12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010 139IV. OUR CONTRIBUTIONThe state <strong>of</strong> the art <strong>in</strong> visual cryptography leads to thedegradation <strong>in</strong> the quality <strong>of</strong> the decoded images, whichmakes it unsuitable for digital media (image, video)shar<strong>in</strong>g and protection. This is quite obvious <strong>in</strong> figure 2where the white background <strong>of</strong> the orig<strong>in</strong>al imagebecomes gray <strong>in</strong> the decrypted image.Through this paper, I propose a visual cryptographicschemes that not only can support grayscale and colorimages, but also allow high quality images <strong>in</strong>clud<strong>in</strong>g that<strong>of</strong> perfect (orig<strong>in</strong>al) quality to be reconstructed.The nagg<strong>in</strong>g presence <strong>of</strong> the loss <strong>of</strong> contrast makestraditional visual cryptography scheme practical onlywhen quality is not an issue which is quite rare. I havetherefore focused our attention on specificallyovercom<strong>in</strong>g this problem by primarily devot<strong>in</strong>g ourefforts towards improv<strong>in</strong>g the quality <strong>of</strong> the reconstructedimages. I first extend the basic scheme from [1] to allowvisual cryptography to be directly applied on grayscaleand color images. Image halfton<strong>in</strong>g is employed <strong>in</strong> orderto transform the orig<strong>in</strong>al image from the grayscale/colorspace <strong>in</strong>to the monochrome space which has proved to bequite effective.It is a well known fact that the digital halfton<strong>in</strong>g isalways a lossy process [2], which means that whenever ahalfton<strong>in</strong>g is used for the transformation, it is impossibleto fully reconstruct the orig<strong>in</strong>al secret image. A newencod<strong>in</strong>g scheme has therefore been developed whichallows for perfectly lossless transformation betweenmonochrome, grayscale and color spaces. This newencod<strong>in</strong>g scheme can be seamlessly <strong>in</strong>corporated <strong>in</strong>to theproposed scheme for visual cryptography and it allowsthe orig<strong>in</strong>al secret image to be perfectly restored. Ibelieve this advancement <strong>in</strong> visual cryptography can beuseful <strong>in</strong> secret shar<strong>in</strong>g <strong>of</strong> images, <strong>in</strong> transmission <strong>of</strong>secret images over multiple untrustworthy channels, <strong>in</strong> e-commerce <strong>of</strong> digital media and <strong>in</strong> digital rightsmanagement <strong>of</strong> digital media..(a) Sample <strong>of</strong> monochrome image(b) The first Share(c) The second shareV. OUR APPROACHA. For Monochrome ImagesUs<strong>in</strong>g XOR to Fully Restore Monochrome SecretImages :-I, first made the crucial observation that withjust one additional computational operation; eventraditional visual cryptography can allow full recovery <strong>of</strong>the secret b<strong>in</strong>ary image. Normally, when we superimposethe two shares pr<strong>in</strong>ted on transparencies, this stack<strong>in</strong>goperation is computationally modeled as the b<strong>in</strong>ary ORoperation which causes the contrast level to be lowered.By simply substitut<strong>in</strong>g this OR operation with the XORoperation, the orig<strong>in</strong>al b<strong>in</strong>ary image can be recoveredwithout any loss <strong>in</strong> contrast. Thus, the produced imagecould have a more visually pleasant appearance with lessstorage space requirement. However, the XOR operationneeds computation - the physical stack<strong>in</strong>g process canonly simulate the OR operation. Figure 3 recovers thesame secret image as <strong>in</strong> figure 2 us<strong>in</strong>g the XOR operationand thus it is clearly evident that the contrast <strong>of</strong> theorig<strong>in</strong>al image is restored.(d) The stacked Image with XORFig 3. Implementation <strong>of</strong> proposed methodologyAs we have seen earlier, the application <strong>of</strong> digitalhalfton<strong>in</strong>g techniques results <strong>in</strong> some downgrad<strong>in</strong>g <strong>of</strong> theorig<strong>in</strong>al image quality due to its <strong>in</strong>herently lossy natureand it is not possible to recover the orig<strong>in</strong>al image fromits halftone version. We will refer to this proposedscheme as EVCS (Efficient Visual CryptographicScheme).The novelty <strong>of</strong> my approach is that it not only allowsthe secret image to be just seen but allows the secretimage to be reconstructed with perfect quality. Theadvantage <strong>of</strong> this approach is that it still reta<strong>in</strong>s thecrucial advantages <strong>of</strong> traditional visual cryptography likesimplicity, visual decod<strong>in</strong>g and perfect security. Theextra feature is that depend<strong>in</strong>g on whether additionalcomput<strong>in</strong>g resources are provided, images <strong>of</strong> different© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!