Presentation is loading. Please wait.

Presentation is loading. Please wait.

Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.

Similar presentations


Presentation on theme: "Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications."— Presentation transcript:

1 Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications (ISDA 2008) 學生:張若怡 P78011044 許伯誠 P76011242 Date: 2013/01/18 Multiple-Image Encryption by Rotating Random Grids

2 Outline  Introduction  Motivation  Related Work  Research Methods Encryption phase Decryption phase  Research Results  Conclusion 2

3 Introduction – Visual Cryptography 3  Traditional Cryptography - Encryption and Decryption by computer  Visual Cryptography (VC), also called Visual Secret Sharing (VSS) - Encrypted by computer, Decrypted by human vision

4 Introduction Traditional VC and Random Grid 4 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion

5 Introduction Pixel expansion 5 Secret image Share1 Share2 Share1 + Share2 Traditional VC-based VSS:

6 Introduction Traditional VC and Random Grid 6 V SS Traditional VC-based VSS (Codebook) RG-based VSS (Random Grid) T raditional VC-based VSS has at least two drawbacks as follows : 1.Codebook design 2.Pixel expansion

7 Motivation 7 SASA G1G1 G2G2 SA’SA’ G1G1 G2G2 SASA SBSB SA’SA’ SB’SB’

8 Related Work 8 b g 1 g 2 g 1 ⊕ g 2 0 0 0 0 1 1 1 1 0 1 1 1 0 1 SASA G1G1 for(i=0 ; i<w ; i++) for(j=0 ; j<h ; j++) if(B[i][j] == 0) G 2 [i][j] = G 1 [i][j]; else G 2 [i][j] = G 1 [i][j]; Output(G 1, G 2 ); G2G2 Random Grid Algorithm1:  O. Kafri, and E. Keren, “Encryption of pictures and shapes by random grids,” Optics Letters, vol. 12, no. 6, 1987, pp. 377-379. In 1987, Kafri and Keren propose three different algorithms to encrypt a binary secret image.

9 Research Methods 9

10 Encryption phase:  Step 1: S A (i, j) ← f RSP (S A ).  Randomly select a pixel SA(i, j) from the first secret image SA, where the i- th row and the j-th column of the matrix SA are in the range of [0,m-1].  Step 2: G 1 (i, j)||G 2 (i, j) ← f RG (S A (i, j)) 10

11 Research Methods 11

12 Research Methods 12

13 Research Methods Step 8: G 1 ((m-1)-j, i) ← random(0,1) 13

14 Research Methods Decryption phase 14

15 Research Results  Simulation 1: binary secrets, 90-degree rotation Two secret images S A and S B with the size of 512×512 15

16 Research Results  Simulation 2: Halftone secrets, 90-degree rotation Two gray-level secret images S A and S B with the size of 512×512 16

17 Research Results Simulation 3: binary secrets, 180-degree rotation Simulation 4: binary secrets, 270-degree rotation 17

18 Conclusion Property 1: No extra codebook redesigned Property 2: No extra pixel expansion introduced Property 3: Multiple secrets encoded Property 4: Bandwidth and storage saving Property 5: Wide image format 18


Download ppt "Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications."

Similar presentations


Ads by Google