You are on page 1of 11

TITLE

VISUAL CRYPTOGRAPHY
AGENDA
TITLE
ABSTRACT
INTRODUCTION
PROBLEM DESCRIPTION & OBJECTIVES
METHODOLOGY
CONCLUSION
REFERENCES
ABSTRACT
INTRODUCTION
Visual cryptography was introduced by Naor and
Shamir at EUROCRYPT '94.
It is used to encrypt written material (printed text,
handwritten notes, pictures, etc) in a perfectly secure
way.
The decoding is done by the human visual system
directly.
CONTD..
Plaintext (in form of image)

Encryption (creating shares)

Channel (Fax, Email)

Decryption (Human Visual System)


CONTD..
For a set P of n participants, a secret image S is encoded into n
shadow images called shares, where each participant in P receives
one share.
Certain qualified subset of participants can visually recover the
secret image, but other, forbidden, sets of participants have no
information on S.
A visual recovery for a set X of participants consists of copying the
shares onto transparencies, then stacking them on a projector.
The participants in a qualified set X will be able to see the secret
image without any knowledge of cryptography and without
performing any cryptographic computation.
PROBLEM DESCRIPTION
To design an encryption algorithm that efficiently encrypts and
provides high level security for visual information and perform
decryption by human visual system without using any decryption
algorithm.

To achieve a Visual Cryptography technique which can send multiple


secrets at the same instant of time. 

To identify the best Half toning technique which can integrate the
above method.

To focus on increasing the number of shares which leads to increase the
security.
METHODOLOGY
The three phases in visual cryptography scheme are 

Phase 1- Visual Cryptographic Encryption.


Phase 2- Generation of Watermarked Shares.
Phase 3- Visual Cryptographic Decryption.
CONCLUSION
Proposed scheme provides a high-level security for
visual information.
First phase i.e. visual cryptographic encryption adds
the advantages and security of basic schemes.
Then phase two adds the advantage and security
algorithm. Here we get the shares with some
information as some image can be shown in the shares
with respect to completely black and white pixels in
basic scheme.
REFERENCES
Moni Naor and Adi Shamir (1994) Visual Criptography,
Eurocrypt 94
G. Ateniense, C. Blundo, A. de Santis and D.R.Stinson (1996)
Visual Cryptography for General Access Structures.
N. Nakajima nd Y. Yamaguchi (n.d.), Extended Visual
Cryptography for Natural Images
D. Stoleru (2005), Extended Visual Cryptography Schemes, Dr.
Dobb’s, 377, October 2005
D. Stinson (2002), Visual Cryptography or Seeing is Believing,
pp presentation in pdf.

You might also like