Visual Cryptography Applications to Securing UAV-to-Ground Video Feeds

  • Maya Salah Al-Hemeiri

    Student thesis: Master's Thesis

    Abstract

    Modern mobile applications often require sharing multimedia contents among groups of users who cannot be expected to run conventional encryption/decryption algorithms. To handle these scenarios, several image sharing techniques that do not require keys are being proposed. Image sharing falls under the general concept of secret sharing. The main idea of visual Encryption is to hide a secret image by encoding it into multiple shares. After that, shares are simply superimposed to recover the secret. Visual Encryption is based on dividing a binary image (the secret) into shares and distributing these shares among n participants via separate channels. The original image can be recovered by stacking together the shares. Stacking (decryption) is done by the human vision system (HVS) and requires no key or complex protocols for reconstructing the secret. Our technique uses Visual Encryption to hide a binary image (the secret) by encoding it into shares. The original image can be recovered by stacking together the shares. Our system implements a (2,2)-VCS that takes two binary secret images as an input and divides each one into 2 meaningless shares. Shares are distributed among 2 participant ground stations via two separate transmission channels where each participant gets one share. The original image (secret) can be recovered by stacking together the shares. Stacking (decryption) is done by the human vision system (HVS) and requires no keys, device or complex protocol for reconstructing the secret. The generated shares are four times the original image size and they are meaningless, random noise and they all look alike. Visual Encryption is a simple and fast technique used to ensure secure image transmis- sion. Therefore, it is suitable for further investigation for drone-to-ground communication. Indexing Terms: Visual Encryption, Visual Cryptography, UAV, Drone, Cheating.
    Date of AwardJun 2016
    Original languageAmerican English
    SupervisorErnesto Damiani (Supervisor)

    Keywords

    • Visual Encryption
    • Visual Cryptography
    • UAV
    • Drone
    • Cheating.

    Cite this

    '