Visual Cryptography Moni Naor Adi Shamir Presented By:

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Chapter Matrices Matrix Arithmetic
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Ch12. Secret Sharing Schemes
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
By Claudia Fiorini, Enrico Martinelli, Fabio Massacci
Traitor Tracing Papers Benny Chor, Amos Fiat and Moni Naor, Tracing Traitors (1994) Moni Naor and Benny Pinkas, Threshold Traitor Tracing (1998) Presented.
Daniel Moran & Marina Yatsina. Access control through encryption.
Secret Sharing Algorithms
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
Cryptanalysis. The Speaker  Chuck Easttom  
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
CSE 504 Discrete Mathematics & Foundations of Computer Science
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
2.4 Inverse of Linear Transformations For an animation of this topic visit: Is the transformation.
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
Computer System Security CSE 5339/7339
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Cryptography, Authentication and Digital Signatures
Chapter 21 R(x) Algorithm a) Anomaly Detection b) Matched Filter.
Symmetric-Key Cryptography
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Lecture 3 Page 1 Advanced Network Security Review of Cryptography Advanced Network Security Peter Reiher August, 2014.
Traditional Symmetric-Key Ciphers
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
1 Lect. 19: Secret Sharing and Threshold Cryptography.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Objective To provide background material in support of topics in Digital Image Processing that are based on matrices and/or vectors. Review Matrices.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
(Project) by:- ROHAN HIMANSHU ANUP 70282
PART VII Security.
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Fun with Cryptography The Science of Secrecy.
A Secret Enriched Visual Cryptography
A Novel Secret Sharing Scheme from Audio Perspective
Optimal XOR based (2,n)-Visual Cryptography Schemes
Types of Cryptanalysis attacks
Cryptographic Protocols Secret Sharing, Threshold Security
Cheating and Prevention in Visual Secret Sharing
Presentation transcript:

Visual Cryptography Moni Naor Adi Shamir Presented By: Salik Jamal Warsi Siddharth Bora

Cryptography A very hot topic today which involves the following steps : Plain Text Encryption Cipher Text Channel Decryption

Visual Cryptography Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Such a technique thus would be lucrative for defense and security.

Visual Cryptography Plaintext is as an image. Encryption involves creating “shares” of the image which in a sense will be a piece of the image. Give the shares to the respective holders. Decryption – involving bringing together the an appropriate combination and the human visual system.

AN EXAMPLE Concept of Secrecy

AN Example So basically it involves dividing the image into two parts: Key : a transparency Cipher : a printed page Separately, they are random noise Combination reveals an image

Secret Sharing - ViSUAL Refers to a method of sharing a secret to a group of participants. Dealer provides a transparency to each one of the n users. Any k of them can see the secret by stacking their transparencies, but any k-1 of them gain no information about it. Main result of the paper include practical implementations for small values of k and n.

Background The image will be represented as black and white pixels Grey Level: The brightness value assigned to a pixel; values range from black, through gray, to white. Hamming Weight (H(V)): The number of non-zero symbols in a symbol sequence. Concept of qualified and forbidden set of participants

Encoding the pixels Pixel Share 1 Share 2 Overlaid

The MODEL Each original pixel appears in n modified versions (called shares), one for each transparency. Each share is a collection of m black and white sub-pixels. The resulting structure can be described by an n x m Boolean matrix S = [sij] where sij=1 iff the jth sub-pixel of the ith transparency is black.

The MODEL Pixel Division (per share) Pixel (in the group n) m Pixel Subpixels

THE MODEL The grey level of the combined share is interpreted by the visual system: as black if as white if . is some fixed threshold and is the relative difference. H(V) is the hamming weight of the “OR” combined share vector of rows i1,…in in S vector.

Conditions 1. For any S in S0 , the “or” V of any k of the n rows satisfies H(V ) < d-α.m 2. For any S in S1 , the “or” V of any k of the n rows satisfies H(V ) >= d. n-Total Participant k-Qualified Participant

Conditions 3. For any subset {i1;i2; : : ;iq} of {1;2; : : ;n} with q < k, the two collections of q x m matrices Dt for t ε {0,1} obtained by restricting each n x m matrix in Ct (where t = 0;1) to rows i1;i2; : : ;iq are indistinguishable in the sense that they contain the same matrices with the same frequencies. Condition 3 implies that by inspecting fewer than k shares, even an infinitely powerful cryptanalyst cannot gain any advantage in deciding whether the shared pixel was white or black.

Stacking AND contrast Concept of Contrast

Properties of sharing matrices For Contrast: sum of the sum of rows for shares in a decrypting group should be bigger for darker pixels. For Secrecy: sums of rows in any non-decrypting group should have same probability distribution for the number of 1’s in s0 and in S1.

2 out of 2 scheme (2 sub-pixels) Black and white image: each pixel divided in 2 sub-pixels Choose the next pixel; if white, then randomly choose one of the two rows for white. If black, then randomly choose between one of the two rows for black. Also we are dealing with pixels sequentially; in groups these pixels could give us a better result.

2 out of 2 scheme (2 sub-pixels)

2 out of 2 scheme (2 sub-pixels)

General 2 out of n scheme We take m=n White pixel - a random column-permutation of: Black pixel - a random column-permutation of:

2 out of 2 scheme (3 sub-pixels) Each matrix selected with equal probability (0.25) Sum of sum of rows is 1 or 2 in S0, while it is 3 in S1 Each share has one or two dark subpixels with equal probabilities (0.5) in both sets.

2 out of 2 Scheme (4 subpixels) The 2 subpixel scheme disrupts the aspect ratio of the image. A more desirable scheme would involve division into a square of subpixel (size=4)

2 out of 2 Scheme (4 subpixels)

General Results on Asymptotics There is a (k,k) scheme with m=2k-1, α=2-k+1 and r=(2k-1!). We can construct a (5,5) sharing, with 16 subpixels per secret pixel and, using the permutations of 16 sharing matrices. In any (k,k) scheme, m≥2k-1 and α≤21-k. For any n and k, there is a (k,n) Visual Cryptography scheme with m=log n 2O(klog k), α=2Ώ(k).

Advantages of Visual Cryptography Encryption doesn’t required any NP-Hard problem dependency Decryption algorithm not required (Use a human Visual System). So a person unknown to cryptography can decrypt the message. We can send cipher text through FAX or E-MAIL Infinite Computation Power can’t predict the message.

Thank You !