Download presentation
Presentation is loading. Please wait.
Published byMichael Hancock Modified over 8 years ago
1
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008) 學生:張若怡 P78011044 許伯誠 P76011242 Date: 2013/01/18 Multiple-Image Encryption by Rotating Random Grids
2
Outline Introduction Motivation Related Work Research Methods Encryption phase Decryption phase Research Results Conclusion 2
3
Introduction – Visual Cryptography 3 Traditional Cryptography - Encryption and Decryption by computer Visual Cryptography (VC), also called Visual Secret Sharing (VSS) - Encrypted by computer, Decrypted by human vision
4
Introduction Traditional VC and Random Grid 4 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion
5
Introduction Pixel expansion 5 Secret image Share1 Share2 Share1 + Share2 Traditional VC-based VSS:
6
Introduction Traditional VC and Random Grid 6 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion
7
Motivation 7 SASA G1G1 G2G2 SA’SA’ G1G1 G2G2 SASA SBSB SA’SA’ SB’SB’
8
Related Work 8 b g 1 g 2 g 1 ⊕ g 2 0 0 0 0 1 1 1 1 0 1 1 1 0 1 SASA G1G1 for(i=0 ; i<w ; i++) for(j=0 ; j<h ; j++) if(B[i][j] == 0) G 2 [i][j] = G 1 [i][j]; else G 2 [i][j] = G 1 [i][j]; Output(G 1, G 2 ); G2G2 Random Grid Algorithm1: O. Kafri, and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, 1987, pp. 377-379. In 1987, Kafri and Keren propose three different algorithms to encrypt a binary secret image.
9
Research Methods 9
10
Encryption phase: Step 1: S A (i, j) ← f RSP (S A ). Randomly select a pixel SA(i, j) from the first secret image SA, where the i- th row and the j-th column of the matrix SA are in the range of [0,m-1]. Step 2: G 1 (i, j)||G 2 (i, j) ← f RG (S A (i, j)) 10
11
Research Methods 11
12
Research Methods 12
13
Research Methods Step 8: G 1 ((m-1)-j, i) ← random(0,1) 13
14
Research Methods Decryption phase 14
15
Research Results Simulation 1: binary secrets, 90-degree rotation Two secret images S A and S B with the size of 512×512 15
16
Research Results Simulation 2: Halftone secrets, 90-degree rotation Two gray-level secret images S A and S B with the size of 512×512 16
17
Research Results Simulation 3: binary secrets, 180-degree rotation Simulation 4: binary secrets, 270-degree rotation 17
18
Conclusion Property 1: No extra codebook redesigned Property 2: No extra pixel expansion introduced Property 3: Multiple secrets encoded Property 4: Bandwidth and storage saving Property 5: Wide image format 18
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.