Two-Image Encryption by Random Grids 1 Joy Jo-Yi Chang, Ming-Jheng Li, Yi-Chun Wang and Justie Su-Tzu Juan National Chi Nan University.

Slides:



Advertisements
Similar presentations
Simulation Examples in EXCEL Montana Going Green 2010.
Advertisements

HOPS: Efficient Region Labeling using Higher Order Proxy Neighborhoods Albert Y. C. Chen 1, Jason J. Corso 1, and Le Wang 2 1 Dept. of Computer Science.
Variable Metric For Binary Vector Quantization UNIVERSITY OF JOENSUU DEPARTMENT OF COMPUTER SCIENCE JOENSUU, FINLAND Ismo Kärkkäinen and Pasi Fränti.
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Form Image Compression using Template Extraction and Matching Jianguo Wang and Hong Yan School of Electrical and Information Engineering University of.
Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)
SYEN 3330 Digital SystemsJung H. Kim Chapter SYEN 3330 Digital Systems Chapter 2 – Part 1.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
Wavelet-based Image Fusion by Sitaram Bhagavathy Department of Electrical and Computer Engineering University of California, Santa Barbara Source: “Multisensor.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
3-D Scene u u’u’ Study the mathematical relations between corresponding image points. “Corresponding” means originated from the same 3D point. Objective.
Algorithms A Central Heating system Start Is temp <19
4x + 2y = 18 a. (1,8) = 18 a. 4(1) + 2(8) = 18 b. (3,3)20 = 18 b. 4(3) + 2(3) = = = 18 15x + 5y = 5 a. (-2,7) NoYes b. (-1,4) a.
Epipolar geometry Epipolar Plane Baseline Epipoles Epipolar Lines
XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids Xiaotian Wu, Lu Dai, Duanhao Ou, Wei Sun 報告者: 李宏恩.
Combining Undersampled Dithered Stars Guoliang Li & Lei Wang Purple Mountain Observatoy.
Distribute and Combine Like Terms Applications. What is the area of the following shape? 5 2x-3 1.
Evaluation and simulation of global terrestrial latent heat flux by merging CMIP5 climate models and surface eddy covariance observations Yunjun Yao 1,
Measurements in Fluid Mechanics 058:180 (ME:5180) Time & Location: 2:30P - 3:20P MWF 3315 SC Office Hours: 4:00P – 5:00P MWF 223B-5 HL Instructor: Lichuan.
Picture Manipulation using Hardware Presents by- Uri Tsipin & Ran Mizrahi Supervisor– Moshe Porian Characterization presentation Dual-semester project.
Figure 1. First period harvest units on the Putnam Tract using mixed integer programming methods.
Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Saliency detection Donghun Yeo CV Lab..
2003/04/291 Hiding data in images by optimal moderately- significant-bit replacement Wang, Ran-Zan, Lin, Chi-Fang, and Lin, Ja-Chen, IEE Electronics Letters,
Content-Sensitive Screening in Black and White
Discussion #29 – Images II
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Rob Fergus Computer Vision
Information Steganography Using Magic Matrix
Sheqin Dong, Song Chen, Xianlong Hong EDA Lab., Tsinghua Univ. Beijing
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Chair Professor Chin-Chen Chang Feng Chia University
High-capacity image hiding scheme based on vector quantization
Source: Signal Processing 109 (2015) 317–333
Find the area of the part of the plane 8x + 2y + z = 7 that lies inside the cylinder {image}
Hefei Electronic Engineering Institute, Hefei , China
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Algebra Midterm Jeopardy
Source: Information Sciences, 2018, accpeted.
The New Developments in Visual Cryptography
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Information Steganography Using Magic Matrix
A connectionist model in action
High Capacity Data Hiding for Grayscale Images
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Reporter :Liang, Min-Chen Date :2003/05/06
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Space groups Start w/ 2s and 21s 222.
The Image The pixels in the image The mask The resulting image 255 X
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Ratio and Proportion Section 7-1.
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Two-Image Encryption by Random Grids 1 Joy Jo-Yi Chang, Ming-Jheng Li, Yi-Chun Wang and Justie Su-Tzu Juan National Chi Nan University

R1R1 R2R2 R 1 ⊕ R BBR1R1 R1R1 R2R2 BR2R2 R1R1 R2R2 BR1R1 R2R2

BR2R2 R1R1 BR1R1 R2R2 random(0,1) BR1R1 R2R2 BR2R2 R1R1

Definition 1: f RSP (.): Y ← f RSP (X), Y is the output of the function f RSP (.) with the inputs X, where f RSP (.) is that randomly select a pixel of X. Definition 2: f RG (.)Y||Z ← f RG (X), Y and Z are the outputs of the function f RG (.) with the input X, where f RG (.) is one of the three random grids algorithm in [6] which inputs a pixel of the secret image, then outputs two cipher-pixels for two shares. X Y Z (i, j)

Definition 3: (.) : Z← (X,Y): Z, Z is the output of the function f’ RG (.) with the inputs X and Y, where (.) is the function according to f RG (.): (as in Definition 2) which inputs a cipher-pixel of one share Y and a pixel of the secret image X, then outputs the other cipher-pixel. XYZ (i, j)

Chen et al. Step 1: S A (i, j) ← f RSP (S A ). Step 2: G 1 (i, j)||G 2 (i, j) ← f RG (S A (i, j)). Step 3: G 2 (j,(m-1)-i) ← (S B (j,,(m-1)-i), G 1 (i, j)). SASA G2G2 G1G1 SBSB G1G1 G2G2

Step 4: G 1 (j,(m-1)-i) ← (S A (j, (m-1)-i), G 2 (j, (m-1)-i, ). Step 5: G 2 ((m-1)-i, (m-1)-j) ← (S B (j, (m-1)-i), G 1 (j, (m-1)-i, ). SASA G2G2 G1G1 SBSB G1G1 G2G2

Step 6: G 1 ((m-1)-i, (m-1)-j) ← (S A (m-1)-i, (m-1)-j),G 2 ((m-1)-i, (m-1)-j) Step 7: G 2 ((m-1)-j, i) ← (S B (m-1)-i, (m-1)-j),G 1 ((m-1)-i, (m-1)-j), SBSB G1G1 G2G2 SASA G2G2 G1G1

Step 8: G 1 ((m-1)-j, i) ←random(0,1) random(0,1)

Step 1: S A (i, j) ← f RSP (S A ). Step 2: G 1 (i, j)||G 2 (i, j) ← f RG (S A (i, j)). Step 3: G 2 ((i + m/4), j) ← (S B (i, j), G 1 (i, j)). SBSB G1G1 G2G2 (3,4) S A and S B with the size of 240 ╳ 240 (3,4) (63,4) SASA G2G2 G1G1 This papper

Step 4: G 1 ((i + m/4), j) ← (S A ((i + m/4), j), G 2 ((i + m/4),j)). SASA G2G2 G1G1 (63,4) Step 5: G 2 ((i + m/2), j) ← (S B ((i + m/4), j), G 1 ((i + m/4),j)). SBSB G1G1 G2G2 (63,4) (123,4)

Step 6: G 1 ((i + m/2), j) ← (S A ((i + m/2), j), G 2 ((i + m/2),j)). SASA G2G2 G1G1 (123,4) Step 7: G 2 ((i + 3m/4), j) ← (S B ((i + m/2), j), G 1 ((i + m/2),j)). SBSB G2G2 G1G1 (183,4)(123,4)

Step 8: G 1 ((i + 3m/4), j) ← (S A ((i + 3m/4), j), G 2 ((i +3m/4), j)). SASA G2G2 G1G1 (183,4)

Simulation 1: binary secrets, moving horizontally by 1/4 width. share G 1 share G 2 Simulation 2: binary secrets, moving horizontally by 1/8 width. share G 2

Simulation 3: binary secrets, moving horizontally by 1/30 width. share G 1 share G 2 share G 1 Simulation 4: no constraint about the size. share G 2

Chen et alThe Proposed Scheme 90-degree rotation Moving by 1/4 width Moving by 1/16 width Chen et alThe Proposed Scheme 90-degree Rotation Moving by 1/4 width Moving by 1/10 width Only SquareAny Rectangle QUANTITY OF THE DISTORTION THE COMPARISON OF THE SIZE.

VCRandom Grids J.-L. BaiChen et alOur Scheme Pixel ExpansionYesNo Use CodebookYesNo Secret Data Quantity Wh 1.75wh2wh Adjustment Distortion ---NoYes Any Secrete Rectangle Images Yes No yes