The Recent Developments in Visual Secret Sharing

Slides:



Advertisements
Similar presentations
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Introduction to Visual Cryptography
Halftone Visual Cryptography
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
A Secret Information Hiding Scheme Based on Switching Tree Coding
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Cryptography
Embedding Secret Messages in Texts
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing 109 (2015) 317–333
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Data in a Color Palette Image with Hybrid Strategies
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Steganography in halftone images: conjugate error diffusion
Chair Professor Chin-Chen Chang Feng Chia University
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
Secret image sharing with steganography and authentication
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Improvements of Image Sharing with Steganography and Authentication
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

The Recent Developments in Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University (清華大學) National Chung Cheng University (中正大學) Feng Chia University (逢甲大學) http://msn.iecs.fcu.edu.tw/~ccc

Outlines Concept of Secret Sharing Concept of visual cryptography Visual cryptography for binary images Visual cryptography for grayscale images Meaningful visual cryptography for grayscale images Meaningful and progressive visual cryptography Visual cryptography for color images Authenticatable VSS Scheme

Traditional (t, n)-secret sharing (Shamir’s Method 1979) secret message (2, 3)-secret sharing Alice Bob Ken shadows secret retrieval Shamir, A. (1979): How to Share a Secret, CACM, Vol. 22, Nov. 1979, pp. 612-613.

How to Share a Secret (t, n)-threshold Scheme Ex: (2, 3)-threshold Scheme (The secret k=7) 3 shadows: (1, 9), (2, 0), (3, 2) y (3, 2) (2, 0) (1, 9) x

How to Share a Secret (t, n)-threshold Scheme Ex: (3, 5)-threshold Scheme (t=3, n=5, k=13, p=17) Alice Bob Ken Jesse Eva ID1=1 ID2=2 ID3=3 ID4=4 ID5=5 (1, 8) (3, 10) (5, 11) Lagrange Interpolation k

Concept of Visual Cryptography Traditional Cryptography Symmetric: DES, AES Asymmetric: RSA The encryption and decryption processes need high computation costs Need secret key for decoding Visual Cryptography low computation Fast decoding Without the secret key

The Secret Image: Airplane Hidden in Hidden in The Basis Image: Mickey The Counterfeit Image: Minnie

The Basis Image: Mickey The Counterfeit Image: Minnie The Expanded Counterfeit Image: Minnie-3X3 The Expanded Basis Image: Mickey-3X3

Mickey-3X3 Minnie-3X3 Airplane

Visual Cryptography for Binary Image Naor and Shamir (1994) proposed a (k, k)–VSS scheme Extend a secret pixel into a block of 22 sub-pixels Contain two white pixels and two black pixels for each block White pixel: transparent Black pixel: black

Secret pixel Share 1 Secret image stacked result Share 2

Visual Cryptography for Grayscale Image Transfer the grayscale image to the halftone image Utilize the density of black dots to simulate the content of grayscale image White area: low density of black dots Black area: high density of black dots

Share 1 Share 2

Meaningful Visual Cryptography for Grayscale Image secret image cover image shadow 1 shadow 2 camouflage stego image1 stego image2

shadow1 shadow1 transparent shadow2 shadow2 stego image1 stego image2 1 1 167 97 140 150 shadow2 shadow2 stego image1 1 1 167 170 83 140 stego image2 152 167 140 137 170 97 150 83 cover image

140 150 167 97 stego image1 stacked result 140 167 83 170 stego image2

Experimental Results shadow1 cover image1 stego image1 shadow2

stego image1 stego image2 stacked result

shadow1 cover image1 stego image1 shadow2 cover image2 stego image2

stego image1 stego image2 stacked result

Meaningful and Progressive Visual Cryptography Meaningful shares: friendly content Progressive visual cryptography Improve the stacked result progressively

Progressive Visual Cryptography (t, 6) (2, 6) (3, 6) (4, 6) (5, 6) (6, 6)

Progressive & Meaningful Visual Cryptography Meaningful shares: friendly content … shadow 1 shadow n secret image camouflage cover image … stego image1 stego image n

extended secret image secret image cover image shadow image secret image cover image shadow image 1 shadow image 2 shadow image 3 shadow image 4

secret image cover image t =2 t = 3

Experimental Results (2, 6) (3, 6) (4, 6) (5, 6) (6, 6)

Visual Cryptography for Color Image RGB: TV’s and Monitors CMY: Color Printing Press

Experimental Results shadow image 1 shadow image 2 stacked image 2

Authentication 32 Participant 1 Stack Share 1 Recovered secret image Hacker 32 Authentication Stack Participant 1 Share 1 Recovered secret image Original secret image Participant 2 Share 2 32

Authentication Legal extra Legal revealed confidential image secret image Correct stacking result Correct stacking result Share 1 Share 1 Share 2 Share 2 33

Authentication Tampered revealed Nothing secret image Tampered share 1 Tampered secret image Tampered secret image Tampered share 1 Tampered share 1 Share 2 Share 2 34

Authenticatable VSS Scheme for Binary Secret Grayscale image Lena Grayscale image Baboon Binary main secret Halftone image of Lena Halftone image of Baboon Binary extra confidential image

Revealed extra confidential image Authenticatable VSS Scheme for Binary Secret Share image A Share image B Stacking result Revealed extra confidential image

Authenticatable VSS Scheme for Color Secret Color image Lena Color image Baboon Color main secret Color halftone image of Lena Color halftone image of Baboon Color halftone extra confidential image

Revealed extra confidential image Authenticatable VSS Scheme for Color Secret Share image A Share image B Stacking result Revealed extra confidential image

Visual cryptography (Cont.) Rotating 40o Stacking Stacking Share 1 Share 2 Secret 1 “VISUAL” Secret 2 “SECRET”

Steganography (Cont.) Text Video Sound 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound

Conclusions An alternative for hiding visual secret Less secret Low computation cost

Thanks for your listening