A Novel Key Distribution Scheme f or a Visual Crypto System

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

A Novel Key Distribution Scheme for a Visual Crypto System Kalyan Das1, Aromita Sen2

1Department 2Department

of Information Technology, St. Thomas College of Engineering and Technology, Kolkata.India of Computer Science and Engineering, St. Thomas College of Engineering and Technology Kolkata

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - With the high speed advancement of Computer

network and internet, has hiked the chance of data snooped during the time of transmission. In this issue, Cryptography plays a vital role, which hides the actual information using some secret key and thereby converts it into an alternative equivalent multimedia file like image, video or audio in such a way that only the intended recipient can retrieve back the original data. Here in this paper, a novel secret sharing technique has been suggested, which comprises of two main parts. The first part for establishing shared secret key (one time key), using asymmetric key cryptography and then transmit the confidential data using that shared secret key, ensuring the confidentiality and integrity. Here for the encoding purpose Modulus Operation is used to increase the difficulty for the inverse function. Key Words: Visual Cryptography, Encryption, Decryption, Key Distribution, Pixel, Data Security, Cryptanalysis

1. INTRODUCTION

To deal with all those security issues, various image secret sharing schemes have been developed which gave rise to new technologies in the area of Image Cryptography requiring less computation and less storage. Cryptography, a word with Greek origin, means “secret writing”. It refers to encryption and decryption of secret messages using secret keys. VCS is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system. We can achieve this by one of the following access structure schemes. • (2, 2) Threshold VCS scheme- This is the simplest threshold scheme that encrypts a secret message in two different |

• (n, n) Threshold VCS scheme- In this scheme the secret message is encrypted into n shares, such that when all of the n shares are combined, it will reveal the secret message. • (k, n) Threshold VCS scheme- This scheme encrypts the secret image into n shares such that when any group of at least k shares are overlaid the secret image will be revealed. The question on key exchange was one of the first problems addressed by a cryptographic protocol that was prior to the invention of Public Key Cryptography. In case of Symmetric Key Cryptography, the point is to agree on a key that two parties can use for encryption, in such a way that the eavesdropper cannot attain the key. Our prime objective is to suggest a strong protected transmission technique which ensures secure potential message transmission, from one end to another over a local area network, using image processing based cryptography techniques.

1.1 Preliminaries

Cryptography is a Greek word. It literally means hidden writing it's the science and the art of making secret codes. Encryption is the process of taking a message transforming it by replacing letters and changing it around until it looks like something totally not like a message that nobody can read you can send it to your destination and then they can decrypt it and get back the original data or the message that was there. Until a few decades ago, the information was collected by an organization and stored on physical files. But now, information storage become electronic and thus implementation of their confidentiality, integrity and availability become more different and challenging.

© 2017, IRJET

shares such that it reveals the secret image when they are overlaid.

Impact Factor value: 5.181

|

•Cryptography: Cryptography is the study and practice of protecting information by data encoding and transformation techniques. The primary goal of cryptography is to conceal data to protect it against unauthorized third-party access by applying encryption. The more theoretical or mathematical effort is required for an unauthorized third party to recover data, the stronger is the encryption. •Encryption: In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. •Cipher: An encrypted message is known as cipher text. •Decryption: Decryption is the inverse of encryption; the process of taking cipher text (encrypted data) and a cryptographic key, and producing clear text (the original nonencrypted data) •Symmetric Key Cryptography: It is also referred to by another term like: Secret Key Cryptography. In this scheme, only one key is used and the same key is used for both encryption and decryption of messages. Obviously, both the ISO 9001:2008 Certified Journal

|

Page 2537


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.