Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
دانشگاه صنعتي اميركبير دانشكده مهندسي پزشكي Constraints in MPC کنترل پيش بين-دکتر توحيدخواه.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Segmentation via Maximum Entropy Model. Goals Is it possible to learn the segmentation problem automatically? Using a model which is frequently used in.
The Simplex Algorithm An Algorithm for solving Linear Programming Problems.
New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel Ching-Nung Yang Yun-Hsiang Liang Wan-Hsiang Chou National.
Secret Sharing Algorithms
Handling Constraints 報告者 : 王敬育. Many researchers investigated Gas based on floating point representation but the optimization problems they considered.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Projective geometry of 2-space DLT alg HZ 4.1 Rectification HZ 2.7 Hierarchy of maps Invariants HZ 2.4 Projective transform HZ 2.3 Behaviour at infinity.
Person-Specific Domain Adaptation with Applications to Heterogeneous Face Recognition (HFR) Presenter: Yao-Hung Tsai Dept. of Electrical Engineering, NTU.
How Does Topology Affect Security in Wireless Ad Hoc Networks? Ioannis Broustis CS 260 – Seminar on Network Topology.
Learning Visual Bits with Direct Feature Selection Joel Jurik 1 and Rahul Sukthankar 2,3 1 University of Central Florida 2 Intel Research Pittsburgh 3.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Classification and Ranking Approaches to Discriminative Language Modeling for ASR Erinç Dikici, Murat Semerci, Murat Saraçlar, Ethem Alpaydın 報告者:郝柏翰 2013/01/28.
Joint Illumination-Communication Optimization in Visible Light Communication Zhongqiang Yao, Hui Tian and Bo Fan State Key Laboratory of Networking and.
出處: Signal Processing and Communications Applications, 2006 IEEE 作者: Asanterabi Malima, Erol Ozgur, and Miijdat Cetin 2015/10/251 指導教授:張財榮 學生:陳建宏 學號: M97G0209.
XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids Xiaotian Wu, Lu Dai, Duanhao Ou, Wei Sun 報告者: 李宏恩.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Multiuser OFDM with Adaptive Subcarrier, Bit and Power Allocation (IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 10, OCTOBER 1999)
Overview of IGA Application and Combating User Fatigue Jie-Wei Wu 2013/3/12.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Application of Generic Constraint Solving Techniques for Insightful Engineering Design Hiroyuki Sawada Digital Manufacturing Research Center (DMRC) National.
Introduction to Visual Cryptography
Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object Retrieval Yin-Hsi Kuo1,2, Hsuan-Tien Lin 1, Wen-Huang Cheng 2, Yi-Hsuan Yang.
Large-Scale Matrix Factorization with Missing Data under Additional Constraints Kaushik Mitra University of Maryland, College Park, MD Sameer Sheoreyy.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Clustering With Constraints Feasibility Issues and the k-Means Algorithm 報告者:林俞均 日期: 2014/8/27.
Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Feng Liu SKLOIS IIE CAS Atlantic City, New Jersey, USA 23~26 Oct
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013,
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Compressive Coded Aperture Video Reconstruction
Source: IEEE Signal Processing Letters (Accepted)2016
(k, n)-Image Reversible Data Hiding
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Advanced Algorithms Analysis and Design
Wavelets : Introduction and Examples
The Recent Developments in Visual Cryptography
Discussion #29 – Images II
Affiliation of presenter
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Operational Research (OR)
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
LINEAR PROGRAMMING Example 1 Maximise I = x + 0.8y
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Optimal XOR based (2,n)-Visual Cryptography Schemes
Cheating and Prevention in Visual Secret Sharing
Presentation transcript:

Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇

Abstract  Conventional visual cryptography (VC)suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct VSSS for GAS.  propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computeraided decryption environments.

 To avoid pixel expansion, We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem.

 (VCSs) can be divided into two categories:  1. threshold access structure (also known as k- out-of-n VCSs or (k,n)-VCSs)  2.general access structure (GAS).Naor and Shamir focused on how to generaten shares such that the secret image is revealed by at least k shares (2≤k ≤n).

 Lee and Chiu (hereinafter Lee) proposed a generic VC construction method for GAS.  Their approach can perfectly recover black secret pixels, but it results in decreasing contrast of recovered images in some access structures.  existing VCS construction algorithms for GASs cannot simultaneously avoid the pixel-expansion problem and guarantee an acceptable blackness.  These issues motivated us to develop a systematic approach to the construction of size invariant VCSs (SIVCSs or VCSs in short) for GASs subject to the adjustable display quality of recovered images

CONCLUSION  The proposed model for SIVCSs eliminates the disadvantages of the pixel-expansion problem from which conventional VC scenarios suffer.  First, this is the first solution for weak SIVCS for GASs subject to controllable blackness of black secret pixels.  Second, we formulate the construction problem of the SIVCS for GASs as a mathematical optimization problem such that the problem can be solved by using optimization techniques.  Third, the proposed method is a general and systematic approach that can be applied to any  VC schemes without individually redesigning codebooks or basis matrices.