Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.

Slides:



Advertisements
Similar presentations
Introduction to Colour Management
Advertisements

Visual Cryptography Moni Naor Adi Shamir Presented By:
Images Images are a key component of any multimedia presentation.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
Steganography and Network Security
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
Digital Imaging and Image Analysis
Video enhances, dramatizes, and gives impact to your multimedia application. Your audience will better understand the message of your application.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim.
Overview of Digital Stenography
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Lecture 4: ImagesIntro to IT COSC1078 Introduction to Information Technology Lecture 4 Images James Harland
Steganography Rayan Ghamri.
First Bytes - LabVIEW. Today’s Session Introduction to LabVIEW Colors and computers Lab to create a color picker Lab to manipulate an image Visual ProgrammingImage.
Image Representation.
CSC Computing with Images1 Image encodings CSC 1040.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Color Model AbdelRahman Abu_absah Teacher: Dr. Sana'a Alsayegh.
The Digital Image.
WEB GRAPHICS. The Pixel Computer displays are comprised of rows and columns of pixels. Pixels are indivisible. Some common screen resolutions are:, 600.
Steganography detection Roland Cmorik, Martin Šumák.
Presentation Design: Starting Out. Color Basics There are two types of color models -- Reflective 1. CMYK Model Used in printing Stands for Cyan, Magenta,
Welcome Topic: Pixels A.M.Meshkatur Rahman Class: vii Roll: 07.
© 1999 Rochester Institute of Technology Color. Imaging Science Workshop for Teachers ©Chester F. Carlson Center for Imaging Science at RIT Color Images.
TOPIC 4 INTRODUCTION TO MEDIA COMPUTATION: DIGITAL PICTURES Notes adapted from Introduction to Computing and Programming with Java: A Multimedia Approach.
Objective Understand concepts used to create digital graphics. Course Weight : 15% Part Three : Concepts of Digital Graphics.
Lesson 13 – Color and Typography. 2 Objectives Discuss basic color theory. Understand the color wheel. Understand how color is presented on a computer.
More Basic XHTML Module 2: XHTML Basics LESSON 2.
Color and Resolution Introduction to Digital Imaging.
CSC Computing with Images
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Computer Graphics An Introduction Jimmy Lam The Hong Kong Polytechnic University.
Lecture 7: Intro to Computer Graphics. Remember…… DIGITAL - Digital means discrete. DIGITAL - Digital means discrete. Digital representation is comprised.
Computer Vision Introduction to Digital Images.
COMPUTER GRAPHICS. Can refer to the number of pixels in a bitmapped image Can refer to the number of pixels in a bitmapped image The amount of space it.
 THREE TYPES OF CONES  EACH TYPE IS SENSITIVE TO A DIFFERENT WAVELENGTH OF COLOR  REDGREENBLUE  MIXING EQUAL AMMOUNTS OF RED, GREEN, AND BLUE CREATES.
Introduction to Visual Cryptography
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
PART TWO Electronic Color & RGB values 1. Electronic Color Computer Monitors: Use light in 3 colors to create images on the screen Monitors use RED, GREEN,
TOPIC 4 INTRODUCTION TO MEDIA COMPUTATION: DIGITAL PICTURES Notes adapted from Introduction to Computing and Programming with Java: A Multimedia Approach.
HOW SCANNERS WORK A scanner is a device that uses a light source to electronically convert an image into binary data (0s and 1s). This binary data can.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Objective % Understand concepts used to create digital graphics.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Digital Image Processing CCS331 Relationships of Pixel 1.
Lesson 13 – Color and Typography. 2 Objectives Understand basic color theory. Understand the color wheel. Understand how color is presented on a computer.
Graphics Basic Concepts 1.  A graphic is an image or visual representation of an object.  A visual representation such as a photo, illustration or diagram.
Computer Graphic. Raster graphics In computer graphics, a raster graphics image, digital image, or bitmap, is a data structure representing a generally.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
DISPLAY DEVICES CIS 10, Group #1 April 01, 2006 C. X. A. L. K. H. A. V. ((( L. C.
AP CSP: Pixelation – B&W/Color Images
Images Data Representation.
2.01 Understand Digital Raster Graphics
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
UNIT 2 – LESSON 4 Encoding Color Images.
The Recent Developments in Visual Cryptography
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
PowerPoint Slide Design
The Recent Developments in Visual Secret Sharing
Colors Computers build colors from Red, Green, and Blue; not Red, Blue, and Yellow. RGB = Red Green Blue Creating Colors Red + Blue = Purple No Red, No.
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
What Color is it?.
Digital Image Processing
Basic Concepts of Digital Imaging
Title Introduction: Discussion & Conclusion: Methods & Results:
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Visual Abstract Submission Information
Presentation transcript:

Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim

OverviewOverview Introduction of Paper Visual Cryptography  How to make?  Basic Idea Color Visual Cryptography Conclusions -2/19-

OverviewOverview Introduction of Paper Visual Cryptography  How to make?  Basic Idea Color Visual Cryptography Conclusions -3/19-

Introduction of paper Title  Visual Cryptography Conference  Eurocrypt ’94 Authors  Modi Noar, Adi Shamir -4/19-

OverviewOverview Introduction of Paper Visual Cryptography  How to make?  Basic Idea Color Visual Cryptography Conclusions -5/19-

Visual Cryptography What?  It is different from the concept of traditional cryptography  It depends on perception by the human eyes -6/19-

The simplest visual cryptography  Message consists of a collection of black and white pixels.  ‘OR’ Operation How to make? -7/19- Pixel (0) Pixel (1)

How to make? The simplest visual cryptography  Each pixel appears in n modified versions (called share).  Each share is a collection of m black and white sub- pixels. -8/19- m sub-pixels n shares pixel or Example. n = 2, m = 4

How to make? The simplest visual cryptography -9/19- horizontal shares vertical shares diagonal shares Secret Message

How to make? The simplest visual cryptography -10/19- horizontal shares vertical shares diagonal shares

How to make? The simplest visual cryptography -11/19-

Basic Idea (k, n) sharing problem  Extended to k out of n sharing problem  For encrypting written material (printed text or handwritten notes), a perfectly secure way can be decoded directly by the human visual system.  Simplicity -12/19-

OverviewOverview Introduction of Paper Visual Cryptography  How to make?  Basic Idea Color Visual Cryptography Conclusions -13/19-

Color Visual Cryptography RGB color space  Three components: Red, Green, Blue  All values are in the range [0, 1] In RGB video cards for PC, one component is displayed using 8 bits (256 values) -14/19- Sharing Image 1Sharing Image 2Recover Image XOR= RGB Addition

Color Visual Cryptography RGB Display -15/19- RedGreenBlue Original Image 1 pixel Bitplanes (Most Least) Example. 2 share images

Color Visual Cryptography -16/19- Original Image Shared Image 1 Shared Image 2 Recover Image

OverviewOverview Introduction of Paper Visual Cryptography  How to make?  Basic Idea Color Visual Cryptography Conclusions -17/19-

ConclusionConclusion Advantages of Visual Cryptography  No knowledge of cryptography is required to get the secret message from shared images. The system can be used by anyone.  Lower computational cost since the secret message is recognized only by human eyes and not cryptographically computed. -18/19-

Q&AQ&A Thank you! Any questions? -19/19-