Secure Transmission of Video using (2,2) Visual Cryptography Scheme and Share Encryption using Logistic Chaos Method

Authors

  • Sangita Vishwakarma  M. Tech Scholar, CSE, RITEE, Mandir Hasaud, Raipur, Chhattisgarh, India
  • Shahana Qureshi  Assistant Professor, Computer Science Dept., RITEE Mandir Hasaud, Raipur, Chhattisgarh, India

Keywords:

Visual Cryptography, Chaotic Maps, Security, Video Encryption, Pixel Shuffling.

Abstract

The crucial issue on World Wide Web is the security of communication and authentic transmission of confidential multimedia elements. Web has progressed towards becoming most ordinarily utilized media for communication and consequently message, voice, video, images and numerous more are transmitted through Internet. Cryptography is an important way of sending confidential information in a secret way. There are many cryptographic techniques available. One such variation is visual cryptography in which the image is divided into two or more shares in such a way that the original image cannot be recovered until all the shares are obtained and stacked together. In the present years, various algorithms of visual cryptography in image were considered and developed for the security of the image. In this paper, we have proposed visual cryptography in videos using pixel shuffling method as well as encrypting the videos shares using logistic chaos method. Experimental results and analysis show that the proposed technique can offer greater efficiency regarding the security of information transmission.

References

  1. Moni Naor and Adi Shamir, "Visual Cryptography", Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, Vol. 950, Springer, Berlin, 1995, pp. 1–12
  2. C.C. Wu, L.H. Chen, "The Comparative Study on Visual Cryptography and Random Grid Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
  3. H.-C.Hsu, T.-S.  Chen,Y.-H.Lin, "The Ring Shadow Image Technology Of Visual Cryptography By Applying Diverse Rotating Angles To Hide The Secret Sharing", in Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control, Taipei, Taiwan, pp.996– 1001, March 2004.
  4. H.-C.Wu, C.-C.Chang, "Sharing Visual Multi-Secrets Using Circle Shares", Comput. Stand. Interfaces 134 (28), pp.123–135, (2005).
  5. S.J.Shyu, S.Y.Huanga, Y.K.Lee, R.Z.Wang, and K.Chen, "Sharing multiple secrets in visual cryptography", Pattern Recognition, Vol.40, Issue 12, pp.3633-3651, 2007.
  6. Wen-Pinn Fang, "Visual Cryptography In Reversible Style", IEEE Proceeding on the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP2007), Kaohsiung, Taiwan, R.O.C, 2007.
  7. Jen-Bang Feng, Hsien-ChuWu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu, "Visual Secret Sharing For Multiple Secrets", Pattern Recognition 41, pp.3572–3581, 2008.
  8. Mustafa Ulutas, Rıfat Yazıcı, Vasif V.Nabiyev, Güzin Ulutas, (2, 2)- "Secret Sharing Scheme With Improved Share Randomness",978-1-4244-2881-6/08,IEEE,2008.
  9. Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei, "Multiple-Image Encryption By Rotating Random Grids", Eighth International Conference on Intelligent Systems Design and Applications, pp. 252-256, 2008.
  10. Wen-Pinn Fang,"Non-Expansion Visual Secret Sharing In Reversible Style", IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009.
  11. Zhengxin Fu, Bin Yu, "Research on Rotation Visual Cryptography Scheme", International Symposium on Information Engineering and Electronic Commerce, pp 533-536, 2009.
  12. Jonathan Weir, Wei Qi Yan, "Sharing Multiple Secrets Using Visual Cryptography", 978-1-4244-3828-0/09, IEEE, pp509-512, 2009.
  13. E. Verheuland H. V. Tilborg, "Constructions and Properties of K Out Of N Visual Secret Sharing Schemes" Designs, Codes and Cryptography, 11(2), pp.179–196, 1997.
  14. C. Yang and C. Laih, "New Colored Visual Secret Sharing Schemes". Designs, Codes and cryptography, 20, pp. 325– 335, 2000.
  15. C. Chang, C. Tsai and T. Chen, "A  New  Scheme  For  Sharing  Secret  Color  Images  In  Computer  Network", Proceedings of International Conference on Parallel and Distributed Systems, pp. 21–27, July 2000.
  16. Chin-Chen Chang, Tai-Xing Yu, "Sharing A Secret Gray Image In Multiple Images", Proceedings of the First International Symposium on Cyber Worlds (CW.02), 2002.
  17. R.  Lukac, K.N.  Plataniotis, "Bit-Level Based Secret Sharing For Image Encryption", Pattern Recognition 38 (5), pp. 767–772, 2005.
  18. R.Youmaran, A.  Adler, A. Miri, "An Improved Visual Cryptography Scheme For Secret Hiding", 23rd Biennial Symposium on Communications, pp. 340-343, 2006.
  19. S.J.  Shyu, "Efficient Visual Secret Sharing Scheme For Color Images", Pattern Recognition 39(5) ,pp. 866–880, 2006.
  20. Mohsen  Heidarinejad,  Amirhossein  Alamdar  Yazdi  and  Konstantinos N. Plataniotis Algebraic Visual Cryptography Scheme For Color Images", ICASSP, pp. 1761-1764, 2008.
  21. Haibo Zhang, Xiaofei Wang,Wanhua Cao, Youpeng Huang, "Visual Cryptography For General Access Structure By Multi-Pixel Encoding With Variable Block Size", International Symposium on Knowledge Acquisition and Modeling, pp. 340-344, 2008.
  22. F. Liu1, C.K. Wu X.J. Lin, "Colour Visual Cryptography Schemes", IET Information Security, vol. 2,No. 4, pp 151-165, 2008.
  23. Wei Qiao, Hongdong Yin, Huaqing Liang, "A kind Of Visual Cryptography Scheme For Color Images Based On Halftone Technique", International Conference on Measuring Technology and Mechatronics Automation 978-0-7695-3583-8/09, pp. 393-395, 2009.
  24. Du-Shiau  Tsai,  Gwoboa  Horng,  Tzung-Her  Chen,  Yao-TeHuang, "A Novel Secret Image Sharing Scheme For True Color Images With Size Constraint", Information Sciences 179 3247–3254 Elsevier, 2009.
  25. Daoshun Wang, Feng Yi, XiaoboLi, "On General Construction For Extended Visual Cryptography Schemes", Pattern Recognition 42(2009), pp 3071– 3082, 2009
  26. Jung-San Lee, T.Hoang Ngan Le, "Hybrid (2, N) Visual Secret Sharing Scheme For Color Images", 978-1-4244-4568-4/09, IEEE, 2009.
  27. K.Shankar and Dr. P. Eswaran, "ECC Based Image Encryption Scheme with aid of Optimization Technique using Differential Evolution Algorithm", International Journal of Applied Engineering Research, ISSN 973-4562, Vol 10, No. 55 (2015).
  28. DiShiau Tsi, Tzung-Her Chen and Gwoboa Horng, "A Cheating Prevention Scheme for Binary Visual Cryptography with Homogeneous Images ", The Journal of Pattern Recognition Society, pattern Recognition 40 (2007) 2356-2366.
  29. R. Anushiadevi, Padmapriya Praveen Kumar, John Bosco and Rengarajan, "Revolving of pixels and bits in Pixels-Plan (E) Tary Encryption ", Reserch Journal of Information Technology, ISSN 1815-7432, DOI: 10.3923/rjit.2017.25.31.
  30. Shankar K and Eswaran P, "Sharing a secret image with Encapsulated Shares in Visual Cryptography", 4th International Conference on Eco-friendly Computing and Communication System, ICECCS, 2015, Procedia Computer Science 70 (2015) 462 – 468.
  31. Zhou, K. Panetta, S. Agaian and C. L. P Chen, "Image Encryption Using P – Fibonacci Transform and Decomposition", Optics Communication, 285: 594-608.
  32. Hongjun Lia and Xingyuan Wang, "Color image encryption using spatial bit-level permutation and high-dimension chaotic system", Optics Communications, 284 (2011) 3895–3903, August 2011.
  33. Obaida M. Al-Hazaimeh, Nouh Alhindawi, Sofyan M. A. Hayajneh and Ammar Almomani, "HANON Chaotic Map-Based New Digital Image Encryption Algorithm", MAGNT Research Report (ISSN. 1444-8939) Vol.2 (4). PP: 261-266, August 2014.
  34. Paul A.J, P. Mythili and K. Paulose Jacob, "Matrix based cryptographic procedure for efficient image encryption", Conference Paper • September 2011, DOI: 10.1109/RAICS.2011.6069296.
  35. Aman Chadha, Sushmit Malik, Ravdeep Kaur, Ankit Chadha and M. Mani Roja, "Dual-Layer Video Encryption using RSA Algorithm", International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 1, April 2015.
  36. Bhawna Shrivas and Shweta Yadav, "Visual Cryptography in the Video using Halftone Technique", International Journal of Computer Applications (0975 – 8887) Volume 117 – No.14, May 2015.
  37. Noora Shihab Ahmed, Halabja University, " Multi-Image Encryption Technique Based on Permutation of Chaotic System", International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:16 No:01
  38. Rezvaneh Babazade Gorji ,Mirsaeid Hosseini Shirvani, Farhad Ramezani Mooziraji, "A new image encryption method using chaotic map",  Journal of Multidisciplinary Engineering Science and Technology (JMEST) ISSN: 3159-0040 Vol. 2 Issue 2, February – 2015
  39. Hossam Eldin H. Ahmed, Ayman H. Abd El-aziem, "Image Encryption Using Development of Chaotic Logistic Map Based on Feedback Stream Cipher", Recent Advances In Telecommunications, Informatics And Educational Technologies, ISBN: 978-1-61804-262-0.
  40. Kamal Jadidy Aval, Morteza Sabery Kamarposhty, Masumeh Damrudi, "A Simple Method for Image Encryption Using Chaotic Logistic Map", Journal of Computer Science & Computational Mathematics, Volume 3, Issue 3, September 2013
  41. Nicole Kengnou Telem, ColinceMeli Segning,Godpromesse Kenne and Hilaire Bertrand Fotsin, "A Simple and Robust Gray Image Encryption Scheme UsingChaotic Logistic Map and Artificial Neural Network", Hindawi Publishing Corporation, Advances in Multimedia Volume 2014, Article ID 602921, 13 pages, http://dx.doi.org/10.1155/2014/602921
  42. Liguo Fang, BinYu, "Research On Pixel Expansion Of (2,n) Visual Threshold Scheme", 1st International Symposium on Pervasive Computing and Applications ,pp. 856-860, IEEE.
  43. M. Yang, N. Bourbakis, and S. Li, "Data-image-video encryption," IEEE Potentials, vol. 23, no. 3, pp. 28–34, 2004.
  44. Y. Mao and G. Chen, Chaos-Based Image Encryption, Springer,Berlin, Germany, 2005.
  45. G. Ye, "Image scrambling encryption algorithm of pixel bit based on chaos map," Pattern Recognition etters, vol. 31, no. 5, pp. 347–354, 2010.
  46. S. Fu-Yan, L. Shu-Tang, and L. Zong-Wang, "Image encryption using high-dimension chaotic system," Chinese Physics, vol. 16,no. 12, pp. 3616–3623, 2007.
  47. V. Patidar, N. K. Pareek, and K. K. Sud, "A new substitutiondiffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056–3075, 2009.
  48. Y. Wu, J. P. Noonan, G. Yang, and H. Jin, "Image encryption using the two-dimensional logistic chaotic map," Journal of Electronic Imaging, vol. 21, no. 1, Article ID013014, 2012.
  49. Y. Wu, J. P. Noonan, and S. Agaian, "A wheel-switch chaotic system for image encryption", Proceedings of the International Conference on System Science and Engineering (ICSSE ’11), pp. 23–27, June 2011.
  50. D. Valli and K. Ganesan, "Chaos based video encryption  using maps and Ikeda time delay system", THE EUROPEAN PHYSICAL JOURNAL PLUS (2017) 132: 542 DOI 10.1140/epjp/i2017-11819-7.
  51. Saumya Batham, Anuja Kumar Acharya, Virendra Kumar Yadav, Rahul Paul, "A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence", Confluence 2013: IEEE, The Next Generation Information Technology Summit (4th International Conference), June 2014, DOI: 10.1049/cp.2013.2307.
  52. Franco Chiaraluce, Lorenzo Ciccarelli, Ennio Gambi, Paola Pierleoni and Maurizio Reginelli, "A NEW CHAOTIC ALGORITHM FOR VIDEO ENCRYPTION", IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, NOVEMBER 2002.
  53. Saumya Batham, Virendra Kumar Yadav, Amit Kumar Mallik, "ICSECV: An Efficient Approach of Video Encryption", IEEE, 2014 Seventh International Conference on Contemporary Computing (IC3), DOI: 10.1109/IC3.2014.6897211.
  54. Ms. Pooja Deshmukh, Ms. Vaishali Kolhe, "Modified AES Based Algorithm for MPEG Video Encryption", IEEE, 2014 International Conference on  Information Communication and Embedded Systems (ICICES), DOI: 10.1109/ICICES.2014.7033928.
  55. Aya Khalid Naji,  Saad Najim Alsaad, " Data (Video) Encryption in Mobile Devices",  Kurdistan Journal of Applied Research (KJAR),  Print-ISSN: 2411-7684 – Electronic-ISSN: 2411-7706, Volume 2, Issue 3, August 2017, DOI: 10.24017/science.2017.3.17.
  56. Ping Zhen, Geng Zhao, Lequan Min, Xiaodong Li, IEEE, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, DOI 10.1109/3PGCIC.2014.69.
  57. ROHITH S, K N HARI BHAT, A NANDINI SHARMA, "Image Encryption and Decryption using Chaotic Key Sequence Generated by Sequence of Logistic Map and Sequence of States of Linear Feedback Shift Register", IEEE, 2014 International Conference on  Advances in Electronics, Computers and Communications(ICAECC), DOI: 10.1109/ICAECC.2014.7002404.
  58. Zeinab Fawaz, Zeinab Zbib, Ayman Khalil and Samih Abdul-Nabi, "Chaos-Based Video Encryption for Network Coded Wireless Systems", IEEE, 2013 25th International Conference on  Microelectronics (ICM) DOI: 10.1109/ICM.2013.6734982.
  59. Dhananjay M. Dumbere, Nitin J. Janwe, "Video Encryption Using AES Algorithm", IEEE, 2nd International Conference on Current Trends in Engineering and Technology, ICCTET’14, DOI: 10.1109/ICCTET.2014.6966311.
  60. W. Hamidouche, M. Farajallah, M. Raulet, O. D´eforges and S. El Assad, "SELECTIVE VIDEO ENCRYPTION USING CHAOTIC SYSTEM IN THE SHVC EXTENSION", 2015 IEEE International Conference on  Acoustics, Speech and Signal Processing (ICASSP), DOI: 10.1109/ICASSP.2015.7178273
  61. Keshav S. Kadam, Prof. A. B. Deshmukh, "Video Frame Encryption Algorithm using AES", International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 5 Issue 06, June-2016.
  62. Min Long, Li Tan, "A chaos-based data encryption algorithm for image/video", IEEE,2010 Second International Conference on  Multimedia and Information Technology (MMIT), DOI: 10.1109/MMIT.2010.27.
  63. Pradeep Pai T, Raghu Me, Ravishankar K C, "Video Encryption For Secure Multimedia Transmission - A
  64. Layered Approach", 2014 3rd International Conference On Eco-Friendly Computing And Communication Systems, Doi: 10.1109/Eco-Friendly.2014.101.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Sangita Vishwakarma, Shahana Qureshi, " Secure Transmission of Video using (2,2) Visual Cryptography Scheme and Share Encryption using Logistic Chaos Method, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1502-1514, January-February-2018.