Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.

Slides:



Advertisements
Similar presentations
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Advertisements

Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Secure Layer Based Compound Image Compression using XML Compression Author : D. Maheswari 1, V.Radha Source : Computational Intelligence and Computing.
Maths for Computer Graphics
Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
1 Debris flow velocity estimation: A comparison between gradient- based method and cross- correlation method Image Processing: Algorithms and Systems (Proceedings.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
XOR-Based Meaningful Visual Secret Sharing by Generalized Random Grids Xiaotian Wu, Lu Dai, Duanhao Ou, Wei Sun 報告者: 李宏恩.
Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta.
Reversible Date Hiding Based on Histogram Modification of pixel Differences IEEE Transactions on circuits and systems for video technology, VOL. 19, NO.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Introduction to Visual Cryptography
Visual Cryptography for Gray-Level Images by Dithering Techniques
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints 報告者 : 陳建宇.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Matrix Multiplication The Introduction. Look at the matrix sizes.
Efficient multi-secret image sharing based on Boolean operations Signal Processing Tzung-Her Chen, Chang-Sian Wu.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
Two-Image Encryption by Random Grids 1 Joy Jo-Yi Chang, Ming-Jheng Li, Yi-Chun Wang and Justie Su-Tzu Juan National Chi Nan University.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Digital information encrypted in an image using binary encoding
Information Steganography Using Magic Matrix
The Recent Developments in Visual Cryptography
Source: Optical Engineering, Vol. 55, No. 6, pp , 2016.
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Physics-based simulation for visual computing applications
High-capacity image hiding scheme based on vector quantization
Source: Signal Processing 109 (2015) 317–333
Source: J. Vis. Commun. Image R. 41 (2016) 58–64
The Recent Developments in Visual Secret Sharing
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Hefei Electronic Engineering Institute, Hefei , China
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
Color Image Retrieval based on Primitives of Color Moments
DCT based simple classification scheme for fractal image compression
Sharing Technologies for Cloud Computing
A new chaotic algorithm for image encryption
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Data hiding method using image interpolation
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
EarthTour Presentations
Source: Signal Processing: Image Communication 16 (2001) pp
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Sourse: Information Sciences, Vol. 494, pp , August 2019
LSB matching revisited
Steganographic Systems for Secret Messages
Rich QR Codes With Three-Layer Information Using Hamming Code
Reversible data hiding in encrypted binary images by pixel prediction
Presentation transcript:

Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008) 學生:張若怡 P 許伯誠 P Date: 2013/01/18 Multiple-Image Encryption by Rotating Random Grids

Outline  Introduction  Motivation  Related Work  Research Methods Encryption phase Decryption phase  Research Results  Conclusion 2

Introduction – Visual Cryptography 3  Traditional Cryptography - Encryption and Decryption by computer  Visual Cryptography (VC), also called Visual Secret Sharing (VSS) - Encrypted by computer, Decrypted by human vision

Introduction Traditional VC and Random Grid 4 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion

Introduction Pixel expansion 5 Secret image Share1 Share2 Share1 + Share2 Traditional VC-based VSS:

Introduction Traditional VC and Random Grid 6 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion

Motivation 7 SASA G1G1 G2G2 SA’SA’ G1G1 G2G2 SASA SBSB SA’SA’ SB’SB’

Related Work 8 b g 1 g 2 g 1 ⊕ g SASA G1G1 for(i=0 ; i<w ; i++) for(j=0 ; j<h ; j++) if(B[i][j] == 0) G 2 [i][j] = G 1 [i][j]; else G 2 [i][j] = G 1 [i][j]; Output(G 1, G 2 ); G2G2 Random Grid Algorithm1:  O. Kafri, and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, 1987, pp In 1987, Kafri and Keren propose three different algorithms to encrypt a binary secret image.

Research Methods 9

Encryption phase:  Step 1: S A (i, j) ← f RSP (S A ).  Randomly select a pixel SA(i, j) from the first secret image SA, where the i- th row and the j-th column of the matrix SA are in the range of [0,m-1].  Step 2: G 1 (i, j)||G 2 (i, j) ← f RG (S A (i, j)) 10

Research Methods 11

Research Methods 12

Research Methods Step 8: G 1 ((m-1)-j, i) ← random(0,1) 13

Research Methods Decryption phase 14

Research Results  Simulation 1: binary secrets, 90-degree rotation Two secret images S A and S B with the size of 512×512 15

Research Results  Simulation 2: Halftone secrets, 90-degree rotation Two gray-level secret images S A and S B with the size of 512×512 16

Research Results Simulation 3: binary secrets, 180-degree rotation Simulation 4: binary secrets, 270-degree rotation 17

Conclusion Property 1: No extra codebook redesigned Property 2: No extra pixel expansion introduced Property 3: Multiple secrets encoded Property 4: Bandwidth and storage saving Property 5: Wide image format 18