psdot 8 a weak security notion for visual

5
A WEAK SECURITY NOTION FOR VISUAL SECRET SHARING SCHEMES OBJECTIVE: The main objectives of this project is a sharing the secret information through an encrypted color image based on LSB Method. PROBLEM DIFINITION: The problem found in our existing system is we must expand the original pixels on the secret images in encryption, which aces lower level of contrast of the reproduced images.Many efforts have been devoted to minimizing the pixel expansion and to maximize the contrast of reproduced images. ABSTRACT: In visual secret sharing (VSS) scheme, the alignment of the transparencies is important to the visual quality of the reconstructed secret image. Each pixel of the original secret image is expanded to m subpixels in a share image. If a share image is printed on a paper with the same size as the original secret image, the alignment or the registration of the subpixels, which is only m times smaller than that of the original secret image, could be troublesome. In this paper, we propose a (2, n)-VSS scheme that allows a relative shift between the shares in the horizontal direction and vertical direction. When the shares are perfectly aligned, the contrast of the reconstructed image is equal to that of the traditional VSS scheme.

Upload: ztech-proje

Post on 01-Nov-2014

832 views

Category:

Education


0 download

DESCRIPTION

FINAL YEAR IEEE PROJECTS, EMBEDDED SYSTEMS PROJECTS, ENGINEERING PROJECTS, MCA PROJECTS, ROBOTICS PROJECTS, ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS

TRANSCRIPT

Page 1: Psdot 8 a weak security notion for visual

A WEAK SECURITY NOTION FOR VISUAL SECRET SHARING

SCHEMES

OBJECTIVE:

The main objectives of this project is a sharing the secret information

through an encrypted color image based on LSB Method.

PROBLEM DIFINITION:

The problem found in our existing system is we must expand the original

pixels on the secret images in encryption, which aces lower level of contrast of the

reproduced images.Many efforts have been devoted to minimizing the pixel

expansion and to maximize the contrast of reproduced images.

ABSTRACT:

In visual secret sharing (VSS) scheme, the alignment of the transparencies is

important to the visual quality of the reconstructed secret image. Each pixel of the

original secret image is expanded to m subpixels in a share image. If a share image

is printed on a paper with the same size as the original secret image, the alignment

or the registration of the subpixels, which is only m times smaller than that of the

original secret image, could be troublesome. In this paper, we propose a (2, n)-VSS

scheme that allows a relative shift between the shares in the horizontal direction

and vertical direction. When the shares are perfectly aligned, the contrast of the

reconstructed image is equal to that of the traditional VSS scheme.

Page 2: Psdot 8 a weak security notion for visual

When there is a shift, the average contrast of the reconstructed image is

higher than that of the traditional VSS scheme, and the scheme can still work in

cases where very little shape redundancy is present in the image. The trade-off is

that our method involves a larger pixel expansion. The basic building block of our

scheme is duplication and concatenation of certain rows or columns of the basic

matrices. This seemingly simple but very powerful construction principle can be

easily used to create more general (k, n) schemes.

EXISTING SYSTEM:

GrayScale Image Based VSS(GI-VSS)

Water Marking Technique based VSS(WaterMarking Based-VSS)

DISADVANTAGES:

We must expand the original pixels on the secret imagesin encryption, which

akes lower level of contrast of the reproducedimages.

Many efforts have been devoted tominimizing the pixel expansion and to

maximize the contrastof reproduced images.

PROPOSED SYSTEM:

In proposed system comes from the fact that VSS schemes need no

computation in decryption Based on this observation, we can relax the

unconditional security notion of -threshold VSS schemes to a weaker notion in

such a way that it is secure if the image obtained by stacking or fewer shares seems

to be a random dot image We also present two constructions of WS-VSS schemes.

US-VSS scheme (B/W Image based system)

Page 3: Psdot 8 a weak security notion for visual

WS-VSS scheme (color Image Based Syetem).

ADVANTAGES:

High Security

There is no need effort for minimizing the pixel expansion

There is no need effort for maximize the contrast of reproduced images.

ALGORITHM USED:

1. LSB (Least Significant Bit)

2. AES (Advanced Encryption Standard)

ARCHITECTURE DIAGRAM:

Page 4: Psdot 8 a weak security notion for visual

SYSTEM REQUIREMENTS:

Hardware Requirements:

• System : Pentium IV 2.4 GHz.

• Hard Disk : 40 GB.

• Floppy Drive : 1.44 Mb.

• Monitor : 15 VGA Colour.

• Mouse : Logitech.

• Ram : 512 Mb.

Page 5: Psdot 8 a weak security notion for visual

Software Requirements:

• Operating system : Windows XP.

• Coding Language : ASP.Net with C#.

• Data Base : SQL Server 2005.

APPLICATIONS:

1. Deductive Agencies

2. Government Services

3. Organization Administrative