cheating prevention in visual cryptography using...

7
Cheating Prevention in Visual Cryptography using Steganographic Scheme Biswapati lana Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: biswapatijanaail.com) Partha Chowdhuri Department of Computer Application, Pailan College of Management and Technology, Kolkata-I04, India. (e-mail: [email protected]) Abstract-Visual Cryptography (VC) is a technique to encrypt a secret image into transparent shares such that stacking a sufficient number of shares reveals the secret image without any computation. Cheating is possible in the Visual Cryptographic Schemes (VCS) by dishonest or malicious participant called a cheater, may provide a Fake Share (FS) to cheat the other participants. To achieve cheating prevention in VC we have proposed a steganographic scheme to embed a secret message in each of the shares in random location during share generation phase called stego share. Before stacking receiver can extract hidden message from stego share for cheacking authentication of shares. In this method no verification share is required to prevent cheating in Vc. Keywords- cheating prevention, cheating, secret sharing, visual cryptography, steganography I. INTRODUCTION The basic principle of VCS was first introduced by Naor and Shamir [I]. The idea of visual cryptography model is to split a secret image into random shares (printed on transparencies) which separately reveal no information about the secret image. The secret image can be recovered by superimposing the shares. Cheating in VCS has been widely investigated for decades[2-4]. Homg et al.[3,9, 11] proposed that cheating is possible in (k, n) VC when k < n. There are two types of cheaters in VC. One is a malicious participant (MP) who is also a legitimate participant, namely MP P(Qualified participant), uses his original share to create a FS to cheat the other qualified participant and the other is a malicious outsider(MO), where MO P, will create FS by using some random images as input to decode the original image. The MO will try to create FS of different sizes because the size of the original share may vary. Cheating may also heppen in Extended Visual Cryptographic Schemes (EVCS) by MP. In this paper, during share generation, a steganographic mechanism is used to embed secret message within the shares, become stego shares. To check the originality of the shares one 978-1-4799-2900-9/14/$31.00 ©2014 IEEE Madhumita Mallick Department of Computer Science, Vidyasagar University, Paschim Medinipur, India. (e-mail: [email protected] ) Shyamal Kumar Mondal * Department of Applied Mathematics with Oceanology and Computer Programming" Vidyasagar University, Paschim Medinipur, India. (e-mail: [email protected] ) *Correspondence Author have to extract the secret message from the stego shares. If the extracted message is not matched with the original message by Trusted Authority (TA) then it is FS, which may prevent cheating in VCS. No need to send extra share for verification. The rest of the paper is organized as follows. Section II reviews some required primitives including related work. Overview of Visual Cryptography is discussed in Section III. Steganographic protocols are discussed in section IV. Our proposed method is discussed on section V. Performance evaluation and security analysis of the proposed protocol are presented in Section VI. Finally, some conclusions are given in Section VII. II. RELATED WORK Naor and Shamir [I] introduces a VCS. Ateniese et al. [5] proposed an elegant VCS for general access structures based on the cumulative array method. Tzeng and Hu [6] proposed a new definition for VC, in which the secret image can be either darker or lighter than the background. Naor and Pinkas [7] showed some methods of authentication and identification for Vc. Their scenario focuses on authentication and identification between two participants. In 1999 Yang and Laih [2] presented two cheating prevention VC schemes to break the misleading secrets forged by dishonest participants. The first method generates an additional verification share to check the validness to each share, where the verification share should be hold by the trusted authority (TA) to veri the validness to each share. The second method transforms a conventional VC scheme to another cheating-prevention VC scheme with greater pixel expansion in each generated shares. The stacking of any two shares reveals the verification image, which can be inspected by user to check the validness to the shares. In 2006, Homg et. al. [3] demonstrated a process of collusive cheating by n+ I participants to the other user in (2, n) VC schemes, and presented two simple possible solutions to address the problem. The first method generates a dedicated verification share to each participant, which can be applied to investigate the 706

Upload: dangkhanh

Post on 12-May-2018

227 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

Cheating Prevention in Visual Cryptography using

Steganographic Scheme

Biswapati lana Department of Computer Science,

Vidyasagar University,

Paschim Medinipur, India.

(e-mail: [email protected])

Partha Chowdhuri Department of Computer Application,

Pailan College of Management and Technology,

Kolkata-I04, India.

(e-mail: [email protected])

Abstract-Visual Cryptography (VC) is a technique to

encrypt a secret image into transparent shares such that stacking

a sufficient number of shares reveals the secret image without

any computation. Cheating is possible in the Visual

Cryptographic Schemes (VCS) by dishonest or malicious

participant called a cheater, may provide a Fake Share (FS) to

cheat the other participants. To achieve cheating prevention in

VC we have proposed a steganographic scheme to embed a secret

message in each of the shares in random location during share

generation phase called stego share. Before stacking receiver can

extract hidden message from stego share for cheacking

authentication of shares. In this method no verification share is

required to prevent cheating in Vc.

Keywords- cheating prevention, cheating, secret sharing, visual cryptography, steganography

I. INTRODUCTION

The basic principle of VCS was first introduced by Naor and Shamir [I]. The idea of visual cryptography model is to split a secret image into random shares (printed on transparencies) which separately reveal no information about the secret image. The secret image can be recovered by superimposing the shares. Cheating in VCS has been widely investigated for decades[2-4]. Homg et al.[3,9, 11] proposed that cheating is possible in (k, n) VC when k < n. There are two types of cheaters in VC. One is a malicious participant (MP) who is also a legitimate participant, namely MP € P(Qualified participant), uses his original share to create a FS to cheat the other qualified participant and the other is a malicious outsider(MO), where MO if. P, will create FS by using some random images as input to decode the original image. The MO will try to create FS of different sizes because the size of the original share may vary. Cheating may also heppen in Extended Visual Cryptographic Schemes (EVCS) by MP.

In this paper, during share generation, a steganographic mechanism is used to embed secret message within the shares, become stego shares. To check the originality of the shares one

978-1-4799-2900-9/14/$31.00 ©2014 IEEE

Madhumita Mallick Department of Computer Science,

Vidyasagar University,

Paschim Medinipur, India.

(e-mail: [email protected] )

Shyamal Kumar Mondal *

Department of Applied Mathematics with Oceanology and

Computer Programming"

Vidyasagar University,

Paschim Medinipur, India.

(e-mail: [email protected] )

*Correspondence Author

have to extract the secret message from the stego shares. If the extracted message is not matched with the original message by Trusted Authority (T A) then it is FS, which may prevent cheating in VCS. No need to send extra share for verification.

The rest of the paper is organized as follows. Section II reviews some required primitives including related work. Overview of Visual Cryptography is discussed in Section III. Steganographic protocols are discussed in section IV. Our proposed method is discussed on section V. Performance evaluation and security analysis of the proposed protocol are presented in Section VI. Finally, some conclusions are given in Section VII.

II. RELATED WORK

Naor and Shamir [I] introduces a VCS. Ateniese et al. [5] proposed an elegant VCS for general access structures based on the cumulative array method. Tzeng and Hu [6] proposed a new definition for VC, in which the secret image can be either darker or lighter than the background. Naor and Pinkas [7] showed some methods of authentication and identification for Vc. Their scenario focuses on authentication and identification between two participants. In 1999 Yang and Laih [2] presented two cheating prevention VC schemes to break the misleading secrets forged by dishonest participants. The first method generates an additional verification share to check the validness to each share, where the verification share should be hold by the trusted authority (T A) to verify the validness to each share. The second method transforms a conventional VC scheme to another cheating-prevention VC scheme with greater pixel expansion in each generated shares. The stacking of any two shares reveals the verification image, which can be inspected by user to check the validness to the shares. In 2006, Homg et. al. [3] demonstrated a process of collusive cheating by n+ I participants to the other user in (2, n) VC schemes, and presented two simple possible solutions to address the problem. The first method generates a dedicated verification share to each participant, which can be applied to investigate the

706

Page 2: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

genuine of the shares gathered from other participants. The second one uses a (2, n+l) VC scheme instead of (2, n) scheme in a 2-out-of-n coding instance, that frustrates the malicious user in predicting the structure of the transparencies possessed by other participants. Later, Hu and Tzeng [4] presented three robust methods to improve the weaknesses of previously cheating prevention VC schemes [3-4], two for conventional VC and another for extended VC. However, like the previous cheating prevention VC schemes in [3-4], additional verification share or greater pixel expansion is required to endow the ability about resisting cheating against malicious participants. Homg et al. [9] proposed a cheating method against some VC schemes. In their cheating method, the cheater needs to know the exact distribution of black and white sub pixels of the shares of honest participants. Based on this characteristic, they proposed a cheat-preventing method to prevent the cheater from obtaining the distribution. Y.C. Chen et al. [11, 12] proposed another cheating prevention method where the method can divide the cheating prevention schemes into two classes. One is based on share authentication where another share (transparency) is used to authenticate other shares (transparencies) and the other is based on blind authentication where some property of the image is used to authenticate the reconstructed secret image. However, we show that cheating can be prevented using embedding the message in the share by steganographic technique by which one can identify the FS.

III. VISUAL CRYPTOGRAPHY

A. OVERVIEW OF VISUAL CRYPTOGRAPHY

The simplest version of the visual secret sharing problem assumes that the message consists of a collection of black and white pixels and each pixel is handled separately. Each original pixel appears in n modified versions (called shares), one for each transparency. Each share is a collection of m black and white sub-pixels, which are printed in close proximity to each other so that the human visual system averages their individual black/white contributions. In k out of k visual cryptography scheme, it generates k transparencies from an original secret image. The transparencies are usually shared by k participants in such a way that the stacking of any k share images will reveal the secret image while from any less than k share images one can deduce no information about the secret image. The k out of n schemes generates n transparencies from an original secret image. The transparencies are usually shared by n participants so that each participant is expected to keep one transparency. The secret image can be observed if any k or more of them are stacked together. However, the secret image is totally invisible if fewer than k transparencies are stacked. The images on transparencies are called shadow images. The pixels on shadow image are called shares. A share consists of m black and white sub-pixels. The structure is usually described by a nXm Boolean matrix M = [mij]. Here mij= 0 or I if the jth sub-pixel in the ith shadow is white or black resoectivelv.

hOrizonUlI shares vertical shares diagonal shares

Figure-I: Six possible patterns of sub-pixel arrangements with 50 % gray. Each pattern is represented as [0 0 I I], [I 1 0 0], [0 I 0 I], [1 0 I 0], [0 I I 0], [1 0 0 1 ] from left to right.

Let Mr denotes the m-D vector obtained by taking the Boolean "OR" of r row vectors. The gray level of a pixel combined by r shares is obtained the Hamming Weight H(Mr) of the "OR"ed m-D vector Mr. Users interprets this gray level as black if H(Mr) � t and as white if H(Mr) > t-am. Here t € {I, . . . ,m} is called threshold, while the value a> 0 and the number a m � 1 are called relative difference and contrast respectively.

The (k, n) VSS consists of two collections of nxm Boolean matrices Cw and Cb where any matrix in Cw generates a white pixel with k or more of shares while a matrix in Cb generates a black pixel. The scheme is valid if it fulfills the following three conditions:

I. For any M in Cm the "OR" vector Mk of any k rows of M satisfies H(Mk) < t-am.

2. For any M in Cb, the "OR" vector Mk of any k rows of M satisfies H(Mk) � t.

3. For any subset {ib i2, • • • ,iq} of {I, 2, . . . ,n} with q < k, the two collections of qxm matrices Dw and Db obtained by extracting rows ii, i2, • . • ,iq from nXm matrices in Cw and Cb are indistinguishable so that the collections contain the same matrices with the same frequencies.

B. CHEA TING IN VCS

There are three types of cheating in VCS

Cheating a VC by an MP

Since the cheater is an MP , he uses his genuine share as a template to construct a set of FS which are indistinguishable

from its genuine share. The stacking of these FS and S 1 ( from

which FS generated) reveals the fake image of perfect

blackness.

Cheating a VC by an MO

An MO can cheat even without any genuine share at hand. The idea is as follows. The MO can use the optimal (2,2)-VCS

to construct the FS for the fake image. Then, he tune the size

of FS so that they can be stacked with genuine shares. Now,

the only problem is to have the right share size for the FS. Hu

and Tzeng [4] provide a solution to get all possible share sizes.

In the case that the MO gets one genuine share, there will be no such problem. It may seem difficult to have fake shares of

the same size as that of the genuine shares.

Cheating an EVCS by an MP

The qualified participant creates the FS from the genuine share by interchanging the black pixels by the white pixels which

leads to less contrast of the reconstructed image. The less

contrast in reconstructed image will be hard to see the

image. The fake image in the stacking of the fake shares has

enough contrast against the background since the fake image

is recovered in perfect blackness.

IV. STEGANOGRAPHIC PROTOCOLS

Steganography is an art and science of communicating information in a covert manner such that the existence of this communication is not detectable. Some basic steganographic techniques are Least Significant Bit (LSB) Substitution

20J4Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 707

Page 3: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

708

Techniques, Transform Domain Techniques (TDT) etc. LSB Substitution Techniques is used to embed secret data in least significant bits (example Hide & Seek) of pixels in a cover image. For the randomized approach the image data c is usually shuffled using a Pseudo Random Number Generator (PRNG). A key k is required to identify the correct regions.

In TDT, JPEG images are first converted into the Discrete Cosine Transform (DCT) domain which represents the data as high and low frequencies. High frequencies relate to areas of high detail, and low frequencies are the low detailed areas. The logic behind this technique is that one can remove some of the high detail because our eyes are less sensitive in these areas, meaning it would not notice if some of it was not present there. Based on this TDT, some algorithms are

A. JSTEG algorithm

JSTEG algorithm only differs from the Hide & Seek algorithm because it embeds the message data within the LSBs of the DCT coefficients of c, rather than its pixel values. The advantages are it is very simple method; it employs the LSB embedding technique. And more secure than LSB Substitution techniques. It also has some disadvantages that it creates a visual discrepancy when the image is converted back from DCT to Image data. The JSTEG algorithm does not embed message data over any of the DC coefficients. And it does not permit embedding on any AC coefficient equal to 0 or I.

B. OutGuess algorithm

OutGuess, improved the JSteg algorithm by scattering the embedding locations over the entire image according to a PRNG on image c derived using seed k. This is very similar to the way that the randomized embedding approach improved the Hide & Seek algorithm. This method is more Secure than Jsteg approach. The main disadvantages of this method are this algorithm does not embed message data over any of the DC coefficients. And it also does not permit embedding on any AC coefficient equal to 0 or I.

e. F3 algorithm

Instead of avoiding embedding in DCT coefficients equal to 1, the F3 algorithm permitted embedding in these regions, whilst it would still avoid embedding in zeros and the DC coefficients. The algorithm still embedded the message data sequentially within c. Another change with this algorithm was that it did not embed directly in the least significant bits of the DCT coefficients, but instead took the absolute value of the coefficients first, before comparing them to the message bits. If both the absolute value of the coefficient, and the message bit were the same, then no changes are made. If they are different, then the absolute value of the DCT coefficient is reduced by 1. The main advantages over OutGuess are this method effectively embedded more zeros than ones. And it is more secure than OutGuess.

D. F4 algorithm

The F4 algorithm eliminates the two weaknesses of F3 in one stroke by mapping negative coefficients to the steganographic value, where even-negative coefficients = steganographic I, odd negative coefficients = 0, even-positive coefficients = 0 (as with JSteg and F3), and, odd-positive

coefficients = 1 . Put more simply, this means that now, if we embed a 0 in a DCT coefficient equal to -3, the result will remain -3, where as it would have been modified to -2 using F3. This means that the bit-flips now occur with roughly the same probability, so the histogram for the stegogramme will not appear unstructured in terms of its frequency distribution. The main advantages are this method reduces the number of changes necessary for hiding a message of a certain length. Instead of LSBs of quantized DCT coefficients with the message bits, the absolute value of the coefficient is decreased by one for modification. It minimizes the number of modifications of the cover image. And this method is much more secure than the F3 algorithm. The main disadvantage is it is vulnerable to recompression.

E. F5 algorithm

The F5 steganographic algorithm was introduced by (Westfeld. , 1995)[1O]. Rather than replacing the LSBs of quantized DCT coefficients with the message bits, the absolute value of the coefficient is reduced by the F5 algorithm by one if it needs modification. In addition to embedding message bits into randomly chosen DCT coefficients, the F5 algorithm employs matrix embedding that reduces the number of changes necessary for hiding a message of a certain length. Both, the message length and the number of non-zero coefficients are required in the embedding process to determine the matrix embedding needed to decrease the number of modifications required in the cover image.

V. PROPOSED SCHEME

In this paper we proposed a steganographic approach to detect fake share and then revealed secret image from original share. Our attacks are to reveal fake images which cheat honest participants. The steps are summarized as follows:

i) Generation of the shares using secret image. To construct shares of an image for participants, we need to prepare two collections, Co and C1 , which consist of n x m Boolean matrices. A row in a matrix Co and C1 corresponds to m sub pixels of a pixel, where 0 denotes the white sub pixel and I denotes the black sub pixel. For a white (or black) pixel in the image, we randomly choose a matrix M from Co (or CI, respectively) and assign row i of M to the corresponding position of share Sj, 1 <=i<=n. Each pixel of the original image will be encoded into n pixels, each of which consists of m sub pixels on each share. Since a matrix in Co and C1 constitutes only one pixel for each share. For security, the number of matrices in Co and C1 must be huge.

ii) Keeping in mind the concept of cheating by a Malicious Participant (MP) we have done a more thorough study on the creation of fake shares by taking a fake image of the same size of the secret image. There are two types of cheaters in our scenario. One is a malicious participant (MP) who is also a legitimate participant, namely, MP € P, and the other is a malicious outsider (MO), where MO ff. P.

In this paper, It has been shown that not only an MP can cheat, but also an MO can cheat under some circumstances. A cheating process against a VCS consists of the following two phases:

2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)

Page 4: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

a. Fake share construction phase: the cheater generates the fake shares;

b. Image reconstruction phase: the fake image appears on the stacking of genuine shares and fake shares.

Here a secret image can be distributed into ,p' secret shares, each of these are unique subset of original secret. Then embed secret text within each share (concept of steganography) for authentication. Then the image can be sent by electronic mail, where it appears as a casual attachment. At the time of recovering the receiver first decode the secret text from each share and check whether it is matched with secret text or not. If it is not, then that particular share is fake share. So fake image will be shown when stacking. The participant can cheat other. Cheating prevention can be done in our technique. If the shares are genuine, then by stacking the shares one can retrieve the original secret message. The block diagram of proposed work is shown in Figure-2.

8t_ .... h ......

l � r.--II'"" ' -'T

Or\CInal ........

0 ... 0:: ..... 11" ....

Figure-2: Proposed encoding and decoding method.

Algorithm -1: Algorithm for generating shares & retrieve the secret code:

Step 1: Convert the secret image into binary form, S[i][j]'

Step 2: Initialize 4 shares, S I [2i][2j], S2[2i][2j], S3[2i][2j], S4[2i][2j]. (Since, each pixel in secret image represents 4 pixel positions in share image.)

Step 3: Generate two different matrices for white and black pixel, SW[r][4] and SB[r][4] respectively. Where r � 4.

Step 4: Store the locations of white pixel of the secret image S[i][j] in X[m] and Y[m], where rows store in X[m] and columns store in Y[m] and m is the total numbers of white pixels in secret image S[i][j].

Step 5: For i = I to m

Step 6: Select position (a,b) of share images by calculating (2 *X[ i])-I and Y[i] respectively.

Step 7: Shuffle all rows of SW matrix;

Step 8: Insert first two bit of row i of SW matrix to the corresponding location of share Si at [a][b'] and [a][b '+ 1] respectively, where b' is (2*b)-1.

Step 9: a=a+ 1.

Step 10: Repeat Step 8.

End for (in Step 5)

Step 11: Store the locations of black pixel of the secret image S[i][j] in X[n] and Y[n], where rows store in X[n] and columns

store in Y[n] and n is the total numbers of black pixels in secret image S[i][j].

Step 12: For i = I to n

Step 13: Select position (a,b) of share image by calculating (2*X[i])-1 and Y[i] respectively.

Step 14: shuffle all rows of SB matrix;

Step 15: Insert first two bit of row i of SB matrix to the corresponding location of share Si at [a][b'] and [a][b'+1] respectively, where b' is (2*b)-1

Step 16: a=a+ 1

Step 17: Repeat step 15.

End for (in step 12. )

Step 18: Apply logical OR on all shares SI , S2, S3 and S4. And finally we get share S' = OR (S I, S2, S3, S4)

Step 19: S '[2i][2j] is the retrieve secret code.

Step 20: End

Algorithm -2: Algorithmfor generating Fake Share

Step 1: Input original share SI, and a fake image F, which has the same size of secret image S.

Step 2: Assume that each pixel of S I has X black and Y white sub-pixels.

Step 3: For each white pixel of the fake image F, copy the corresponding sub-pixels of the pixel in S I to fake share FS I'.

Step 4: For each black pixel of the fake image F, randomly assign X black and Y white sub-pixels to fake share FS I' such that the pixel in the stacking of fake share FSI' with original share S 1 is perfect Black.

Step 5: Generate fake share FSI'.

Algorithm -3: Algorithm for embedding secret messages

Step 1: Consider 4 shares , S I [2i][2j], S2[2i][2j], S3[2i][2j], S4[2i][2j] , and the secret message.

Step 2: Consider the secret message in binary in M[x][y].

Step 3: Using pseudo random number generator (PRNG), create locr[x][y], and locc[x][y] , which generate random locations of row and column respectively.

Step 4: For i=1 to x

Step 5: For j=1 to y

Step 6: If(j= =1) then

Embed the [i][j]th bit of secret message M into the share image SI[a][b], where a and b denoted the location locr[i][j] and locc[i][j] respectively.

Step 7: Else If (j = =2) then

20J4Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 709

Page 5: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

710

Step 8: Repeat step 7 for share S2.

Step 9: Else If(j= =3) then

Step 10: Repeat step 7 for share S3.

Step 11: Else Repeat step 7 for share S4.

End for (in step 5)

End for (in step 4)

Step 12: Four stego share SI, S2, S3 and S4 are generated with embedding a secret message M.

Step 14: End

Algorithm -4: A 19orithm for extracting secret message

Step 1: Consider 4 stego shares S I, S2, S3, S4 and the seed value k for generating pseudo random list.

Step 2: Using the seed value k generate locations locr[x][y] and locc[x][y], which denote some randomly locations of row and column respectively (and these locations are same as the locations used for embedding messages).

Step 3: For i=l to x

Step 4: For j=1 to y

Step 5: If(j = =1) then

Step 6: Extract the bit from SI[a][b], where a and b denoted the location locr[i][j] and locc[i][j] respectively, and store the bit into M'[i][j].

Step 7: Else If (j= =2) then

Step 8: Repeat step 6 for share S2.

Step 9: Else If (j= =3) then

Step 10: Repeat step 6 for share S3.

Step 11: Else repeat step 6 for share S4.

End for (in step 4)

End for (in step 3)

Step 12: Finally genegare M'[x][y] as an extracted message.

Step 13: End

Algorithm -5: Algorithm for checking shares

Step 1: Consider original secret message M[x][y] and 4 stego shares SI, S2, S3, S4.

Step 2: Then create a transfonnation matrix MI [y][x] of M[x][y],

Step 3: Then using Algorithm -4 , extract message M'[x][y] from these 4 stego shares.

Step 4: Then create a transformation matrix M2[y][x] of M'[x][y],

Step 5: If (MI[y][x] = = M2[y][x]) then make sure that all shares are original, otherwise set a flag f = O.

Step 6: For i=1 to y

Step 7: For j=1 to x

Step 8: If (Ml [y][x] != M2[y][x]) then change the flag value f = 1.

End for (in step 9)

End for (in step 8)

Step 9: If ( f = = I) then make sure that Si is the fake share.

Step 10: End

VI. EXPERIMENT AL RESULT AND COMPARISON

The original secret image shown in Figure-3 and generation of 4 shares or transparencies are shown in Figure-4 using Algorithm -I. The transparencies are usually shared by 4 participants so that each participant is expected to keep one transparency. The secret image can be retrieve if any 3 or more of them are stacked together which are shown in Figure-6. However, the secret image is totally invisible if fewer than 3 transparencies are stacked is shown in Figure -5. By stacking all the shares one can get the original image in perfect black shown in Figure-7.

Fi re-3: Ori inal ima e

SI S2

S3 S4

SI & S2 SI & S3

S3 & S4 S2 & S4

2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)

Page 6: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

Figure-5: Stacking of two shares S I & S2, S I &S3, S3& S4, and S2&S4, no visual infonnation can retrieve.

SI,S3,S4 S2,S3,S4

SI,S2,S3 SI,S2,S4

Figure-6: information can be retrieve.

Figure-7: Result of stacking all shares.

Malicious Participant (MP) may cheat by creating a FS by taking another fake image in Figure-8 and giving it to others when asked for the share. The FS is created with the help of the original share (SI) using Algorithm-2 shown in Figure -9. It would be impossible to detect it with a normal look that it is a FS and not the original one.

Figure-8:

Figure-9: (by Share

Figure-IO: Stacking of Fake Share and S I, generate fake image.

OverJaped result of the FS with the share Sl is shown in Figure-IO which only shown fake image. Also overlapping the FS with all other shares including original share SI are shown in Figure-l I which only shown fake image. In Figure -12 we present the result of stacking of fake share with any one share excluding Sl . When stack FS with all the shares excluding the S I, one can get both the images in an overlapped manner which will create a confusion , called Partial Cheating is shown in Figure-l 3. This is known as partial cheating as it creates a kind of confusion between the participants about the original image.

FSl,SI,S2 FS I.S I,S3

FSI,SI,S4 FS I,S I ,S2,S3

FS I,S I ,S2,S4 FS I,S I ,S3,S4

FS I,S I ,S2,S3,S4 all other shares Including

FSI, S2 FSI, S3

FSI, S4

Figure-12: Overlapping the Fake Share with all other shares excluding original share (S I) which shown overlapped image for partial cheating.(Here we using only two share, so no information can be retrieve, but fake image can be shown for

FSI, S3, S4 FSI, S2, S4

20J4Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 711

Page 7: Cheating Prevention in Visual Cryptography using ...blueyetechnologies.co.in/wp-content/uploads/2017/08/Cheating... · Cheating Prevention in Visual Cryptography using Steganographic

712

FS1, S2, S3, S4

Fig-13: Overlapping the Fake Share with all other shares excluding original share (S 1) which shown overlapped image for partial cheating

The cheating in VCS can be prevented by our proposed method using steganographic scheme.

;;:--; '"': fi-;rj7,,�c.., �J1IIIfCIiWoI' ---- ---; _tIooo ...... Jl_, ....

. . .. .

JU�l'OPIII 11I1:w.)It'" ' ..... :li'II,"._ :�lI3M":.PIII lQ. ,,:u,..

::�:�rv'! 2Uk'!J"·I .... n.M'lJuvPIII

�:�::::::: 2UllUl)I1." 1 ... .... '!11 ...

�:� ...... -� . n_" .. lh_ ...

__ ,"._�""'"

H .. lII/I)]lIl>o1 . n •• "u .. _ ......... " ..... , .. ..

�=::;'Q�': I :::�;:::::-'

... . �,

".,,,.11 _I ...... . ",,!of �11 _ •• , .. .. � .,.""",,, � .. .",..n __ ., . .... t .... .... ,,,./1 _,.,. ''''.11, ...... , .. , _ • .. .,' .... 11 ....... ............... ,_.

1 r. ... '} " 9 "EJ 0 . , :;.,

Fig-14: Screen shot of the message extraction and detection of fake share.

It has been implemented using MATLAB (2008a Version) shown in Figure-14. Here we embed a secret message in the original shares in some randome location using PRNG, when the participants submit their shares a checking is done to check the secret embedded message. If the message is found to be matched then it is the original share and if it is not the same message found then the system confirm that it is a FS.

Distortion is measured by means of two parameters namely, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR).

The MSE is calculated by using the equation,

. . . . . . . . . . . . . . . . (1)

where M and N denote the total number of pixels in the horizontal and the vertical dimensions of the image Xi. j represents the pixels in the original image and Vi. j, represents the pixels of the stego-image.

The Peak Signal to Noise Ratio (PSNR) is expressed as The PSNR is calculated using the equation,

PSNR= 1 0 100 (I�ax JdB . . . . . . . . . . . . . . . . . . . . . . . (2)

0 )0 MSE

Where Imax is the intensity value of each pixel which is equal to 255 for 8 bit gray scale images. Higher the values of PSNR better the image quality. Distortion Analysis of stego share gave the good results.

The analysis in terms of PSNR of original share and stego­share has gives promising result. It has been found that from the same capacity the PSNR of our propose algorithm is better than other one and is near to 70.

VII. CONCLUSION

Stacking the Fake Share with all other share includes Sl , it will show the Fake image, and when stack the Fake Share with all other shares excluding SI then show overlapping image of original image and fake image. This is as mentioned earlier is known as Partial Cheating, creates the confusion between the users about original image. This type of cheating is done by a Malicious Participant. It is very easy for a Malicious Participant to cheat others as he knows the size of the share and can easily develop a fake share with the help of a fake image and his share. Fake share can be detected by checking the message, embeded within it without any verification share. The system can be improved by embedding secret message in column major to different share, so that we can give the priority to each share. Priority based VC can be used in different organization which can be developed in future.

REFERENCES

[I] M. Naor and A. Shamir, "Visual cryptography, " in Proc. Advances in Cryptology, 1994, vol. 950, LNCS, pp. 1-12.

[2] C.N. Yang and C.S. Laih, "Some new types of visual secret sharing schemes, " in Proc. Nat. Computer Symp., Vol. 3, pp. 260-268, 1999

[3] G.B. Homg, T.H. Chen, and D.S. Tsai, "Cheating in Visual Cryptography, " Designs, Codes and Cryptography, Vol. 38, pp. 219-

236, 2006.

[4] C.M. Hu and W. G. Tzeng, "Cheating prevention in visual cryptography, " IEEE Transactions on Image Processing, Vol. 16, No.

1, pp. 36-45, 2007

[5] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptographyfor general access structures, " Inf. Comput., vol. 129, no. 2,pp. 86-106, 1996.

[6] W.-G. Tzeng and C.-M. Hu, "A newapproach for visual cryptography, " Designs, Codes, Cryptog., vol. 27, no. 3, pp. 207-227, 2002.

[7] M. Naor and B. Pinkas, "Visual authentication and identification, " in Proc. Advances in Cryptology, 1997, vol. 1294, LNCS, pp. 322-336.

[8] I. Biehl and S.Wetzel, "Traceable visual cryptography, " in Proc. 1st Int. Conf. Information Communication Security, 1997, vol. 1334, LNCS, pp. 61-71.

[9] G.-B. Homg, T.-G. Chen, and D.-S. Tsai, "Cheating in visual cryptography, " Designs, Codes, Cryptog., vol. 38, no. 2, pp. 219-236, 2006.

[10] A. Westfeld. "F5 - A Steganographic Algorithm: High Capacity Despite Beller Steganalysis", Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 200 I G.

[II] Y.c. Chen, G. Homg, and D.S. Tsai, "Cheating prevention in visual

cryptography, " In Cimato, S. and Yang, C.N. (eds), Visual Cryptography and Secret Image Sharing, 201 I. CRCPress / Taylor & Francis, Boca Raton, FL.

[12] Y.c. Chen, G. Homg, and D.S. Tsai, "Comment on "Cheating Prevention in Visual Cryptography ", " IEEE Transactions on Image Processing (Accepted), 2012.

2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)