 03366020 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.

Slides:



Advertisements
Similar presentations
Visual Cryptography Moni Naor Adi Shamir Presented By:
Advertisements

A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
1 Visual Cryptography: Secret Sharing without a Computer Ricardo Martin GWU Cryptography Group September 2005.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Visual Cryptography Jiangyi Hu Jiangyi Hu, Zhiqian Hu2 Visual Cryptography Example Secret sharing Visual cryptography Model Extensions.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Binary Image Compression Using Efficient Partitioning into Rectangular Regions IEEE Transactions on Communications Sherif A.Mohamed and Moustafa M. Fahmy.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel Ching-Nung Yang Yun-Hsiang Liang Wan-Hsiang Chou National.
Enabling Secure Ad-hoc Communication using Context- Aware Security Services Author: Narendar Shankar, Dirk Balfanz Presented by: 魏聲尊.
Computer Vision Introduction to Image formats, reading and writing images, and image environments Image filtering.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Digital Image Processing Chapter 1: Introduction.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Image Processing Chapter 1: Introduction.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Applying Color and Value. Objectives To apply what we know about color schemes. To create an artwork using a complementary color scheme. To examine and.
Group members Arnulfo Cesar Julio Simon Sydney Commercial Artists Computer Graphics Specialists Graphic Arts Technicians Graphic Designers Layout Artists.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
Visual Secret Sharing Schemes for Plural Secret Images Allowing the Rotation of Shares Kazuki Yoneyama Wang Lei Mitsugu Iwamoto Noboru Kunihiro Kazuo Ohta.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
March 4, 2015 PITCH IT! presentations Ho mework: Study Unit 2 vocabulary flashcards and review notes. Objective I can work in a collaborative group to.
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.
Introduction to Visual Cryptography
A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
A Study on Visual Secret Display Student: Ming-Chiang Chen Advisors: Dr. Shyong Jian Shyu and Dr. Kun-Mao Chao 1.
Step Construction of Visual Cryptography Schemes IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 Feng Liu, Chuankun.
Date of download: 5/27/2016 Copyright © 2016 SPIE. All rights reserved. Results of edge detector for the printed text and the “Lena” image. Figure Legend:
Image Sharing By Chinese Remainder Theorem Group S: S1, S2, S3 Institute of Information Systems & Applications National Tsing Hua University Hsinchu 30013,
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Reporter:Chien-Wen Huang
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Der-Chyuan Lou and Jiang-Lung Liu,
Presenting Academic Papers
Research Paper Writing
The Recent Developments in Visual Cryptography
Image camouflage by reversible image transformation
Mean value based reversible data hiding in encrypted images
Pixels.
Pacific Rim Conference Poster Template
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
A Secret Enriched Visual Cryptography
Data hiding method using image interpolation
Partial reversible data hiding scheme using (7, 4) hamming code
A new chaotic algorithm for image encryption
Data hiding method using image interpolation
Source: Signal Processing: Image Communication 16 (2001) pp
Partial reversible data hiding scheme using (7, 4) hamming code
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Optimal XOR based (2,n)-Visual Cryptography Schemes
Secret image sharing with steganography and authentication
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Improvements of Image Sharing with Steganography and Authentication
Cheating and Prevention in Visual Secret Sharing
A Quadratic-Residue-based Fragile Watermarking Scheme
Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations Source: IIH-MSP(2018): Authors:
Presentation transcript:

 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme

Outlines I.INTRODUCTION II.VISUAL SECRET SHARING III.PROPOSED METHOD IV.APPLICATION IN THE MEDICAL FIELD V.CONCLUSION

INTRODUCTION The security of these medical information systems and data is important. In order to deal with the security in medical field in this paper we present a Visual Secret Sharing(VSS) scheme in a better way. This approach can be used in providing security in the medical field.

VISUAL SECRET SHARING This technique was introduced by the Naor and Shamir in VSS is a model in which the decryption of the secret image is done by using human visual system without any computational complexity.

VISUAL SECRET SHARING - Basic Model Consider a set X = {1, 2,..., n} be a set of elements called participants. By applying set theory concept we have 2 X as the collection of all subsets of X.  Q are called qualified sets and members of  F are called forbidden sets [2]. The pair (  Q,  F ) is called the access structure of the scheme. O

VISUAL SECRET SHARING - Generation of shares

Pixel colorOriginal PixelShare1Share2Share1+Share2 Black  Black  White  White 

VISUAL SECRET SHARING - Generation of shares

   

VISUAL SECRET SHARING - Generation of shares OR

VISUAL SECRET SHARING - Stacking of shares

PROPOSED METHOD XOR Pixel color Original Pixel Share1Share2 Share1+ Share2 Black  Black  White  White  Pixel color Original Pixel Share1Share2 Share1+ Share2 Black  Black  White   White  

APPLICATION IN THE MEDICAL FIELD

CONCLUSION Explained VSS with its application in the medical field The proposed method increases the number of white pixels Can apply this concept in maintaining the security and privacy of Electronic Medical Report, medical devices and medical images.