Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta.

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
These figures correspond to the image using shear =10 pixels And 2D convolution was done in order to get the images Using R=0 y0 Using R=1 y1.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
F5 A Steganographic Algorithm
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Cryptography and Network Security
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Lecture 6 Sept 15, 09 Goals: two-dimensional arrays matrix operations circuit analysis using Matlab image processing – simple examples.
(r, n)-Threshold Image Secret Sharing Methods with Small Shadow Images Xiaofeng Wang, Zhen Li, Xiaoni Zhang, Shangping Wang Xi'an University of Technology,
8.4 Matrix Operations Day 1 Thurs May 7 Do Now Solve X – 2y = -6 3x + 4y = 7.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
TMAT 103 Supplemental Chapter Cryptography. Sending messages that cannot be read if stolen –Been in use for centuries (wars) –Used to transmit data securely.
Geometric Mean Decomposition and Generalized Triangular Decomposition Yi JiangWilliam W. HagerJian Li
Creating With Code.
4 4.4 © 2012 Pearson Education, Inc. Vector Spaces COORDINATE SYSTEMS.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Africacrypt 2008 Security of Challenge and Response Yu Sasaki 1, Lei Wang 2, Kazuo Ohta 2, Noboru Kunihiro 2 Impossible Differential Attack on Hash Functions.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Let C be the simplicial complex on the right (the boundary of a tetrahedron). Find the following: C 0 = C 1 = C 2 = C 3 = Z 0 = Explain your answer for.
4.8 Rank Rank enables one to relate matrices to vectors, and vice versa. Definition Let A be an m  n matrix. The rows of A may be viewed as row vectors.
Introduction to Visual Cryptography
Cryptography and Coding Theory
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
2.2 The Inverse of a Matrix. Example: REVIEW Invertible (Nonsingular)
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
= the matrix for T relative to the standard basis is a basis for R 2. B is the matrix for T relative to To find B, complete:
w v The reflection of throughvw Reflection is a linear transformation Find a matrix M such that M = v The reflection of through y = mxv.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
The Recent Developments in Visual Cryptography
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
ROTATION ROTATION ROTATION ROTATION ROTATION Pamela Leutwyler.
Source: Signal Processing 109 (2015) 317–333
Hefei Electronic Engineering Institute, Hefei , China
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
Reversible Data Hiding Scheme Using Two Steganographic Images
A Secret Enriched Visual Cryptography
Lecture 4-4 #P-complete Problems
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Source: Journal of Visual Communication and.
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Chair Professor Chin-Chen Chang Feng Chia University
The Image The pixels in the image The mask The resulting image 255 X
1.8 Matrices.
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
1.8 Matrices.
Optimal XOR based (2,n)-Visual Cryptography Schemes
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Vector Spaces COORDINATE SYSTEMS © 2012 Pearson Education, Inc.
Cheating and Prevention in Visual Secret Sharing
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta The University of Electro-Communications

Basic VSS schemes V.S. Our scheme Basic visual secret sharing schemes (VSS) –By stacking up shares, each secret image is decrypted. VSS schemes for plural secret images with general access structures allowing the rotation (VSS-PI-R) – More secret images can be decrypted compared with the ordinal VSS. –We can construct any VSS-PI-R scheme for given access structure.

In the case of (2, 2)-threshold Shares Decryption (Stacking up) One secret image Shares Decryption (Stacking up) Decryption (180 degrees Rotation and Stacking up) Two secret images Basic VSS VSS-PI-R

Construction of VSS-q-PI schemes p (1) p (2) p(q)p(q) p (1) p (2) ……p (q) Secret images A set of shares A combination of pixels in secret images B pB p A code set V1V1 V2V2 VnVn A matrix representing n pixels with m subpixels Each code set B p can be obtained from matrix B p is called basis matrix s.t. B p =.

Relation between shares and secret images The permutation of columns R is used in decryption. Problem SL1SL1 SU1SU1 SU2SU2 SL2SL2 Share 1Rotated Share 2 S U1 S U2 S L1 S L2 S U1 R( S L2 ) S L1 R( S U2 ) Decrypted image 1 Decrypted image 2 R( S L2 ) R( S U2 ) Share 2 A code set in VSS-q-PI-R schemes cannot be an equivalence class of some matrix.

B p = { v n (B) : B } Main theorem A new operation v n –The inverse of v n coincides with v n. [Theorem] (informal) Each code set B p of the VSS-PI-R scheme can be obtained by

Conclusion The proposed technique can easily be applied to VSS-PI schemes allowing to reverse the shares besides stacking in decryption. We will soon submit the paper corresponding to this talk in Cryptology ePrint Archive!