Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct. 2011.

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Henning Lorch Page 1 Vector Gradient Intersection Transform (VGIT) Pattern Recognition  Circle Detection Henning Lorch 2007, ?
Virtual Control of Optical Axis of the 3DTV Camera for Reducing Visual Fatigue in Stereoscopic 3DTV Presenter: Yi Shi & Saul Rodriguez March 26, 2008.
A neural mechanism for robust junction representation in the visual cortex University of Ulm Dept. of Neural Information Processing Thorsten Hansen and.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Object Bank Presenter : Liu Changyu Advisor : Prof. Alex Hauptmann Interest : Multimedia Analysis April 4 th, 2013.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
Dynamic Background Learning through Deep Auto-encoder Networks Pei Xu 1, Mao Ye 1, Xue Li 2, Qihe Liu 1, Yi Yang 2 and Jian Ding 3 1.University of Electronic.
Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
A general (k, n) scalable secret image sharing scheme with the smooth scalability Ching-Nung Yang, Yu-Ying Chu The Journal of Systems and Software 84 (2011)
Science and Engineering Practices K–2 Condensed Practices3–5 Condensed Practices6–8 Condensed Practices9–12 Condensed Practices Developing and Using Models.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
A Fast Video Noise Reduction Method by Using Object-Based Temporal Filtering Thou-Ho (Chao-Ho) Chen, Zhi-Hong Lin, Chin-Hsing Chen and Cheng-Liang Kao.
1 Double-Patterning Aware DSA Template Guided Cut Redistribution for Advanced 1-D Gridded Designs Zhi-Wen Lin and Yao-Wen Chang National Taiwan University.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Multiplication Timed Tests.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Fast Preprocessing for Robust Face Sketch Synthesis
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
A new two-level QR code with visual cryptography scheme
Source :Journal of visual Communication and Image Representation
Physics-based simulation for visual computing applications
Reversible data hiding scheme based on significant-bit-difference expansion Sourse: IET Image Processing ( Volume: 11, Issue: 11, ), Pages 1002.
Source: Signal Processing 109 (2015) 317–333
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
CSE 554 Lecture 10: Extrinsic Deformations
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
A Novel Secret Sharing Scheme from Audio Perspective
Some New Issues on Secret Sharing Schemes
第 九 章 影像邊緣偵測 9-.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source: J. Vis. Commun. Image R. 31 (2015) 64–74
Optimal XOR based (2,n)-Visual Cryptography Schemes
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding Source:  IEEE Access. March, doi: /ACCESS
On Constructing k-Connected k-Dominating Set in Wireless Networks
Secret Image Sharing Based on Encrypted Pixels
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: IET Image Processing, Vol. 4, No. 4, Aug. 2010, pp
Automated traffic congestion estimation via public video feeds
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct. 2011

Content What’s visual cryptography Basic idea Our schemes Experiments & comparisons Further directions

What’s visual cryptography A (2,2)-VCS example Pixel expansion m Contrast α share 1 share 2 recovered secret imageoriginal secret image

Limitations of known VCS’s Image distortion Large pixel expansion inconvenient to carry grows very fast Poor visual quality Incorrect representation Not flexible Poor compatibility general access structure VCS color VCS extended VCS Hou et al.’s scheme [21] ITO et al.’s scheme [22]

The basic idea Principle of fountain Simulation Share image Pool Secret pixel nozzle Subpixel water

Generate the pool Distribute the nozzles and initialize a list L pi for each nozzle p i Determine all the lists L pi by finding the nearest nozzle for each subpixel Fill out the pool by the water according to L pi Our scheme--Construction 2 Input: S I, m N, m o Output: S 1, S 2, …, S n d2d2 d1d1 d3d3 d4d4 p1p1 p2p2 p3p3 p4p4 s

Our scheme--Construction 3 Input: S I, m N, m o Output: S 1, S 2, …, S n Generate the pool Distribute the nozzles and initialize a list L pi for each nozzle p i Determine all the lists L pi by dividing the pool with subpixels of integer multiples of m o Fill out the pool by the water according to L pi p1p1 p2p2 p3p3 p4p4 sm o tm o s

Experiments & comparisons Both proposed constructions are non-distortion (Construction 2 for example) The overall pixel expansion is real flexible where m N can be any value bigger than zero Experiments on the flexibility and non-distortion

Experiments & comparisons (cont.) Construction 2 has competitive visual quality of Yang et al.’s scheme [25] from an overall viewpoint Construction 3 has better visual quality especially on the evenness Comparison on the visual quality

Experiments & comparisons (cont.) Yes*: Range of the overall pixel expansion is limited Depends: Yes if m is a square number, otherwise No Schemes Criteria Constru ction 2 Constru ction 3[20][19][21][22] FlexibleYes No DistortionNo Schemes Criteria [23][24][28][29][30][25] FlexibleYes*No Yes*NoYes* DistortionDependsNoDepends No

Further directions Combine with other techniques general access structure VCS [Ateniese I&C 1996] color VCS [Liu IET IS 2008] extended VCS [Liu IEEE TIFS 2011 ] Further improve the visual quality use variance to evaluate the visual quality design schemes with smaller variance

Thanks Homepage:

Experiments & comparisons (cont.) Hou et al.’s VCS [21] has the incorrect representation problem Both proposed constructions can correctly represent secret images with thin lines Comparison on the incorrect representation problem

Experiments & comparisons (cont.) Compared with Yang et al.’s non-distortion schemes in [19] and [20]

References [Ateniese I&C 1996] G. Ateniese, C. Blundo, A. De Santis, and D.R. Stinson. Visual cryptography for general access structures. In Information and Computation, volume 129, pages , [Liu IET IS 2008] Feng Liu, Chuankun Wu and Xijun Lin "Color Visual Cryptography Schemes" IET Information Security Volume 2, Issue 4, Page , [Liu IEEE TIFS 2011 ] Feng Liu and Chuankun Wu "Embedded Extended Visual Cryptography Schemes" IEEE Transactions on Information Forensics & Security, Volume 6, No. 2, Page , 2011.