Visual Cryptography for Gray-Level Images by Dithering Techniques

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Introduction to Computers - 3 rd exam- 授課教授:李錫智. 1.Consider the following program: Magic 8-ball function GetResponse()
Divide-and-Conquer. 什麼是 divide-and-conquer ? Divide 就是把問題分割 Conquer 則是把答案結合起來.
3Com Switch 4500 切VLAN教學.
指導教授:陳淑媛 學生:李宗叡 李卿輔.  利用下列三種方法 (Edge Detection 、 Local Binary Pattern 、 Structured Local Edge Pattern) 來判斷是否為場景變換,以方便使用者來 找出所要的片段。
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Introduction to Java Programming Lecture 17 Abstract Classes & Interfaces.
Hint of final exams jinnjy. Outline Hint of final 2006 (6/28/2007)
New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel Ching-Nung Yang Yun-Hsiang Liang Wan-Hsiang Chou National.
3-3 使用幾何繪圖工具 Flash 的幾何繪圖工具包括線段工具 (Line Tool) 、橢圓形工具 (Oval Tool) 、多邊星形 工具 (Rectangle Tool) 3 種。這些工具畫出 來的幾何圖形包括了筆畫線條和填色區域, 將它們適當地組合加上有技巧地變形與配 色, 不但比鉛筆工具簡單,
Matlab Assignment Due Assignment 兩個 matlab 程式 : Eigenface : Eigenvector 和 eigenvalue 的應用. Fractal : Affine transform( rotation, translation,
Digital Signal Processing with Examples in M ATLAB ® Chap 1 Introduction Ming-Hong Shih, Aug 25, 2003.
Distributed Video Coding. Outline Distributed video coding Lossless compression Lossy compression Low complexity video encoding Distributed image coding.
1-6 動畫的文件屬性 舞台是動畫實際播放的畫面, 所以舞台的大 小與長寬比例對將來動畫的呈現有很大的 影響。 Flash 預設的舞台尺寸是 550 Pixels × 400 Pixels, 背景為白色, 如果要更改舞台大小與 背景色, 請執行『修改 / 文件』命令, 開啟文 件屬性 (Document.
: Problem G e-Coins ★★★☆☆ 題組: Problem Set Archive with Online Judge 題號: 10306: Problem G e-Coins 解題者:陳瀅文 解題日期: 2006 年 5 月 2 日 題意:給定一個正整數 S (0
Density and control Reproduction curve 劉耀仁. Density :濃度、密度 ► 1 號區是 High-Density 區、 2 號是 Middle-density 區、 3 號區是 Low- Density 區。 ► 計算反射率( R )或透射率( T )
1 第七章 植基於可調整式量化表及離散餘 弦轉換之浮水印技術. 2 Outlines 介紹 介紹 灰階浮水印藏入 灰階浮水印藏入 灰階浮水印取回 灰階浮水印取回 實驗結果 實驗結果.
845: Gas Station Numbers ★★★ 題組: Problem Set Archive with Online Judge 題號: 845: Gas Station Numbers. 解題者:張維珊 解題日期: 2006 年 2 月 題意: 將輸入的數字,經過重新排列組合或旋轉數字,得到比原先的數字大,
高階日本語会話 第 4 課. 中村 中 (なかむら あた る)
1 認識數位影像 什麼是數位影像 數位影像依其處存方式可分為兩大類 : 1. 向量影像( vector-based image ):影像圖案由一個 個物件所組成,每個物件可由一數學式表達 2. 點陣式影像( bit-mapped image ):影像圖案由像素 一個個排列而成.
電腦的基本單位 類比訊號 (analog signal) 指的是連續的訊號 數位訊號 (digital signal) 指的是以預先定義的符號表示不連續 的訊號 one bit 8 bits=one byte 電腦裡的所有資料,包括文 字、數據、影像、音訊、視 訊,都是用二進位來表示的。
電腦的基本單位 類比訊號 (analog signal) 指的是連續的訊號
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
6 彩色影像處理 6.1 色彩基礎 6.2 色彩模式 6.3 假彩色影像處理 6.4 全彩色影像處理基本原理 6.5 色彩轉換
1 Lossless DNA Microarray Image Compression Source: Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, Vol. 2, Nov. 2003, pp
蛋白質二維凝膠電泳影像內容 特徵研究之技術 指導老師:陳同孝教授 學 生 : 唐仕珊、林玉琪. 技術運用項目 技術運用項目 運用 ACM 技術於蛋白質二維凝膠電泳影像 篩選蛋白質點 運用 ACM 技術於蛋白質二維凝膠電泳影像 篩選蛋白質點 運用 Gaussian Model 與 Diffusion.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 A Combined Approach to Integrity Protection and Verification of Palette Images Using Fragile Watermarks and Digital Signatures Source: IEICE TRANS. On.
REVERSIBLE AND HIGH- CAPACITY DATA HIDING IN MEDICAL IMAGES 報告學生:翁偉傑 1 Published in IET Image Processing Received on 25th June 2008 Revised on 15th June.
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids Xiaotian Wu, Lu Dai, Duanhao Ou, Wei Sun 報告者: 李宏恩.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) Malaysian Journal of Computer.
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
A fast algorithm for tracking human faces based on chromatic histograms Pattern Recognition Letters, 1999 Speak: M. Q. Jing 4/23/2001 國立交通大學 自動化資訊處理 lab.
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
Introduction to Visual Cryptography
Image Thresholding Using Type II Fuzzy Sets Source : 2005, Pattern Recognition 38, Author : Hamid R. Tizhoosh Advisor: Chen R. -C. Ph. D( 陳榮昌教授.
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
數位影像中熵的計算與應用 義守大學 資訊工程學系 黃健興. Outline Entropy Definition Entropy of images Applications Visual Surveillance System Background Extraction Conclusions.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
Edge Detection-E Edge Detection 指導教授:張顧耀學生姓名:李益璋 學號: E
1 Competitive fuzzy edge detection Source: Forensic Science International 155 (2005) 35–50 Authors: Che-Yen Wen*, Jing-Yue Yao Reporter : 黃 宇 睿 Teacher.
電腦視覺期末報告 Gradients 指導教授:張顧耀學生姓名:廖寶呈 學號: E
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
數位影像處理 Digital Image Processing 吳育龍老師. Read image data Screen Resolution : 1024 X
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Authors: Hung-Yu, Chi-Sung Laih
Image segmentation using GMM
Lossy Compression of DNA Microarray Images
Image camouflage by reversible image transformation
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
The Recent Developments in Visual Secret Sharing
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A new chaotic algorithm for image encryption
Steganography in halftone images: conjugate error diffusion
Source: IEEE Transactions on multimedia, Vol. 21, No
Predictive Grayscale Image Coding Scheme Using VQ and BTC
LSB matching revisited
Presentation transcript:

Visual Cryptography for Gray-Level Images by Dithering Techniques Author:Chang-Chou Lin, Wen-Hsiang Tsai Source:Pattern Recognition Letters 24 (2003) 349-358 Speaker:Shu-Fen Chiou(邱淑芬)

Outline Introduction Space-filling Curve Ordered Dithering (SFCOD) (k, n)-threshold visual encryption of gray-level images Experimental results Conclusions Comments

Introduction (1/2) Input a gray-level image Share image1 Transform by SFCOD decode encode Apply (2, 2) visual cryptography The decoded image An approximate binary image Share image2

Introduction (2/2) Binary images are usually restricted to represent text-like messages. Verheul and van Tilborg (1997) first tried to extend visual cryptography into gray-level images, but their method has the disadvantage of size increase in the decoded image.

Space-filling Curve Ordered Dithering (SFCOD) Yuefeng Zhang Comput. & Graphics, Vol. 22 No.4, pp. 559-563, 1998

Hilbert curve Rule Iteration = 0 Iteration = 1 Iteration = 2

Subdividing a 88 image into 4 4 regions by using a Hilbert curve 7 7 7 10 1 2 3 4 7 6 5 8 9 11 12 15 13 14 48 51 52 53 49 50 55 54 62 61 56 57 63 60 59 58 42 41 38 37 43 40 39 36 44 45 34 35 47 46 33 32 26 25 22 21 27 24 23 20 28 29 18 19 31 30 17 16 5 6 9 10 5 6 9 10 6 6 6 4 7 8 11 4 7 8 11 5 5 5 3 2 13 12 3 2 13 12 4 4 4 1 14 15 1 14 15 3 3 3 15 12 11 10 5 4 3 2 2 2 14 13 8 9 6 7 2 1 1 1 1 1 2 7 6 9 8 13 14 3 4 5 10 11 12 15 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7

Dithering Technique (1/3) PROCEDURE SFCOD (M, B, t ,I ,H) BEGIN FOR i = 0 TO m – 1 DO FOR j = 0 TO m – 1 DO IF I (i, j) /256 ≥ (B (M (i, j) MOD t )+0.5)/ t THEN H (i, j) = 1(白色) ELSE H (i, j) = 0 ;(黑色) END 定義 I:大小為m*m的灰階影像 M(i, j):traversal-order number B:space-filling curve dither array t:array length H(i, j):轉 binary image 後的 pixel value

Dithering Technique (2/3) Step1: Gray-level image I with mm. Step2: Divide I into many pixels of a block. Step3: Transform each gray block into binary block M(0,0) I(0,0) 1 2 3 4 5 6 7 10 8 9 11 12 15 13 14 48 51 52 53 49 50 55 54 62 61 56 57 63 60 59 58 42 41 38 37 43 40 39 36 44 45 34 35 47 46 33 32 26 25 22 21 27 24 23 20 28 29 18 19 31 30 17 16 Original Image I Hilbert curve order t=4, t<=M

Dithering Technique (3/3) Space-filling curve dither array B, size(B)=t 作用在於打亂, B 對於每一個block 可以Fixed or not fixed t=4 B(0)=1, B(1)=0, B(2)=2, B(3)=3

Example of Dithering Technique Step1: y=I(0,0)/256=100/256=0.390625 Step2: x=M(i, j) mod t = M(0, 0) mod 4= 21 mod 4=1 Step3: B(x)=B(1)=0 B(0)=1, B(1)=0, B(2)=2, B(3)=3 Step4: q= (B(x)+0.5) / t =(0+0.5)/4=0.125 Step5: Test (y >= q) ? If yes, white color else black color.

(k, n)-threshold visual encryption of gray-level images Verheul and van Tilborg, 1997 We describe an example for the case of a (3, 3)-threshold scheme. If there are 3 gray levels original image.

An example (1/4) Gray-level 0 Gray-level 1 Gray-level 2 original image

An example (2/4) share1 share2 share3 0 0 0 1 1 1 2 2 2 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 0 1 2 1 2 0 2 0 1 share1 A0 = share2 share3 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 2 0 1 0 1 2 1 2 0 A1 = 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 1 2 0 2 0 1 0 1 2 A2 =

An example (3/4) C0 = { all the matrices obtained by permuting the columns of A0 } C1 = { all the matrices obtained by permuting the columns of A1 } C2 = { all the matrices obtained by permuting the columns of A2 } EX: 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 0 1 2 1 2 0 2 0 1 A0 = 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 2 0 1 0 1 2 1 2 0 A1 = 0 0 0 1 1 1 2 2 2 0 1 2 0 1 2 0 1 2 1 2 0 2 0 1 0 1 2 original image share1 share2 share3 result A2 =

An example (4/4) (k, n)-threshold visual cryptography k = 3, n = 3 share1 share2 share3 (k, n)-threshold visual cryptography k = 3, n = 3 size increase ck-1 at least when c ≥ n Decoding image

Experimental results (1/2) The original image with 16 gray levels The image after using SFCOD

Experimental results (2/2) share1 + The decoded image share2

A person authentication application Public key Secret key authentication Encrypting a portrait of the user

Conclusions This scheme possesses the advantages of inheriting any developed cryptographic technique for binary images and having less increase of image size in ordinary situations. EX: If there are 3 gray levels original image before this scheme 33-1 = 9 times 4 times

Comments 可以直接用灰階影像或是彩色影像來做視覺密碼學。 還原的影像可以和原始影像的尺寸大小一樣。