Professional Documents
Culture Documents
Gazal Sahai
T.S.Lamba
Software Engineer Professor, E& ECE Dept.
Samsung India Software Operations, Indian Institute of Technology
Bangalore 560052 Kharagpur 721302
gazal.sahai@samsung.com tsl@ieee.org
= =
=
k
s j j
j s
j
k
s
s
x x
x
K
C
, 1 1
mod p
Fig 2: Decrypted Output for (3,4) Scheme.
Fig 2 shows the retrieved c using the encrypted
images, as in (3,4) example, of user 2, user 4,
and user 5 as
) )( (
) )( (
5
) )( (
) )( (
4
) )( (
) )( (
2
2 3 1 3
2 1
3 2 1 2
3 1
3 1 2 1
3 2
x x x x
x x
K
x x x x
x x
K
x x x x
x x
K C
+
+
=
Where K
i
is the i-th user share value
x
i
= i for i-th user
The secret image can thus be reconstructed by
following the decryption algorithm for all the
3*3 blocks in the encrypted images.
5. IMPROVEMENT
One of the limitations of using this scheme is
that the share is not an exact reproduction of
the cover image. It is an expansion of the
original, with extra black pixels, resulting in a
loss of contrast to the entire image and giving
rise to a suspicion of hidden information. To
mitigate this graying effect an improvement is
suggested in the subsequent section. After
implementing this, Fig 3, we see that blurring
is considerably reduced and does not indicate
hiding of data. The clarity of the secret images
obtained can be increased by doing the
following at the time of encryption.
Fig 3: (a) Original Cover Image
Fig 3: (b) Encrypted image before improvement
Fig 3: (c) Encrypted image after improvement
After Step 2, Insert 1 to the binary value of the
share calculated at a pre-defined location to
make it a binary number.
Form the 3*3 matrix by replacing all 1s with
the pixel value,c, of the cover image and 0s
with c-1. This matrix is now an expanded
version of the secret image pixel and occupies
the corresponding position.
6. SECURITY ANALYSIS
Since a polynomial of degree k-1 cannot be
reconstructed with less than k values,
retrieving the secret image with less than k
shares would become extremely difficult. In
the algorithm, for every pixel in the secret
image, a new polynomial with randomly
generated coefficients needs to be
constructed. This further enhances the
secrecy.
Another mechanism would be to guess the
value of share. The share values lie between 1
and 255. The probability of guessing the
correct value of the share for one pixel would
be 1/255. Hence the probability for only k-1
users to retrieve the secret image would be
(1/255)
s
, where s is the size of the secret
image. For the stated problem the probability
of guessing further reduces to (1/10)*(1/255)
s
.
In either way, it can be observed that the
probability for illegal users less than k to
retrieve the secret image is very low.
To improve secrecy we can have many images
in a catalogue of which only a few hold
meaningful data. Now, if any unauthorized
person attempts to attack the system, he has to
first identify the k correct cover images. Thus
this guarantees enhanced security. The secrecy
can be further increased by changing the
position of the redundant bit for every pixel of
the secret image. But, this would require extra
memory for storing the redundant bit
positions.
7. EXPERIMENTAL RESULTS
After implementing the proposed secret
sharing scheme with the improvement
suggested, n corresponding cover images are
generated. On Decryption, the secret image is
revealed without any distortion. The size of
the Encrypted images is 3 times the original
cover images irrespective of the number of
gray levels. The Encrypted images formed
closely resemble the original cover images and
the slight distortion observed is due to the
pixel expansion. Besides, when we use n
identical cover images to hide different share
values, it becomes difficult for the human
visual system to distinguish the minute
difference between these images, thus making
all the n encrypted images look alike (Fig. 4).
8. CONCLUSION
In this paper, we proposed a new scheme
which provides an efficient way to share a
gray image among n different users using
Lagranges Interpolating Polynomial Scheme.
The shares of the image are hidden in a cover
image so that it is not obvious that there is
secret information inside them. The proposed
scheme has advantage of low computation and
avoids the drawbacks mentioned in the
previous approaches. This scheme can be
further extended to cover images by
implementing the algorithm individually for
R,G and B gray levels.
REFERENCES
[1]M. Naor and A. Shamir. Visual cryptography.
Advances in Cryptology-EUROCRYPT 94, Lecture
Notes in Computer Science, (950):112, 1995.
[2] E. Verheul and H. V. Tilborg. Constructions and
properties of k out of n visual secret sharing schemes.
Designs,Codes and Cryptography, 11(2):179196,1997.
[3] R. Hwang and C. Chang. Some secret sharing
schemes and their applications. Ph.D. dissertation of the
Department of Computer Science and Information
Engineering, National Chung Cheng University, Chiayi,
Taiwan, 1998.
[4] C. Chang, C. Tsai, and T. Chen. A new scheme for
sharing secret color images in computer network.
Proceedings of International Conference on Parallel and
Distributed Systems, pages 2127, July 2000.
[5] Chen-Chen Chang Sharing a Secret Gray Image in
Multiple Images National Chung Cheng University,
Taiwan.2002.
Fig 4: Encrypted & recovered images for (3,4) scheme after improvement
Secret Image
Original Cover
images
Encrypted
Cover
images
Recovered secret
image