS Schemes for Gray-scale Images 16

    2.2.1 Some Gray-Scale VCS Schemes . 162.2.2 Chen et al. Gray-Scale VCS with No Pixel Expansion ... 18

    2.3 VCS Schemes for Color Images ... 192.3.1 Hou Colored VCS Schemes 192.3.2 Yang-Chen Colored VCS 25

  • 7/30/2019 Project Complete Without Scaling

    6/84

    vi

    2.3.3 Other Colored VCS Schemes .. 272.3.4 Summary . 27

    3. A newk-out-of-n colored VSS scheme 283.1 Basic Principle of Color 293.2 The Proposed Probabilistic VSS Scheme for Color Images . 313.3 Algorithm-For our proposed (k, n) ProbVSS scheme ... 393.4 Constructions of our proposed (k, n) ProbVSS scheme 40

    3.4.1 A proposed 2-out-of-n ProbVSS scheme . 413.4.2 A proposed 3-out-of-n ProbVSS scheme . 493.4.3 A proposed k-out-of-kProbVSS scheme . 513.4.4 A proposed k-out-of-n ProbVSS scheme . 55

    3.5 Summary ... 584. Comparison .. 605. Application ... 64

    5.1 Electronic-Balloting System . 655.2 Encrypting Financial documents ... 665.3 Watermarking 665.4 Moire patterns 675.5 Person Authentication 685.6 Summary 69

    6.

    Conclusion and Future work .. 70

    Bibliography .. 73

    Appendix . 77

  • 7/30/2019 Project Complete Without Scaling

    7/84

    vii

    List of Figures

    Figure 2.1: Construction of 2-out-of-2 scheme ... 10

    Figure 2.2: Secret image, two share and superimposed image (2, 2)....... 11

    Figure 2.3: Three share and superimposed image (3, 3)... 12

    Figure 2.4: Five share and superimposed image (3, 5)..... 13

    Figure 2.5: Lena gray-scale and halftone image .. 17

    Figure 2.6: Two share and their superimposed image (2, 2) ... 18

    Figure 2.7: Scheme 1 of Hou colored VCS scheme .... 21

    Figure 2.8 Four share and superimposed image (4, 4)..... 21

    Figure 2.9: Scheme 2 of Hou colored VCS scheme 23

    Figure 2.10: Two share and superimposed image (2, 2) ...... 23

    Figure 2.11: Color composition and decomposition ... 24

    Figure 2.12: Two share and superimposed image (2, 2)... 25

    Figure 3.1: ACM and SCM color model .. 30

    Figure 3.2: Continues tone and Half tone 35

    Figure 3.3: Lena gray-scale and halftone image .. 36

    Figure 3.4: Colored image with RGB component and their halftone .. 36

    Figure 3.5: Original image with two shares and superimposed image (2, 2) ...... 42

    Figure 3.6: Three share and superimposed image (2, 3) .. 45

    Figure 3.7: Four share and superimposed image (2, 4) ... 47

    Figure 3.8: Three share and superimposed image (3, 3) ...... 50

    Figure 3.9: Four share and superimposed image (4, 4) .... 53

    Figure 3.10: Four share and superimposed image (3, 4) .. 58

    Figure 4.1: Comparison of VCS scheme . 63

    Figure 5.1: Moire Patterns ... 68

  • 7/30/2019 Project Complete Without Scaling

    8/84

    1

    Chapter 1

    INTRODUCTION

  • 7/30/2019 Project Complete Without Scaling

    9/84

    2

    1.IntroductionAs technology progresses and as more and more personal data is digitized,

    there is even more of an emphasis required on data security today than there has

    ever been. Protecting this data in a safe and secure way which does not restrict the

    access of an authorized authority is an immensely difficult and very interesting

    research problem. Many attempts have been made to solve this problem within the

    cryptographic community. In this chapter, we will describe about the

    cryptography, secret sharing and one of its branches visual cryptography.

    1.1CryptographyCryptography probably began in or around 2000 B.C. in Egypt. On the

    tombs of deceased kings, hieroglyphics, which are intentionally cryptic, were used

    to tell their life stories and achievements. Cryptography was once used to make the

    text more royal and important. Classic cryptography means only secret writing

    (converting a meaningful message into an incomprehensible one). There are two

    techniques most commonly used in the classic cryptography, i.e. transposition and

    substitution. Transposition means that the order of the plaintext is rearranged

    according to a specified rule (e.g. cityuofhk becomes uckoyfiht in a simple

    rearrangement scheme). Substitution means that the original letter or groups of

    letters are replaced by other letter or group of letters (e.g. cityuofhk becomes

    djuzvpgil by replacing each letter with the one following it in alphabetical

    order). Classic ciphers were used historically in transporting secret messages, e.g.

    Caesar cipher (a type of substitution cipher), which was used by Julius Caesar to

    communicate with his generals. However, almost all types of classic ciphers are

    vulnerable to statistical analysis since they always reveal statistical information

    about the original message. Now people still use these classic ciphers, but mainly

    as puzzles.

    The modern field of cryptography has been expanded to more topics such as

  • 7/30/2019 Project Complete Without Scaling

    10/84

    3

    secret sharing schemes, authentication codes, identification schemes and key

    distribution. There are two classes of encryption algorithms for modern

    cryptography, i.e., symmetric-key cryptography and public-key cryptography. Insymmetric-key cryptography, the sender and the receiver share the same key to

    encrypt or decrypt a message. This algorithm leads to the difficulty in key

    management since the number of keys grows quickly with the increase of the

    communication groups. Public-key cryptography can solve the problem of key

    management by providing a public key and a private key. The two keys are

    mathematically related, but without the secret information, no one can get one key

    from the other. Typically, the public key is freely distributed and used to encrypt a

    message, while the private key is kept secret and used to decrypt a message.

    1.2Secret sharingA secret is something which is kept from the knowledge of any but the

    initiated or privileged. Secret sharing defines a method by which a secret can be

    distributed between the groups of participants, whereby each participant is

    allocated a piece of the secret. This piece of the secret is known as a share. The

    secret can only be reconstructed when a sufficient number of shares are combined

    together. While these shares are separate, no information about the secret can be

    accessed. That is, the shares are completely useless while they are separated.

    Within a secret sharing scheme, the secret is divided into a number of

    shares and distributed among n persons. When any k or more of these persons

    (where kn) bring their shares together, the secret can be recovered. However, if

    k 1 persons attempt to reconstruct the secret, they will fail. Due to this threshold

    scheme, we typically refer to such a secret sharing system as a (k, n)-threshold

    scheme or k-out-of-n secret sharing.

    In 1979, Adi Shamir published an article titled How to share a secret [1].

    In this article, the following example was used to describe a typical secret sharing

    problem:

    Eleven scientists are working on a secret project. They wish to lockup the

  • 7/30/2019 Project Complete Without Scaling

    11/84

    4

    documents in a cabinet so that the cabinet can be opened if and only if six or more

    of the scientists are present. What is the smallest number of locks needed? What is

    the smallest number of keys to the locks each scientist must carry?.The minimal solution uses 462 locks and 252 keys per scientist.

    In the paper [1], Shamir generalized the above problem and formulated the

    definition of (k, n)-threshold scheme. The definition can be explained as follows:

    Let D be the secret to be shared among n parties. A k-out-of-n threshold

    scheme is a way to divide D into n piecesD1, . . . , Dn that satisfies the following

    conditions:

    Knowledge of any kor moreDi pieces makesD easily computable, Knowledge of any k-1 or fewer Di pieces leaves D completely

    undetermined (in the sense that all its possible values are equally likely).

    1.3Visual CryptographyWe present one of these data security methods known as visual

    cryptography (VC). Specially, visual cryptography allows us to effectively and

    efficiently share secrets between the numbers of trusted parties. As with many

    cryptographic schemes, trust is the most difficult part.

    Visual cryptography is a new type of cryptographic scheme that focuses on

    solving the problem of secret sharing. Visual cryptography uses the idea of hiding

    secrets within images. These images are encoded into multiple shares and later

    decoded without any computation. This decoding is as simple as superimposing

    transparencies, which allows the secret to be recovered. Visual cryptography is a

    desirable scheme as it embodies both the idea of perfect secrecy (using a one time

    pad) and a very simple mechanism for decrypting/decoding the secret without the

    computer participation. The interesting feature about visual cryptography is that it

    is perfectly secure. There is a simple analogy from one time padding to visual

    cryptography. Considering the currently popular cryptography schemes, which are

    usually conditionally secure, this is the second critical advantage of visual

  • 7/30/2019 Project Complete Without Scaling

    12/84

    5

    cryptography.

    Based on the idea of threshold secret sharing, in 1994, Naor-Shamir [2]

    introduced Visual Cryptography, which is the secret sharing of digitized images. Itsolves the problem of encrypting images in a secure way so that the decryption

    process can be done by a person purely using his/her visual system without any

    computation. A k-out-of-n Visual Cryptography Scheme (VCS) splits an image

    into n secret shares which are then printed on transparencies. These shares when

    separated will reveal no information about the original image (other than the size

    of it). The image can only be recovered by superimposing kor more shares. This

    recovery process does not involve any computation. It makes use of the human

    vision system to perform the pixel-wise OR logical operation on the superimposed

    pixels of the shares. When the pixels are small enough and packed in high density,

    the human vision system will average out the colors of surrounding pixels and

    produce a smoothed mental image in a humans mind.

    Early VCSs [2-7] mainly focused on black-and-white or gray-scale secret

    images. Additionally, pixel expansion is common to most of the previous work.This means that the size of each secret share is several times larger than that of the

    original image and the resulting superimposed image is also several times larger

    than the original secret image.

    In this project, we proposed a new VCS scheme for color images. In our

    constructions of color visual cryptography scheme (CVCS), we utilize a

    probabilistic technique for achieving no pixel expansion. Our CVCS scheme

    supporting the three desirable properties which are summarized as follows:

    1. Supporting images of arbitrary number of colors;2. No pixel expansion;3. Supporting k-out-of-n threshold setting.1.4Summary

    In this chapter, first we have described about cryptography, secret sharing

    and then we have described the visual cryptography which is the branch of

  • 7/30/2019 Project Complete Without Scaling

    13/84

    6

    cryptography and the technique of secret sharing. On visual cryptography, we have

    proposed a new probabilistic k-out-of-n scheme based on color images.

    The rest of the project report is organized as follows. In chapter 2, we willreview the literature and related results in visual cryptography scheme. In chapter

    3, we will propose new k-out-of-n colored VCS. In chapter 4, we will compare our

    scheme with the others schemes. In chapter 5, we will give the brief introduction

    about the applications of visual cryptography. In chapter 6, we will give

    conclusion and future work of our scheme.

  • 7/30/2019 Project Complete Without Scaling

    14/84

    7

    Chapter 2

    RELATED WORK

  • 7/30/2019 Project Complete Without Scaling

    15/84

    8

    2.Related WorkIn this chapter, we briefly review the literature on black-and-white VCS

    schemes, gray-scale VCS and colored VCS schemes. By reviewing these schemes,

    we find several commonly desirable properties which should be supported by VCS

    schemes.

    2.1Visual cryptography scheme for black and white imagesNaor-Shamir [2] first introduced the concept of VCS and proposed a

    general k-out-of-n threshold VCS for black-and-white images. Their scheme acts

    as the building block of other VCS schemes. In this section, we will give basic

    model of 2-out-of-2, 3-out-of-n, k-out-of-k and k-out-of-n threshold VCS, some

    results obtained by implementation of their basic model and also summarize the

    features of several other black-and-white VCS schemes proposed after Naor-

    Shamirs and show their merits and demerits.

    2.1.1 Naor-Shamir Black-and-White VCSIn [2], Naor-Shamir introduced visual cryptography in which written

    material (printed text, handwritten notes, etc.) can be encrypted in a secure way so

    that the decryption process only needs the human visual system without any

    computation.

    In visual secret sharing (VSS) schemes, problem message considered as a

    collection of black-and-white pixels and each pixel is handled separately. Each

    original pixel appears in n modified shares, one for each transparency. Each share

    is a collection of m black and white sub-pixels. The resulting structure can be

    described as n m Boolean matrix, S= [sij], where sij= 1 iff thejth

    sub-pixel in the

    ith

    transparency is black. When transparencies i1, i2 . . . ir are stacked together, a

    combined share whose black sub-pixels are represented by the Boolean OR of

    rows i1, i2 . . . ir are in S. The gray level of the combined share is proportional to

    the Hamming weight H(V) of the OR-ed m-vector V and visual system

  • 7/30/2019 Project Complete Without Scaling

    16/84

    9

    interpreted it as black ifH(V) dand as white ifH(V) < d m for some fixed

    threshold 1 dm and relative difference > 0. The formal definition ofk-out-

    of-n visual secret sharing scheme is described as follows:Definition 1: A solution to the k-out-of-n visual secret sharing scheme

    consists of two collections ofn m Boolean matrices C0 and C1. To share a white

    pixel, the associate randomly chooses one of the matrices in C0 and to share a

    black pixel, the associate randomly chooses one of the matrices in C1. The chosen

    matrix defines the color of the m sub-pixels in each one of the n transparencies.

    The solution is considered valid if the following three conditions are met:

    For Contrast:

    1. For any Sin C0, the OR Vof any kof the n rows satisfiesH(V) d m.2. For any Sin C1, the OR Vof any kof the n rows satisfiesH(V) d.

    For Security:

    3. For any subset {i1, i2 . . . iq} of {1, 2,...., n} with q < k, the two collections ofq m matricesDt for t

    {0, 1} obtained by restricting each n m matrix in

    Ct (where t {0, 1}) to rows i1, i2 . . . iq are indistinguishable in the sensethat they contain the same matrices with the same frequencies.

    2.1.1.1 Preliminary Notationn, Group Sizek, Thresholdm, the number of pixels in a share. This parameter represents the loss in

    resolution from the original image to the recovered one.

    , the relative difference in the weight between the combined shares thatcome from a white pixel and a black pixel in the original image. This

    parameter represents the loss in contrast.

    , the size of the collection ofC0 and C1. C0, Collection ofn m Boolean matrices for shares of white pixel. C1, Collection ofn m Boolean matrices for shares of black pixel.

  • 7/30/2019 Project Complete Without Scaling

    17/84

    10

    V, OR-ed krowsH(V), Hamming weight (H) of a string is the number of symbols that are

    different from the zero symbol.

    d, number in [1, m]r, Size of collections C0 and C1.

    2.1.1.2 Two-out-of-two schemeThe original problem of visual cryptography is the special case of a 2-out-

    of-2 visual secret sharing problem. The 2-out-of-2 VSS problem is solved by the

    following collection of 2 2 matrices:

    C0= {all the matrices obtained by permuting the columns of0 01 1 0 10 1 0 11 0}C1= {all the matrices obtained by permuting the columns of1 10 0 1 01 0 1 00 1}

    The decryption process through human vision system is described in the

    following Figure 2.1:

    Figure 2.1 Construction of 2-out-of-2 scheme

    When using the black and white image in Figure 2.2(a) as secret image, the

    experimental results are shown in the following figures. The two shadow images

    are shown in the Figure 2.2(b, c) and their reconstructed image using OR operationis shown in the Figure 2.2(d):

  • 7/30/2019 Project Complete Without Scaling

    18/84

    11

    (a).Original Image (b) Share 1

    (c) Share 2 (d) 1+2 using OR

    Figure 2.2

    2.1.1.3 Three-out-of-three schemeThe 3-out-of-3 VSS problem is solved by the following collection of 3 4

    matrices:

    C0 = {all the matrices obtained by permuting the columns of0 0 1 10 1 0 10 1 1 0}C1 = {all the matrices obtained by permuting the columns of1 1 0 01 0 1 0

    1 0 0 1}

    Each matrix in either C0 or C1 contains one horizontal share, one vertical

    share and one diagonal share. Each share contains a random selection of two black

    sub-pixels, and any pair of shares from one of the matrices. By stacking all the

    three transparencies from C0 and C1 we can observe C0 is only 34 black whereas a

    C1 is completely black. When using the black and white image of Figure 2.2(a) as

    a secret image, the experimental results are shown in the following figures. The

    three shadow images are shown in the Figure 2.3(a, b, c) and their reconstructed

    image using OR operation is shown in the Figure 2.3(d, e). Stacking any k-1 i.e. 2

  • 7/30/2019 Project Complete Without Scaling

    19/84

    12

    shadow images does not reveal any information as shown in Figure 2.3(d).

    (a) Share 1 (b) Share 2 (c) Share 3

    (d) 1+2 using OR (e) 1+2+3 using OR

    Figure 2.3

    The above 3-out-of-3 VSS scheme can be generalized to 3-out-of-n for anarbitrary n 3. LetB be the blackn (n2) matrix which contains only 1's and let

    Ibe an identity n n matrix which contains 1's on the diagonal and 0's elsewhere,

    then BI (concatenation ofB and I) denote n (2n2) Based upon the following

    properties we can design the matrix for 3(k)-out-of-5(n) scheme.

    Here, black matrix B = n (n2) = 5 (52) = 5 3; an identity n n

    matrix which contains 1's on the diagonal and 0's elsewhere,I= n n = 5 5. Two

    collections of n m Boolean matrices C0 and C1 are obtained by permuting the

    columns ofc(BI) andBI, m = 2n 2 = 2(5) 2 = 8. i.e., 5 8 Boolean matrices.

    Share 1

    Share 2

    c(BI) = Share 3

    Share 4

    Share 5

    0 0 0 0 1 1 1 1

    0 0 0 1 0 1 1 1

    0 0 0 1 1 0 1 1

    0 0 0 1 1 1 0 1

    0 0 0 1 1 1 1 0

  • 7/30/2019 Project Complete Without Scaling

    20/84

    13

    Hamming weight ofc(BI) for white is:H(V) = 5

    Share 1

    Share 2

    BI= Share 3

    Share 4

    Share 5

    Hamming weight ofBIfor black is:H(V) = 8

    C0 = {all the matrices obtained by permuting the columns ofc (BI)}

    C1 = {all the matrices obtained by permuting the columns ofBI}

    If the columns are not permuted then there is a possibility to reveal the

    secret information in any single share and therefore the process fails. When using

    Figure 2.2 (a) as a secret image, the experimental results shown in the following

    figure. The five shadow images are shown in the Figure 2.4 (a, b, c, d & e) and

    their reconstructed image using OR operation is shown in the Figure 2.4(h, i).

    Stacking any k-1 i.e. 2 shadow images does not reveal any information as shown in

    Figure 2.4(f, g).

    (a) Share 1 (b) Share 2

    (c) Share 3 (d) Share 4

    1 1 1 1 0 0 0 0

    1 1 1 0 1 0 0 0

    1 1 1 0 0 1 0 0

    1 1 1 0 0 0 1 0

    1 1 1 0 0 0 0 1

  • 7/30/2019 Project Complete Without Scaling

    21/84

    14

    (e) Share 5 (f) 1+2 using OR

    (g) 3+4 using OR (h)1+2+3 using OR

    (i) 2+3+4 using OR

    Figure 2.4

    In above example each pixel is divided into 8 sub-pixels which is not a

    perfect square which distorts the aspect ratio of the image. So, to avoid distorting

    the image, the dummy sub-pixels are added to keep the aspect ratio unchanged. In

    the 3-out-of-5 scheme any single share contains 4 black and 4 white pixels. To

    make it a complete square array without distorting their aspect ratio, we need to

    add one more pixel; it should be either black or white.

    2.1.1.4 A Generalk-out-of-k schemeFor all k there exists a general construction of k-out-of-k visual secret

    sharing scheme, the pixel expansion must use at least 2k-1

    pixels, and the relative

    contrast should be 1/(2k-1

    ). There is a need to construct two collections of k 2n-1

    Boolean matrices i.e., S0 and S1.

  • 7/30/2019 Project Complete Without Scaling

    22/84

    15

    1. S0 handles the white pixels.2. S1 handles the black pixels.

    All 2k-1

    column have an even number of1s in S0 and odd number of1's in

    S1 and no two krows are same in both S0 & S1. C0 and C1 contain all permutations

    of columns in S0 and S1.

    2.1.1.5 A Generalk-out-of-n SchemeA general k-out-of-n scheme is designed from k-out-of-kscheme. Let Cbe

    k-out-of-k visual secret sharing scheme with parameters m, r, . The scheme C

    consists of two collections ofk m Boolean matrices and C0 = T0

    1, T0

    2, . . . . , T0

    rand C1 = T

    11, T

    12, . . . . , T

    1r.His a collection ofl functions hH, :1

    {1 k}. Let B be the subset of {1 n} of size k and q is probability that

    randomly chosen function yields q different values onB, 1 qk.We construct from CandHbe a k-out-of-n scheme C with parameters

    m = m.l k, r = rl

    1. The ground set is V= UH2. Each 1 trl is indexed by a vector (t1, t2, , tl) where 1 tr.3. The matrix Sbtfor t= (t1, t2, , tl) where b {0,1} is defined as

    Sbt[i, (j, h)] = T

    btj [h(i), j]

    Contrast: Contrast should be k:

    1. krows is, Sbtmapped to q < kdifferent values by h.2. Hamming weight of OR ofq rows isf(q)3. Difference is m white and black pixels occur when h is one and happens

    at k.

    4. White: !"! $%&5. Black: ' ( ) $%!"! *Security: Security properties of the k-out-of-kscheme imply the security ofk-

    out-of-n scheme because we are using (k, k) scheme to create (k, n) scheme. The

  • 7/30/2019 Project Complete Without Scaling

    23/84

    16

    expected hamming weight of OR ofq rows, q < kis irrespective of white or

    black pixel.

    The above constructions are provably secure and the pixel expansion rate isgetting larger when the values of kand n grow. Moreover, the scheme does not

    support images of arbitrary number of colors.

    2.1.2 Other Black-and-White VCS SchemesSince the introduction of VCS, there have been many other schemes proposed

    [3-4]. In 2003, by removing the same column which appears in both basic

    matrices, Blundo et al. [3] proposed VCS schemes with optimal contrast in (n 1)-out-of-n (where n > 3) and 3-out-of-n schemes. They also conjectured that the k-

    out-of-n scheme, where k=4 or 5, had an optimal contrast. In [4], Yang proposed

    another one which achieved no pixel expansion by using the frequency of white

    pixels to show the contrast of the recovered image. Yangs scheme can be easily

    implemented on the black-and-white VCS with pixel expansion. We will describe

    the Yangs approach in section 3.2 (a) and also distinguish his approach from

    conventional approach. All the above schemes only support black-and-white

    images.

    2.2VCS Schemes for Gray-scale ImagesDue to the limitations on applicability of the black-and-white VCS

    schemes, in 1997, Verheul-Tilborg [5] proposed the k-out-of-n VCS for gray-scale

    images. In this section, we give a review on their scheme and also figures several

    problems about it.

    2.2.1 Some Gray-Scale VCS SchemesIn 1997, Verheul-Tilborg [5] introduced a general method for k-out-of-n

    VCS for gray-scale images. For an image of c gray levels, cn q matrices are

    constructed to represent the secret sharing process for each gray level. The

    elements of these matrices are in {0, 1, , c 1}. And they use i (i

    {0, 1, ,

    c1}) to represent the gray level. The superimposed color is i if all the

  • 7/30/2019 Project Complete Without Scaling

    24/84

    17

    corresponding sub-pixels of all shares are i, otherwise the superimposed color is

    black. To encrypt a pixel with the gray level i (where 0 ic 1), they choose

    the matrix which represents the gray level i. The n rows of the matrix correspondto the n shares and the q columns correspond to the gray levels of the q sub-pixels

    of each share. In this scheme, the pixel expansion rate has to be at least c(k1)

    . The

    scheme was restricted to small k and n as large values resulted in exponential

    image size and high computation cost.

    Lin and Tsai [6] proposed another VCS scheme for gray-scale images by

    applying dithering techniques in 2003. The gray-scale image is first converted into

    a binary image with the same size by dithering and then Naor-Shamirs VCS for

    black-and-white images is employed. This scheme improved the pixel expansion

    of Verheul-Tilborgs VCS so that the pixel expansion rate is the same as Naor-

    and-Shamirs black-and-white VCS. Furthermore, only two collections of matrices

    are needed for any number of gray levels. In dithering technique, we can use

    various halftone techniques such as Floyd and Jarvis halftoning method to

    implement the algorithm of Lin and Tsai for gray-scale image. Halftone

    technology is discussed briefly in section 3.2 (b).

    When using the Figure 2.5 (a) as a secret image, the experimental results

    shown in the following figures. Halftone image of Figure 2.5 (a) is shown in the

    Figure 2.5 (b). The two shadow images are shown in the Figure 2.6 (a, b) and their

    reconstructed image using OR operation is shown in the Figure 2.6 (c):

    (a) Original image (b) Halftone image

    Figure 2.5

  • 7/30/2019 Project Complete Without Scaling

    25/84

    18

    (a) Share 1 (b) Share 2 (c) 1+2 using OR

    Figure 2.6

    2.2.2 Chen et al. Gray-Scale VCS with No Pixel ExpansionIn 2007, Chen et al. [7] extended the results of [4] to gray-scale images and

    proposed a gray-scale VCS. Chen et al.s VCS maps a block in a secret image to

    one corresponding equal-sized block in each share image without image size

    expansion. For a secret block, this method generates the corresponding share

    blocks containing multiple levels rather than two levels based on the density of

    black pixels on the block. It uses two types of techniques, namely, histogram

    width-equalization and histogram depth-equalization.

    Chen et al.s VCS scheme can reach the goal of no pixel expansion.

    However, their scheme does not support colored images and only supports k-out-

    of-kthreshold setting.

    Besides, before secret sharing, it needs to do preprocessing on the original

    images (block averaging). The details of the algorithm are as follows:

    In the k-out-of-k scheme where each secret block contains s pixels, the

    algorithm BASIS MATRIX (k, s, and l) is designed to randomly generate a

    Boolean Basis Matrix for a secret block. Here, s is the block size and l (0 l s/2)

    is the gray-scale intensity level.

    Algorithm: BASIS MATRIX(k, s, l)

    1. Randomly select s/2 + l positionsp1,p2 ,. . . ,ps/2+l from the s positions.2. For i = 1 to k-1, randomly select s/2 positions fromp1,p2 ,. . . ,ps/2+l; LetRi

    be a variable consisting of s bits and set the bits located at the s/2 selected

  • 7/30/2019 Project Complete Without Scaling

    26/84

    19

    positions in Ri as 1-bits and others as 0-bits.

    3. R =R1 orRi or . . . orRk1;4. Let p1, p2 ,. . . , ph be the positions of all the 0-bits which are located at

    positionsp1,p2 ,. . . ,ps/2+l inR.

    5. Set the bits located at p1, p2 ,. . . , ph ofRk as 1-bits; Set the s/2-h bits byrandomly selecting from the bits located at p1,p2 ,. . . ,ps/2+l fromRk, except

    the positions p1, p2 ,. . . , ph , as 1-bits, and set the other bits as 0-bits.

    Regard each member ofR1,R2, . . . ,Rkas one row of the basic matrix.

    This algorithm adopts block-to-block mapping as a key measure in itsimplementation. It makes significant progress in the aspect of pixel expansion

    since it is the first scheme which achieves no pixel expansion. However, the

    authors did not provide a general solution for the k-out-of-n scheme. And there

    was no solution for colored images in their scheme as well. Besides, it needs to

    preprocess the original image before doing secret sharing (block averaging). This

    process reduces the quality of reconstructed image.

    2.3VCS Schemes for Color ImagesThe requirement of encrypting natural image makes researchers focus on

    the VCS schemes for color images. In [8], Hou firstly proposed three methods for

    encrypting color images. In this section, we describe Hous scheme in detail and

    review Yang-Chen colored VCS [9] for its no pixel expansion property. Moreover,

    we discuss some other colored VCS schemes proposed recently to show the

    development of colored VCS.

    2.3.1 Hou Colored VCS SchemesFor color VCS schemes, [8-14], Hous schemes [8] are believed to be the

    first set of color VCS schemes. In his paper, he proposed three methods for gray-

    scale and color images based on the previous studies in black-and-white visual

    cryptography, halftone technology, and color decomposition method. His methods

    have the backward compatibility with the previous results in black-and-white

  • 7/30/2019 Project Complete Without Scaling

    27/84

    20

    visual cryptography and can be easily applied to gray-scale and color images.

    Subtractive model is used in all the methods.

    Hous Method 1: The first method produces four shares, namely black mask,C(Cyan) share,M(Magenta) share and Y(Yellow) share. By superimposing these

    shares, it shows the best reconstructed quality among Hous three methods.

    Algorithm for the first methods is given below:

    Algorithm of color visual cryptographymethod1

    1. Transform the color image into three halftone images: C,M, and Y.2. For each pixel P

    ijwith color components (C

    ij, M

    ijor Y

    ij) of the composed

    image P, do the following:

    a) Select a black mask with a size of 22, and assign a black pixelrandomly to two of these four positions and leave the rest positions

    blank (transparent or white). This step will make the black mask a

    half black-and-white block.

    b) After selecting a mask, determine the positions of the cyan pixels inthe block of the corresponding sharing images. This is done

    according to the positions of the black pixels in the mask and the

    value ofCij .

    If Cij = 1 (the cyan component will be revealed), fill the

    positions corresponding to the positions of the white pixels in the

    mask with a cyan pixel and leave the rest positions blank.

    IfCij = 0 (the cyan component will be hidden), fill the colors

    in the opposite way. i.e., fill the positions corresponding to the

    positions of the black pixels in the mask with a cyan pixel and leave

    the rest positions blank.

    Finally, add the block to the corresponding position of Share 1.

    c) In accord with (b), determine the positions of magenta pixels of theblock in Share 2 with the value ofMij and those in Share 3 with the

    value ofYij.

  • 7/30/2019 Project Complete Without Scaling

    28/84

    21

    3. Repeat Step 2 until every pixel of the composed image is decomposed,hence obtaining four transparencies (cyan, magenta, yellow and black) of

    visual cryptography to share the secret image.4. After stacking the four sharing images, the secret image can be decrypted

    by human eyes.

    Figure 2.6 summarizes this method by giving an example in which a random

    block of the black mask is chosen and shown in the first column. The second

    column shows the eight possible combinations of the original (dithered) C,M, and

    Ypixel values. The following three columns show the encoding of the blocks in

    the corresponding shares of C, M, and Y. The last column illustrates the

    superimposed image ofC,M, and Yshares with the black mask.

    Figure 2.7: Scheme 1 of Hou Colored VCS Schemes

    When using the Figure 2.8 (a) as a secret image, the experimental results for

    Hous first method are shown in the following figures. Four shadow images are

    shown in Figure 2.8 (b, c, d, e) and the reconstructed image using OR operation is

    shown in Figure 2.8 (f)

    (a) Original image (b) Cyan share (c) Magenta share

  • 7/30/2019 Project Complete Without Scaling

    29/84

    22

    (d) Yellow share (e) Black mask (f) Stacked image using OR

    Figure 2.8Hous Method 2: The second method expands every pixel of a halftone image

    into a 22 block on two sharing images and fills the block with cyan, magenta,yellow and transparent, respectively. Using these four colors, two stacked images

    can generate various colors through different permutations. Algorithm for this

    method is given below:

    Algorithm of color visual cryptographymethod2

    1. Transform the color image into three halftone images: C,M, and Y.2. For each pixel Pij of the composed image, do the following:

    a) Expand a 22 block in Share 1 and fill the block with cyan,magenta, yellow, and transparent randomly.

    b) Generate a 22 block in Share 2 according to the permutation of thefour colors of the block in Share 1 and the values ofCij,Mij, Yij , and

    determine the color distribution of the corresponding block in Share

    2 as illustrated in Figure 2.9. Take a pixel with Pij = (1, 1, 0) for

    example. When deciding the clockwise permutation of the block in

    Share 1 to be cyan magenta white yellow, swap the

    positions of cyan and magenta and form the permutation of the

    corresponding block in Share 2 as magenta cyan white

    yellow. The stacked result will be a blue-like block, just as the pixel

    (1, 1, 0) should be on the secret image.

  • 7/30/2019 Project Complete Without Scaling

    30/84

    23

    3. Repeat Step 2 until every pixel of the composed image is decomposed,hence obtaining two visual cryptography transparencies to share the secret

    image.4. After stacking the two sharing images, the secret image can be decrypted by

    human eyes.

    Figure 2.9: Scheme 2 of Hou Colored VCS Schemes

    When using the Figure 2.8 (a) as a secret image, the experimental results for

    Hous second method are shown in the following figures. The two shadow images

    are shown in Figure 2.10 (a, b) and the reconstructed image using OR operation is

    shown in Figure 2.10 (c):

    (a) Share 1 (b) Share 2 (c) 1+2 using OR

    Figure 2.10

    Hous Method 3: This method needs two sharing images and does not

    sacrifice too much contrast for color visual cryptography. It transforms a color

  • 7/30/2019 Project Complete Without Scaling

    31/84

    24

    secret image into three halftone images C, M, and Yand generates six temporary

    sharing images C1, C2,M1,M2, Y1, and Y2. Each of these sharing images will have

    two white pixels and two color pixels in every 22 block. The method thencombines C1,M1, and Y1 to form a colored halftone Share 1 and C2,M2, Y2 to form

    Share 2. Algorithm for this method is given below:

    Algorithm ofvisualcryptographymethod 3

    1. Transform the color image into three halftone images: C,M, and Y.2. For each pixel Pij of the composed image, do the following:

    a) According to the traditional method of black-and-white visualcryptography, expand Cij, Mij and Yij into six 22 blocks, C1ij, C2ij,

    M1ij,M2ij and Y1ij, Y2ij.

    b) Combine the blocks C1ij; M1ij and Y1ij and fill the combined blockcorresponding to Pij in Share 1.

    c) Combine the blocks C2ij; M2ij and Y2ij and fill the combined blockcorresponding to Pij in Share 2.

    3. Repeat Step 2 until every pixel of the composed image is decomposed,hence obtaining two visual cryptography transparencies to share the secret

    image.

    4. After stacking the two sharing images, the secret image can be decrypted byhuman eyes.

    Figure 2.11: Color pixel decomposition and reconstruction

  • 7/30/2019 Project Complete Without Scaling

    32/84

    25

    When using the Figure 2.8 (a) as a secret image, the experimental results for

    Hous third method are shown in the following figures. The two shadow images

    are shown in Figure 2.12 (a, b) and the reconstructed image using OR operation isshown in Figure 2.12 (c).

    (a) Share 1 (b) Share 2 (c) 1+2 using OR

    Figure 2.12

    Hous three methods for encrypting colored images are considered to be the

    first colored schemes. Since Hou did not provide any security analysis on these

    methods, we can not guarantee the security of them. The first method has been

    proved to be insecure recently by Leung et al. [10]. The second one is secure,

    whereas the quality of reconstructed image is not satisfying. The third one is

    considered to be secure with better quality of reconstructed image.

    However, the three methods have several common drawbacks. First, the pixel

    expansion rates of these methods are all 4 which make the reconstructed image

    four times larger than the original one. Second, they have limitation on the color

    levels of original images, so dithering is needed before secret sharing. Third, no

    general k-out-of-n solution was proposed, since the first method is for 4-out-of-4

    and the last two are for 2-out-of-2. Finally, no security analysis for these methods

    was provided.

    2.3.2 Yang-Chen Colored VCSIn all the previous methods, a secret pixel is represented by several color

    sub-pixels and the number of these sub-pixels is referred to as the pixel expansion.

  • 7/30/2019 Project Complete Without Scaling

    33/84

    26

    Generally, they require a larger pixel expansion to produce more colors. In [9],

    Yang and Chen use additive color mixing in a probabilistic way so that the pixel

    expansion is fixed on 3 regardless of the number of colors in the reconstructedimages. They use the appearance frequencies ofR, G and B to simulate a secret

    color. The drawback of the scheme is that to improve the color contrast of the

    reconstructed images, the only way is to modify the original images. The details of

    the scheme are discussed in the following.

    A secret pixel is divided into three colored sub-pixels (R, G, B) where the

    first R-colored sub-pixel has the appearance probability piR , i.e., this sub-pixel

    may be R color with probability piR and NULL color with probability (1-piR).

    Accordingly, the other two sub-pixels (G-color and B-color) have the appearance

    probabilitiespj

    G andpkB, respectively.

    Step 1: Calculate LR, LG and LB which represent the number of colors on the

    three primary colors of the original image respectively.

    Step 2: Construct the primary color sets: CiR (R-colored sets), C

    jG (G-colored

    sets) and Ck

    B (B-colored sets). Suppose the basic matrices of black-and-white

    scheme are n l Boolean matrices, then the primary color sets are n l LX

    matrices (XR, G,B).CR

    (255r) / (LR

    -1)= CW+ +CW+ CB+ +CB1R;0N

    LR

    -1-r r

    Where, r [0,LR 1] andLR is the number of colors on the primary color red. andCW and CB are the basic matrices of black-and-white scheme. The constructions ofC

    jG (G-colored sets) and C

    kB are similar with C

    iB .

    Step 3: Scan each pixel of the original image and apply the corresponding

    matrices in Step 2 by randomly choosing a column of each of the three Basis

    Matrices. Consider this column as an n-bit vector. For the first bit, assign the

    corresponding pixel black color (i.e. 0 color intensity) if the bit is 1, otherwise we

    assign it X(X {R, G, B}) color (i.e. 255 color intensity). Continue this process

  • 7/30/2019 Project Complete Without Scaling

    34/84

    27

    until the corresponding color in each of the n shares is assigned a color value.

    There are 3 sub-pixels for each pixel in the original image so the pixel expansion is

    3.It is quite a new idea for its using probabilistic method to make sure the pixel

    expansion maintains 3. And it doesnt limit the number of colors in the original

    image. Besides, they provided a general k-out-of-n scheme. It can deal with

    colored image and is provably secure. The quality of the reconstructed image is

    good when the size of the original image is large. However, it still needs

    preprocessing, since the only way of improving the color contrast is to modify the

    number of colors in the original image.

    2.3.3 Other Colored VCS SchemesLukac-Plataniotis [11] proposed a colored VCS scheme in 2005, which only

    supports 2-out-of-2 threshold setting and has pixel expansion. Shyu [12] proposed

    a colored VCS scheme in 2006. Shyus scheme applies any k-out-of-n black-and-

    white VCS on decomposed images of the original secret image so that it supports

    the general k-out-of-n threshold setting. The scheme has less pixel expansion

    compared with previous ones while it has relatively good quality of superimposed

    image. Hou and Tus colored VCS [13] supports k-out-of-n threshold setting with

    no pixel expansion. Dithering is required for preprocessing the original image

    before secret sharing and the number of colors supported is fixed on 8. Cimato et

    al.s scheme [14], at the cost of large pixel expansion, solves the problem that

    superimposing many pixels of the same color results in a dark version of the color.

    2.4SummaryIn this chapter, we have reviewed the literature of visual cryptography

    schemes of black and white images, gray-scale images, color images and various

    experimental results related to it. These schemes give the strong foundation for our

    proposed scheme for color images which we will consider in the next chapter.

  • 7/30/2019 Project Complete Without Scaling

    35/84

    28

    Chapter 3

    A NEWK-OUT-OF-NCOLORED VSS SCHEME

  • 7/30/2019 Project Complete Without Scaling

    36/84

    29

    3.A Newk-out-of-n Colored Visual Secret Sharing SchemeIn this chapter, we propose new scheme to construct the visual secret shares.

    Our scheme uses a different approach, the probabilistic method. The major

    difference between schemes is that our scheme uses pixel operation and the

    conventional scheme uses sub-pixel operation.

    First, we give the basic principle of color, notations used in the context and

    then we give the proposed probabilistic VSS (ProbVSS) scheme for colored

    images, their various constructions, theorems and their proofs.

    3.1Basic Principle of ColorThe additive (ACM) and subtractive models (SCM) in the Figure 3.1 (a, b)

    are commonly used to describe the constitutions of colors [15, 16]. In the additive

    system, the primaries are red, green and blue (RGB), with desired colors being

    obtained by mixing different RGB components. By controlling the intensity of red

    (green or blue) component, we can modulate the amount of red (green or blue) in

    the compound light. The more the mixed colored-lights, the more is the brightness

    of the light. When mixing all red, green and blue components with equal intensity,

    white color will result. The computer monitor is a good example of the additive

    color model.

    In the subtractive color model, color is represented by applying the

    combinations of colored-lights reflected from the surface of an object (becausemost objects do not radiate by themselves). Take an apple under the natural light

    for example. The surface of the apple absorbs green and blue part of the natural

    light and reflects the red light to human eyes, so it becomes a red apple. By mixing

    cyan (C) with magenta (M) and yellow (Y) pigments, we can produce a wide range

    of colors. The more the pigment we add, the lower is the intensity of the light, and

    thus the darker is the light. So, it is called the subtractive color model. C,Mand Y

  • 7/30/2019 Project Complete Without Scaling

    37/84

    30

    are the three primitive colors of pigment, which cannot be composed from other

    colors. The color printer is a typical application of the subtractive model.

    In computer systems, Application Interfaces (APIs) provided by most imageprocessing software as well as the Windows operating system are based on the

    RGB model. This is mainly because they use monitors as the primary output

    media. Monitors themselves generate color images by sending out RGB light into

    humans retina. In true color systems, R, G, andB are each represented by 8 bits,

    and therefore each single color ofR, G, and B can represent 0255 variations of

    scale, resulting in 16.77 million possible colors. When using (R, G,B) to describe

    a color pixel (0, 0, 0) represents full black and (255, 255, 255) represents full

    white.

    (a) Additive model (ACM) (b) Subtractive model (SCM)

    Figure 3.1

    The previous CVSSs can be categorized into the following three cases:

    (Cases A, B and C). The principle means of color mixing for CVSSs has been

    either to use SCM (Cases A and B) or a combination of SCM and ACM (Case

    C).These three color mixing methods are briefly described as follows:

    (Case A) The stacked sub pixel in a reconstructed image may be the color

    of the sub pixel or a black color. Verheul-Tilborg's scheme [5], Yang-Laih's

    scheme [17]and Cimato et al.'s scheme [14]used the color of the sub-pixel except

    for a black color to directly show the color of a secret pixel. These schemes

    covered the unexpected colors by the black color.

  • 7/30/2019 Project Complete Without Scaling

    38/84

    31

    (Case B) The remaining color in a reconstructed image for Koga-

    Yamamoto's scheme [18] is not only the color of the sub pixel but also their

    mixture. In these schemes, the authors believed that the unexpected mixed colorswill be ignored by human vision.

    (Case C) This is similar to Case B using SCM except for that the simulated

    color in the reconstructed image is the optical mixture of colors according to ACM

    using the technique of juxtaposition color mixture. Hou's scheme [8], Ishihara-

    Koga's scheme [19]and Shyu's scheme [12]belong to this type.

    All three types require SCM mixing for stacking sub pixels in different

    shadows. Cases A and B use only SCM, while Case C first obtains the color of the

    sub pixel using SCM and then decodes the secret color by the juxtaposition color

    mixture with the help of HVS.

    In the proposed probabilistic color visual secret sharing scheme, we have

    used the ACM directly. The secret color is encrypted by using ACM in a

    probabilistic way. The operation for the ACM color mixing model is formally

    defined as follows:

    Definition 1: For the ACM color mixing model, each mixed color M is

    produced by a light mixing functionL () shown as follows:

    M=L (Rl, Gm, Bn), (3.1)

    WhereRl, Gm, Bn areR, G andB primary colors with the luminance level l, m and

    n belongs to[0, 255], respectively. There are totally (LRLGLB)colors that can

    be produced, whereLR,LG andLB are luminance levels ofR, G andB.

    3.2The Proposed Probabilistic VSS Scheme for Color ImagesWe have used the probabilistic strategy in our proposed scheme. A

    probabilistic VCS uses different frequencies of whiteness in black and white areas

    to distinguish the color. Finally, the secret image can be reconstructed while the

    edge is blurred. The probabilistic VCS have no pixel expansion, i.e. the shadow

    size is the same as the secret image.

  • 7/30/2019 Project Complete Without Scaling

    39/84

    32

    In our proposed VSS scheme for color images, we have extended the

    Yangs [4] approach for black and white images and Y.C. Hous approach for

    color images. Although Yang had extended their work with Chen and given theconstructions for color images, but they did not achieved the no pixel expansion

    and they talked about the color levels mixing. Our VSS scheme is supporting the

    three desirable properties which are summarized as follows:

    1) Supporting images of arbitrary number of colors;2) No pixel expansion;3) Supporting k-out-of-n threshold setting.

    Our proposed ProbVSS scheme consists of the following steps:

    a) Construction of matrices.b) Creation of halftone images.c) Creating the shares.

    a) Construction of matrices :For constructing the two set of matrices, we use Yangs probabilistic

    method with no expansible shadow size. Instead of expanding the pixel into m sub

    pixels, he only uses one pixel to represent one pixel.

    Conventional VSS Probabilistic VSS

    x0By0W White pixel xByW A black or white pixel

    x1By1W Black pixel

    Where,

    x0+y0= x1+y1=m x+y=1, sox=0,y=1 ORx=1,y=0

    i.e. m=1

    So, in conventional VSS for different values ofxi, yi and m will cause

    different contrast and shadow extension but in probabilistic VSS there will no

    pixel expansion. As a replacement for using n m Boolean matrix, here we define

    n 1 matrix, S= [si]

    Where, si=1, if the pixel in the ith

    shadow is black pixel,

  • 7/30/2019 Project Complete Without Scaling

    40/84

    33

    si=0, if the pixel in the ith

    shadow is white pixel.

    When shadows i1, i2 . . . ir are stacked, we can represent it by OR-ed

    operation of rows i1, i2 . . . ir in S. The black or white level of this combined pixelL(V) is determined by the OR-ed operation of this r-tuple column vector V,

    i.e. L (V) = si1 + si2 + ..+ sir,

    Where + denotes OR-ed operation.

    This method is to use the frequency of white pixels in the black and white

    areas of the recovered image for interpreting black and white pixels by human

    visual system. Define p0 (resp.p1) as the appearance probability of white pixel in

    the white (resp. black) area of the recovered image. For the fixed threshold

    probabilityp0pTH 1 and relative contrast > 0, ifp0pTHandp1pTH , the

    frequency of white pixels in the white area of the recovered image will be higher

    than that in the black area. So, the human visual system can distinguish with high

    probability between black and white areas.

    Next, we use Definition 2 to show the formal required conditions of this

    probabilistic VSS scheme. Here the term probabilistic to point out that our

    visual system distinguishes the contrast of the recovered image based on the

    difference of the frequency of white color in black and white areas.

    Definition 2: A (k, n) ProbVSS scheme can be shown as two sets, white set C0

    and black set C1, consisting of n and n , n 1 matrices, respectively. When

    sharing a white (resp. black) pixel, the dealer first randomly chooses one n 1

    column matrix in C0

    (resp. C1), and then randomly selects one row of this column

    matrix to a relative shadow. The chosen matrix defines the color level of pixel in

    every one of the n shadows. A ProbVSS Scheme is considered valid if the

    following conditions are met:

    1. For these n (resp. n) matrices in the set C0(resp. C1), the OR-ed valueof any k-tuple column vector VisL (V).These values of all matrices form a

    set (resp.).

  • 7/30/2019 Project Complete Without Scaling

    41/84

    34

    2. The two sets and satisfy that p0pTH and p1pTH-, wherep0 andp1 arethe appearance probabilities of the 0 (white color) in the set and ,

    respectively.3. For any subset {i1, i2,., iq} of {1, 2, , n} with q < k, thep0 andp1 are the

    same.

    The first two conditions are called contrast and the third is called security.

    From the above definition, the matrices in C0 and C1 are n 1 matrices, so the

    pixel expansion is one, howeverB0 andB1. In the conventional VSS scheme are n

    m matrices, and thus the pixel expansion is m.

    For the description of the construction, we first define the notation i,j to

    represent the set of all n 1 column matrices with the Hamming weight i of every

    column vector, andj denotes the matrices belonging to Cjwherej{0,1}.For example n=3,2, 0 are three 3 1 column matrices shown as:

    2, 0 = ,011

    100

    110

    .and2, 0 belongs to C0.

    Example: For (2, 2) ProbVSS i.e. n=2,

    C0 = {0, 0,2, 0}

    =/00 11And

    C1 = {1, 1}

    = /01 10Thus, for any (k, n) VSS scheme first we will construct the collection of

    matrices C0 and C1 according to the above discussion. In section 3.3 we will give

    the proposed algorithm for any k-out-of-n VSS scheme and then in section 3.4 we

    will illustrate the various constructions using the above approach in our proposed

    ProbVSS scheme.

  • 7/30/2019 Project Complete Without Scaling

    42/84

    35

    In the next section, we describe how we transformed the image into three

    halftone images and then we will describe how to create shares for any k-out-of-n

    ProbVSS scheme. The approach for creating shares is based on the Hous methodbased on color images but we have modified his approach according to our need

    for our proposed scheme.

    b) Creation of halftone images:A. The halftone technologyAccording to their physical characteristics, different media uses different

    ways to represent the color levels of images. The computer screen uses the electric

    current to control the lightness of the pixels. The diversity of the lightness

    generates different color levels. The general printer, such as dot matrix printers,

    laser printers, and jet printers, can only control a single pixel to be printed (black

    pixel) or not to be printed (white pixel), instead of displaying the gray level or the

    color tone of an image directly. As such, the way to represent the gray level or

    color level of images is to use the density of printed dots. For example, the printed

    dots in the bright part of an image are sparse, and those in the dark part are dense

    as in Figure 3.2 (a, b). The method that uses the density of the net dots to simulate

    the gray level or color level is called Halftone and transforms an image with

    gray level or color level into a binary image before processing.

    Figure 3.2: (a) Continuous tone and (b) Halftone

    Take the color level image in Figure 3.3 (a). For example, every pixel of the

    transformed halftone image in Figure 3.3 (b) has only two possible color levels

  • 7/30/2019 Project Complete Without Scaling

    43/84

    (black or white). Beca

    when viewing a dot, te

    levels through the denactually has only two co

    Figure 3.3: (a) Ori

    B. For our propIn our proposed

    image i.e. Red, Green a

    each component of th

    halftone images corresp

    There are variou

    halftone image. In our

    image into halftone im

    following figure we sh

    component images whic

    se human eyes cannot identify too tiny

    d to cover its nearby dots, we can simul

    ity of printed dots, even though the trlorsblack and white.

    ginal image (b) Halftone i

    sed scheme

    scheme, we first obtained the three c

    d Blue components of the image, then

    image into halftone image i.e. we o

    nding to the each component of the ima

    s methods for transforming the image i

    roposed scheme we use two methods fo

    age which are Floyd method and Jarvi

    w the process of converting an image i

    h are obtained by Floyd method:

    (a) Original image

    36

    printed dots and,

    te different color

    ansformed image

    mage

    mponents of the

    e transformed the

    tained the three

    e.

    to corresponding

    transforming the

    s method. In the

    to three halftone

  • 7/30/2019 Project Complete Without Scaling

    44/84

    37

    (b) Red component (c) Green component (d) Blue component

    (e) Red halftone image (f) Green halftone image (g) Blue halftone image

    Figure 3.4

    c) Creating the sharesIn our proposed scheme for any k-out-of-n VSS scheme after obtaining the

    three halftone images, we create the shares. For this, we create 3n temporary

    sharing images and each of these sharing images will contain the corresponding

    pixels according to the corresponding matrix of the corresponding component.

    Then, we combined the each component of the temporary sharing images to create

    the n shares. In this scheme any kshares reveal the secret image but any k- 1 share

    can not reveal the secret image.

    For example: For (2, 2) ProbVSS scheme, we create the 6 temporary sharing

    images which areR1,R2, G1, G2,B1 andB2. After creating these sharing images we

    combine theR1, G1 andB1 to create the first share and R2, G2 andB2 to create the

    second share.

  • 7/30/2019 Project Complete Without Scaling

    45/84

    38

    In the following paragraph we describe how to assign color pixels to the

    individual temporary shares and how to combine those temporary shares to form

    sharing images.Let the three halftone images areRij, Gij andBij. For each component of the

    image if the pixel value in the halftone image is 1 it means that the presence of

    the primary color or if the pixel value in the halftone image is 0 it means that the

    absence of the primary color. For any k-out-of-n ProbVSS scheme after creating

    the two collection of matrices C0 and C1 which consist ofn 1 column matrices, if

    the pixel value in the halftone image 0 then we randomly select any one of the

    matrix from the collection of matrices C0 or if the pixel value in the halftone image

    is 1 then we randomly select one of the matrices from the collection of matrices

    C1. After choosing the matrix we assign the corresponding color pixel to the

    corresponding share. If the pixel value in the chosen matrix is 1, then we assign

    the corresponding color pixel value to the corresponding share or if the pixel value

    in the chosen matrix is 0, then we assign the zero value to the corresponding

    share. We repeat this process for all the pixels of the every component of the

    image. After creating the temporary sharing images, we combined the temporary

    sharing images as component of the sharing images as described above. In this

    way we create the kshares and any kshares reveal the secret image but any k-1

    shares can not reveal the secret image.

    Since, each chosen matrices consist of the n pixels, we assign only one pixel to

    the shares of the corresponding pixels, so there is no pixel expansion which is the

    most desirable property in the visual secret sharing scheme. Moreover, we

    randomly choose the matrices from the collection of matrices for each pixel of the

    each component image, so no one can determine any information from individual

    sharing images. Thus, our proposed (k, n) ProbVSS scheme is perfectly secure and

    valid one.

    In the next section, we will consider the formal algorithm of our proposed

    (k, n) ProbVSS scheme, various constructions based on the proposed algorithm,

  • 7/30/2019 Project Complete Without Scaling

    46/84

    39

    security analysis of the constructions and we also prove that every construction of

    our scheme is valid one.

    3.3Algorithm-For our proposed (k,n) ProbVSS scheme1. Transform the color image P into three halftone images:R, G andB2. Construct the two collections of matrices C0 and C1.3. For each pixel Pij with color components(Rij, Gij and Bij) of the

    composed image P, do the following:

    A. Determine the pixel value of theRij If Rij = 0, we randomly choose one matrix from the

    collection of matrices C0.

    If Rij = 1, we randomly choose one matrix from thecollection of matrices C1.

    B. Determine the pixel of the chosen matrix:If the pixel is 1 (Red component will be revealed),

    Assign the corresponding color pixel to the corresponding Red

    temporary sharing image.

    If the pixel is 0 (Red component will be hidden),

    Assign the corresponding color pixel to another corresponding

    Red temporary sharing image.

    C. Repeat step B n times according to the (k, n) ProbVSS scheme.4. Repeat the step 3 for each Green and Blue component i.e. until every pixel

    of the composed image Pij is considered.

    5. After obtaining the n temporary sharing images for the each component ofthe image (Red, Green, and Blue) i.e. 3n temporary sharing images, we

    combine the components of the temporary sharing images to form the

    sharing images as described in above section.

    6.

    After stacking the any kshares, the secret image can be decrypted by humaneyes.

  • 7/30/2019 Project Complete Without Scaling

    47/84

    40

    In the next section, we consider the various constructions of our proposed (k, n)

    ProbVSS scheme and their proofs.

    3.4Constructions of our proposed (k,n) ProbVSS schemeThe proposed (k, n) ProbVSSadopts the probabilistic additive color mixing

    defined in section 3.1. For each component pixel is represented by one pixel only

    i.e. each color pixel value of the Red component has appearance probabilities Pi

    and zero color value with probability (1 Pi). The other two components (G-color

    and B-color) have the appearance probabilities Pj and Pk.

    When stacking any kor more shadows, the color appearance probabilities of(R, G, andB) will be P

    iR, P

    jGand P

    kBin such a way that one can decode the color

    via HVS. However, when stacking less than k shadows, the color appearance

    probabilities are all the same.

    We first give a definition of our scheme, the contrast and security

    conditions for our (k, n) ProbVSS scheme, and then describe various constructions

    of the scheme.

    Definition 3: A (k,n) ProbVSS of color images can be represented as two

    collection of matrices C0 and C1, including n 1 column Boolean matrices where

    the elements 1 and 0 represent the primary color and zero color value in the

    shadows. In this first we create 3n temporary sharing images and then we

    combined it into n sharing images. If the value in the halftone image is 0, we

    randomly choose one of the matrices from the set C0 or if the value in the halftone

    image is 1, we randomly choose one of the matrices from the set C1. For sharinga secret colorRi, Gjor Bk, If the value in the chosen matrix is 1 then we put the

    primary color value or if the value in the chosen matrix is 0 then we put the zero

    color value to the corresponding mth

    temporary sharing image according to the

    element of the mth

    row of the chosen column matrix. A ProbVSS scheme is

    considered valid if the following conditions are met:

  • 7/30/2019 Project Complete Without Scaling

    48/84

    41

    Contrast condition: Apply ''OR'' operation for any k or more rows for these

    column matrices in these sets. The appearance probabilities PiR, P

    jGand P

    kB for the

    OR-ed results are proportional to the luminance levelsRi, GjandBk.Security condition: When stacking less than kshadows, the color appearance

    probabilities PiR, P

    jGand P

    kBare all the same.

    In this scheme, when we apply XOR instead of OR the image is revealed

    better because the contrast is not sacrificed too much in this case.

    3.4.1A proposed 2-out-of-n ProbVSS scheme for color images

    Proposed (2, 2) ProbVSS: Let C0= {0, 0, 2, 0} and C1 = {1, 1} are the

    two collection of matrices consisting of 2 1 matrices for a (2, 2) ProbVSS

    scheme. In this we create 3n=3 2 i.e. 6 temporary sharing imagesR1,R2, G1, G2,

    B1 andB2 using the above matrices and then we combined R1, G1 andB1 to form

    the 1st

    share and combined theR2, G2,B2 to form the 2nd

    share.

    Theorem 1: The proposed (2, 2) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = {0, 0,2, 0} =/00 11And

    C1 = {1, 1} =

    /01

    10

    For each halftone image (Red, Green and Blue) of the secret image, when

    the pixel value is 0 we randomly choose one matrix from C0 or when the pixel

    value is 1 we randomly choose one matrix from C1.

    For Red color the possible set is:

    CR0= / 22(1-R, 0-Z) and CR1= /2 2(1-R, 0-Z)Using the same approach the possible sets for Green and Blue is:

  • 7/30/2019 Project Complete Without Scaling

    49/84

    42

    CG0= / 33(1-G, 0-Z) and CG1= /3 3(1-G, 0-Z),CB0=

    / 44(1-B, 0-Z) and CB1=

    /4 4(1-B, 0-Z)

    The chosen matrix is only one for each component from the above set and

    the chosen matrix is selected randomly for each component. From the chosen

    matrix, since each matrix is 2 1, so for each component we assign first row pixel

    to the first temporary shadow and second row pixel to the second temporary

    shadow of the corresponding components. Thus, non expansible shadow size for

    (2, 2) ProbVSS scheme.

    From the above sets we observe that when stacking two shadows R+R=R,

    R+Z=R, G+G=G, G+Z=G, B+B=B, B+Z=B and Z+Z=Z. The color appearance

    probabilities of primary colors are: P0R=P

    0G=P

    0B=0.5 and P

    1R=P

    1G=P

    1B=1

    respectively. So, the appearance probabilities of every primary color for each

    shadow are all 0.5.

    When using the Figure 3 5 (a) as the secret image, the experimental results

    are shown in the following figures. Two shadow images are shown in the Figure

    3.5 (b, c) and the reconstructed image using the OR operation is shown in Figure

    3.5 (d) and using the XOR operation is shown in the Figure 3 5 (e).

    (a) Original image

  • 7/30/2019 Project Complete Without Scaling

    50/84

    43

    (b) Share 1 (c) Share 2

    (d) 1+2 using OR (e) 1+2 using XOR

    Figure 3.5

    Proposed (2, 3) ProbVSS: Let C0 = {0,0,3,0} and C1 = {3,1,2,1} are the

    two collection of matrices consisting of 3 1 matrices for a (2, 3) ProbVSS

    scheme. In this we create 3n=3 3 i.e. 9 temporary sharing images R1,R2,R3, G1,

    G2, G3 and B1, B2 and B3 using the above matrices and then we combined R1, G1

    andB1 to form the 1st

    share, combined theR2, G2,B2 to form the 2nd

    share and the

    R3, G

    3,B

    3to form the 3

    rdshare.

    Theorem 2: The proposed (2, 3) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = {0,0,3,0} = ,000 111.

    And

  • 7/30/2019 Project Complete Without Scaling

    51/84

    44

    C1 = {3,1,2,1} = ,00

    1

    01

    0

    10

    0

    11

    0

    10

    1

    01

    1

    .For each halftone image (Red, Green and Blue) of the secret image, when

    the pixel value is 0 we randomly choose one matrix from C0 or when the pixel

    value is 1 we randomly choose one matrix from C1.

    For Red color the possible set is:

    CR0= ,

    5

    22

    2

    .(1-R, 0-Z) and CR1= ,

    2

    2

    2

    22

    2Z

    R

    2

    2

    .(1-R, 0-Z)Using the same approach the possible sets for Green and Blue is

    CG0= ,5 333.(1-G, 0-Z) and CG1= ,

    3 3

    3 33

    3ZG 33.(1-G, 0-Z)

    CB0= ,5 444.(1-B, 0-Z) and CB1= ,

    4 4

    4 44

    4ZB 44.(1-B, 0-Z)

    The chosen matrix is only one for each component from the above set and

    the chosen matrix is selected randomly for every component. From the chosen

    matrix, since each matrix is 3 1, so for each component we assign first row pixel

    to the first temporary shadow, second row pixel to the second temporary shadow

    and third row pixel to the third temporary shadow of the corresponding

    components. Thus, non expansible shadow size for (2, 3) ProbVSS scheme.

    Using the above approach, we can conclude that the appearance

    probabilities of every primary color for each shadow are all 0.33. When using the

    same Figure 3 5 (a) as the secret image, the experimental results are shown in the

    following figures. Three shadow images are shown in Figure 3 6 (a, b, c) and the

    reconstructed images using the OR operation is shown in Figure 3.6 (d, e, f) and

    using the XOR operation is shown in Figure 3 6 (g, h, i).

  • 7/30/2019 Project Complete Without Scaling

    52/84

    45

    (a) Share1 (b) Share2 (c) Share3

    (d) 1+2 using OR (e) 2+3 using OR (f) 1+3 using OR

    (g) 1+2 using XOR (h) 2+3 using XOR (i) 1+3 using XOR

    Figure 3.6

    Proposed (2, 4) ProbVSS: Let C0 = {0,0,4,0} and C1 = {2,1} are the two

    collection of matrices consisting of 4 1 matrices for a (2, 4) ProbVSS scheme. In

    this we create 3n=3 4 i.e. 12 temporary sharing imagesR1,R2,R3,R4,G1, G2, G3,

    G4,B1,B2,B3 andB4 using the above matrices and then we combinedR1, G1 andB1

    to form the 1

    st

    share, combined theR2, G2,B2 to form the 2

    nd

    share, combined theR3, G3,B3 to form the 3

    rdshare and combined theR4, G4,B4 to form the 4

    thshare.

  • 7/30/2019 Project Complete Without Scaling

    53/84

    46

    Theorem 3: The proposed (2, 4) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = {0,0,4,0} = ;0000< ;1111

  • 7/30/2019 Project Complete Without Scaling

    54/84

    47

    Using the above approach, we can conclude that the appearance

    probabilities of every primary color for each shadow are all 0.33. When using the

    Figure 3 5 (a) as the secret image, the experimental results are shown in thefollowing figures. Four shadow images are shown in the Figure 3 7 (a, b, c, d) and

    the reconstructed images using the OR operation is shown in the Figure 3 7 (e, f,

    g, h, i, j) and using the XOR operation is shown in the Figure 3 7 (k, l, m, n, o,

    p).

    (a) Share1 (b) Share2 (c) Share3

    (d) Share4 (e) 1+2 using OR (f) 2+3 using OR

    (g) 3+4 using OR (h) 1+3 using OR (i) 1+4 using OR

  • 7/30/2019 Project Complete Without Scaling

    55/84

    48

    (j) 2+4 using OR (k) 1+2 using XOR (l) 2+3 using XOR

    (m) 3+4 using XOR (n) 1+3 using XOR

    (o) 1+4 using XOR (p) 2+4 using XOR

    Figure 3.7

    Proposed (2, n) ProbVSS: Let C0 and C1 are the two collection of matrices

    consisting of n 1 matrices for a (2, n) ProbVSS scheme. In this we create 3n

    temporary sharing images R1, R2,., Rn, G1, G2,.,Gn, B1, B2,., Bn using the

    above matrices and then we combined R1, G1 and B1 to form the 1st

    share,

    combined theR2, G2,B2 to form the 2

    nd

    share and combined theRn, Gn,Bn to formthe n

    thshare. C0 and C1 are defined as follows:

  • 7/30/2019 Project Complete Without Scaling

    56/84

    49

    C0 = {0,0,n,0} and

    C1 = {n/2,1, for even n}or

    C1 = {a,1,a+1,1 , where a is least integer function ofn/2, for odd n}

    We follow the same procedure to construct the proposed (k, k) ProbVSS as

    illustrated above.

    3.4.2 A proposed 3-out-of-n ProbVSS scheme for color imagesProposed (3, 3) ProbVSS: Let C0 = {0,0,2,0} and C1 = {1,1,3,1} are the

    two collection of matrices 3 1 matrices for a (3, 3) ProbVSS scheme. In this we

    create 3n=3 3 i.e. 9 temporary sharing images R1,R2,R3, G1, G2, G3 andB1,B2

    andB3 using the above matrices and then we combined R1, G1 andB1 to form the

    1st

    share, combined the R2, G2,B2 to form the 2nd

    share and combined the R3, G3,

    B3 to form the 3rd

    share.

    Theorem 4: The proposed (3, 3) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = {0,0,2,0} = ,000 110 101 011.and

    C1 = {1,1,3,1} = ,001 010

    100 111.

    For each halftone image (Red, Green and Blue) of the secret image, when

    the pixel value is 0, we randomly choose one matrix from C0 or when the pixel

    value is 1 we randomly choose one matrix from C1.

    For Red color the possible set is:

    CR0=

    ,

    22

    22

    22.

    (1-R, 0-Z) and CR1=

    ,2

    2

    2

    222.

    (1-R, 0-Z)

  • 7/30/2019 Project Complete Without Scaling

    57/84

    50

    Using the same approach the possible sets for Green and Blue is:

    CG0=

    ,

    33

    33

    33.

    (1-G, 0-Z) and CG1=

    ,3

    3

    3

    333.

    (1-G, 0-Z)

    CB0= , 44

    44 44.(1-B, 0-Z) and CB1= ,

    4 4

    4 444.(1-B, 0-Z)

    The chosen matrix is only one for each component from the above set and

    the chosen matrix is selected randomly for every component. From the chosen

    matrix, since each matrix is 3 1, so for each component we assign first row pixel

    to the first temporary shadow, second row pixel to the second temporary shadowand third row pixel to the third temporary shadow of the corresponding

    components. Thus, non expansible shadow size for (3, 3) ProbVSS scheme.

    Using the above approach, we can conclude that the appearance

    probabilities of every primary color for each shadow are all 0.25 .When using the

    same Figure 3.5 (a) as the secret image, the experimental results are shown in the

    following figures. Three shadow images are shown in Figure 3.8 (a, b, c) and the

    reconstructed images using the OR operation is shown in Figure 3.8 (j) and

    using the XOR operation is shown in the Figure 3.8 (k). It is also shown in the

    Figure 3.8 (d, e, f) and in the Figure 3.8 (g, h, i) that stacking k-1 i.e. 2 shadows

    can not reveal any secure information.

    (a) Share1 (b) Share2 (c) Share3

  • 7/30/2019 Project Complete Without Scaling

    58/84

    51

    (d) 1+2 using OR (e) 2+3 using OR (f) 1+3 using OR

    (g) 1+2 using XOR (h) 2+3 using XOR (i) 1+3 using XOR

    (j) 1+2+3 using OR (k) 1+2+3 using XOR

    Figure 3.8

    Proposed (3, n) ProbVSS: we can construct any proposed 3-out-of-n

    ProbVSS scheme in the same way as the above illustrated approach.

    3.4.3 A proposedk-out-of-k ProbVSS scheme for color imagesProposed (4, 4) ProbVSS: Let C0 = {0,0, 2,0,4,0} and C1 = {1,1, 3,1}

    are the two collection of matrices consisting of 4 1 matrices for a (4, 4) ProbVSS

  • 7/30/2019 Project Complete Without Scaling

    59/84

    52

    scheme. In this we create 3n=3 4 i.e. 12 temporary sharing imagesR1,R2,R3,R4,

    G1, G2, G3,G4,B1,B2, B3 andB4 using the above matrices and then we combined

    R1, G1 andB1 to form the 1

    st

    share, combined theR2, G2,B2 to form the 2

    nd

    share,combined theR3, G3,B3 to form the 3

    rdshare and combined theR4, G4,B4 to form

    the 4th

    share.

    Theorem 5: The proposed (4, 4) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = {0,0,2,0,4,0} = ;0000< ;0011< ;1100< ;1010< ;0101< ;1001< ;0110< ;1111

  • 7/30/2019 Project Complete Without Scaling

    60/84

    53

    CG1 = ;

    3< ;

    3< ;3

    < ;3

    < ;33

    3< ;33

    3< ;3

    33< ;3

    33

  • 7/30/2019 Project Complete Without Scaling

    61/84

    54

    (d) Share4 (e) 1+2 (f) 2+3

    (g) 3+4 (h) 1+3 (i) 1+4

    (j) 2+4 (k) 1+2+3 (l) 2+3+4

    (m) 1+2+4 (n) 1+3+4 (o) 1+2+3+4using XOR

    Figure 3.9

  • 7/30/2019 Project Complete Without Scaling

    62/84

    55

    Proposed (k,k) ProbVSS: Let C0 and C1 are the two collection of matrices

    consisting of k 1 matrices for a (k, k) ProbVSS scheme. In this we create 3k

    temporary sharing images R1, R2,., Rk, G1, G2,.,Gk, B1, B2,., Bk using theabove matrices and then we combined R1, G1 and B1 to form the 1

    stshare,

    combined theR2, G2,B2 to form the 2nd

    share and combined theRk, Gk,Bk to form

    the kth

    share. C0 and C1 are defined as follows:

    C0 = { i,0, where i is even and 0ik}

    C1 = { i,1, whre i is odd and 0ik}.

    We follow the same procedure to construct the proposed (k, k) ProbVSS as

    illustrated above.

    3.4.4 A proposedk-out-of-n ProbVSS scheme for color imagesProposed (3, 4) ProbVSS: Let C0 and C1 are the two collection of matrices

    consisting of 4 1 matrices for a (3, 4) ProbVSS scheme. In this we create 3n=3

    4 i.e. 12 temporary sharing imagesR1,R2,R3,R4,G1, G2, G3,G4,B1,B2,B3 andB4

    using the above matrices and then we combinedR1, G1 andB1 to form the 1st

    share,

    combined theR2, G2,B2 to form the 2nd

    share, combined theR3, G3,B3 to form the

    3rd

    share and combined theR4, G4,B4 to form the 4th

    share.

    Theorem 3: The proposed (3, 4) ProbVSS scheme is for non expansible shadow

    size color images.

    Proof: The two sets are:

    C0 = ;0000< ;0000< ;1110< ;1101< ;1011< ;0111

  • 7/30/2019 Project Complete Without Scaling

    63/84

    56

    For each halftone image (Red, Green and Blue) of the secret image, when

    the pixel value is 0 we randomly choose one matrix from C0 or when the pixel

    value is 1 we randomly choose one matrix from C1.For Red color the possible set is:

    CR0 = ;< ;< ;

    222< ;222< ;

    222< ;222

  • 7/30/2019 Project Complete Without Scaling

    64/84

    57

    Using the above approach, we can conclude that the appearance

    probabilities of every primary color for each shadow are all 0.167 .When using the

    Figure 3.5 (a) as the secret image, the experimental results are shown in thefollowing figures. Four shadow images are shown in the Figure 3.10 (a, b, c, d)

    and the reconstructed images using the OR operation is shown in Figure 3.10 (k,

    l, m, n) and using the XOR operation is shown in Figure 3.10 (o, p, q, r).

    (a) Share1 (b) Share2 (c) Share3

    (d) Share4 (e) 1+2 (f) 2+3

    (g) 3+4 (h) 1+3 (i) 1+4

  • 7/30/2019 Project Complete Without Scaling

    65/84

    58

    (j) 2+4 (k) 1+2+3 using OR (l) 2+3+4 using OR

    (m) 1+2+4 using OR (n) 1+3+4 using OR (o) 1+2+3 using XOR

    (p) 2+3+4 using XOR (q) 1+2+4 using XOR (r) 1+3+4 using XOR

    Figure 3.10

    3.5SummaryIn this chapter, we have propsed a k-ot-of-n ProbVSS scheme for color

    images. Our scheme supports any type of color images. We elaborated the three

    steps, namely, construction of matrices, creatinge the halftone images and creating

    the shares. We have given the algorithm of our propsed scheme and various

  • 7/30/2019 Project Complete Without Scaling

    66/84

    59

    constructions of our proposed scheme. We have also defined the valid proposed k-

    out-of-n ProbVSS scheme and proved that our scheme is valid one. Our scheme

    supported the three desirable properties which are:1. Supporting images of arbitrary number of colors,2. No pixel expansion,3. Supporting k-out-of-n threshold setting.In the next chapter, we will compare our scheme with other novel schemes

    and proved that our scheme is fully secure and valid one.

  • 7/30/2019 Project Complete Without Scaling

    67/84

    60

    Chapter 4

    COMPARISION

  • 7/30/2019 Project Complete Without Scaling

    68/84

    61

    4.ComparisonVarious parameters are recommended by researchers to evaluate the

    performance of visual cryptography schemes. In this chapter, we have considered

    some of those aspects to compare our VCS with other VCS schemes namely Naor

    Shamir [2], Verheul-Tilborg [5], Chang-Tsai [6], Y.C. Hou [8], Yang [4], Chan

    [20], Hou and Tu [13], Shyu [12], Chen et al. [7] and Yang-chen [9] VCS

    schemes. We have compared our scheme with these schemes in mainly four

    aspects which are the most desirable properties of any secret sharing scheme.

    The four aspects of comparison are also the objectives of any visual

    cryptography scheme, which are as follows-

    1. Dealing with colored images.2. No Pixel expansion.3. Supporting general (k, n) threshold setting.4. Supporting arbitrary no of color levels.The summary of t