color extended visual cryptography

Post on 15-Oct-2014

272 Views

Category:

Documents

6 Downloads

Preview:

Click to see full reader

TRANSCRIPT

04/07/2023 2

CONTENTS:-

ABSTRACT EXISTING SYSTEM PROPOSED SYSTEM SRS DOCUMENT HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTSDESIGN PHASE REFERENCES

Abstract

Visual Cryptography (VC) is a method of encrypting a secret image into some shares (transparencies) such that stacking a sufficient number of shares reveals the secret image and any qualified subset of the shares can recover the secret “visually”.

The first visual cryptographic technique was pioneered by Moni Naor and Adi Shamir. It involved breaking up the image into n shares so that only someone with all n shares could decrypt the image by overlaying each of the shares over each other.

Practically, this can be done by printing each share on a separate transparency and then placing all of the transparencies on top of each other.

Visual secret sharing (VSS) schemes are used to protect the visual secret.

This scheme can be easily implemented on basis of a black & white VSS scheme and get much better block length.

EXISTING SYSTEM

In Previous methods it show good results for black and white or gray scale VC schemes.

It is not sufficient to be applied directly to color shares due to different color structures.

color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.

To avoid this the concept of visual information pixel (VIP) synchronization and error diffusion are introduced to attain a color visual cryptography encryption

PROPOSED SYSTEM

In proposed system visual cryptography technique, to provide privacy protection when transmitting sensitive data between offices or computers.

Here visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.

VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes.

Cost will be decreased

MODULE DESCRIPTION:

USER INTERFACE

ENCRYPTION

DECRYPTION

SRS DOcument :HARD WARE Requirements :

Processor : Pentium III

RAM : 128 MB / 256 MB (Recommended)

Hard disk : 20 GB

Operating System: Win 9x/ XP

Programming Tool : Java 1.4.2

SOFTWARE Requirements :

FUNCTIONAL Requirements :

INPUT: Encripting an image is done by giving receivers port number OUTPUT: Decripting an image is done through the senders port number

nON FUNCTIONAL Requirements : •Usability

•Reliability

•Performance

•Supportability

•Throughput

Efficiency

Security

04/07/2023 14

Design phase

USE CASE Diagram.CLASS Diagram.ACTIVITY Diagram.SEQUENCE DiagramCOLLABORATION Diagram.STATE CHART Diagram.

Use case diagram

04/07/2023

15

select image to send

select two cover images

select ip and port number

encrypt

Sender

send

receive

receiver

decrypt

Class diagram:-

Receiver

nameipaddressportnumber

selectip()selectportnumber()receiveimage()decrypt()

Sender

nameipaddressportnumber

selectimages()selectip()selectportnumber()encrypt()send()

Activity diagram:-

Select image to send

Select two cover images

select ip and port number

encrypt

valid ip

Errorinvalid

receive

Send

decrypt

ReceiverSender

SEQUENCE diagram:-s : Sender r : Receiver

select image to be hide

select two cover images

select ip address

select port number

encrypt

send

receive image

enter ip and port

decrypt

COLLABORATION phase

s : Sender r : Receiver

1: select image to be hide2: select two cover images

3: select ip address4: select port number

5: encrypt

6: send

7: receive image8: enter ip and port

9: decrypt

STATE CHART phase:active

select image to send

select two cover images

select ip and port number

encrypt

send

receive

decrypt

select image to send

select two cover images

select ip and port number

encrypt

send

receive

decrypt

04/07/2023 21

references

M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.

G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Comput., vol. 129, no.

A. Houmansadr and S. Ghaemmaghami, “A novel video watermarking

method using visual cryptography,” in Proc. IEEE Int. Conf. Eng. Intell. Syst., 2006, pp.

M. S. Fu and O. C. Au, “Joint visual cryptography and watermarking ,” in Proc. IEEE Int. Conf. Multimedia Expo, 2004, pp. 975–978.

04/07/2023 22

Queries….?

THANK YOU

top related